Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp564864pxy; Wed, 21 Apr 2021 09:23:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzCn+lsCgKuPU4m0IugZL8SV1coQGDsPjVf/E+EZ6FsPLQL+9vCHRWfSvBP6YWQZUmLiph X-Received: by 2002:a17:90b:808:: with SMTP id bk8mr11942504pjb.222.1619022187044; Wed, 21 Apr 2021 09:23:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619022187; cv=none; d=google.com; s=arc-20160816; b=pH+yksH6FLHvdgpMMVG87b82vUitDhH1bYTHTYM7jo6raSsOZUt9L2VBIk+LJoMsPH DJNEHglQRaLXJhc/JvAS+HIqMIRxgSwoct5r8QNNsM3VLJWlSNCQDdIDEyFrCz0xaIt4 W7C8FFNqbdlBCsUi+siOx3EN02phtnahc4ppbWpbWs6025Cf8Eynp1wZRNOZgoI6v7vG FqtL9pRfvqculzriv+KBlQHSBsIno8jUcUPCQTlO4Bop9IORK/jKgNk4WVsjBP5pm51c Mi0XDPiikk2HkzF99x2mJFzHgRU8aPsStUXpo4bigbiXGRaL69msWlRAGCGmgXP4YlIc UClA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=xJqvyaRsoZ7GBtw6kQH/OCWBpbYxQrWBYqmrzqJ3JAI=; b=jSrQN3j4QfML+Ni/tGqf4u/0bXPhPaGkiV8snzzMBRiPzc9k0ZjE2JPuR/bIO/l6Fv zYDpivsFTP2sszBByf3Ci5Ez0IbDlAf0VktelAp63oEimfV+Ml6NLjTpjw4YXqTbuH/7 i7qF9fkhbbpVeLKCkQyz/JYlJ1dmYKCsUkB6S4R7B6p0COayamYuK4TTkA3x6UiWne1W vdbWnHAzF4lx7xc0ClR1OG6tmtpxtNPw7pAGsesbfTSgjiiV65F/4CDp9h0bsjoxD42U zquxZHw7xWWsk8Qe+LeEw8VjDsxAdNK2GV/z1q3zBga7JgUPguADNXkfqC4pot9cYgjP /LLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="BVNWY/nN"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f1si34337pgs.307.2021.04.21.09.22.54; Wed, 21 Apr 2021 09:23:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="BVNWY/nN"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241714AbhDUNNH (ORCPT + 99 others); Wed, 21 Apr 2021 09:13:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:49410 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241644AbhDUNJO (ORCPT ); Wed, 21 Apr 2021 09:09:14 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 08BE36145E; Wed, 21 Apr 2021 13:08:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010520; bh=2KVYXg4Amks15meF9byRNYhsGm/+/NeCSiwRyynZ3PE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BVNWY/nNtx7nPmK4BOL4vAsbNuufI0J2/fJCVd7yNP4XmiiWNXGY5/zHla+M2RDeD wqxUtEhQmDtmRueM6XJ55cgM9kxVO49J7bQYkHZFZ7LjNAtY+UMJbJwvd+B/xvY5Bf di83HlYWbWsIa5U/7FwYLG87Z4TlxaybDoPOzc3s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Devesh Sharma , Jason Gunthorpe Subject: [PATCH 166/190] Revert "infiniband: bnxt_re: qplib: Check the return value of send_message" Date: Wed, 21 Apr 2021 15:00:41 +0200 Message-Id: <20210421130105.1226686-167-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 94edd87a1c59f3efa6fdf4e98d6d492e6cec6173. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: Devesh Sharma Cc: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/bnxt_re/qplib_sp.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/infiniband/hw/bnxt_re/qplib_sp.c b/drivers/infiniband/hw/bnxt_re/qplib_sp.c index 049b3576302b..c9cc03e2130c 100644 --- a/drivers/infiniband/hw/bnxt_re/qplib_sp.c +++ b/drivers/infiniband/hw/bnxt_re/qplib_sp.c @@ -775,8 +775,9 @@ int bnxt_qplib_map_tc2cos(struct bnxt_qplib_res *res, u16 *cids) req.cos0 = cpu_to_le16(cids[0]); req.cos1 = cpu_to_le16(cids[1]); - return bnxt_qplib_rcfw_send_message(rcfw, (void *)&req, (void *)&resp, - NULL, 0); + bnxt_qplib_rcfw_send_message(rcfw, (void *)&req, (void *)&resp, NULL, + 0); + return 0; } int bnxt_qplib_get_roce_stats(struct bnxt_qplib_rcfw *rcfw, -- 2.31.1