Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp583484pxy; Wed, 21 Apr 2021 09:49:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzwXdmpN7zDb32QAUkOUnv0+JFgZrPONDWJYewSFs7E6a5SWzm2W7043j6j3L0reny60HxV X-Received: by 2002:a63:1214:: with SMTP id h20mr8752586pgl.207.1619023762871; Wed, 21 Apr 2021 09:49:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619023762; cv=none; d=google.com; s=arc-20160816; b=CUzMYeFvU8zwZPbXp7miwAfqHMhEY6DkmfYbsl30bWTudBvtMyPlsCf7MTEoZqTcpP bB5YTqS/vyNiAoS5iT/OoxwmZrb2IaZP+eNzaq14wNLI5vTteQf5DEzbE0wVpqSORaKN uIjhGwiub45emhwPhpf7fmuskmC4YRyJjoBnibyS7btZ9iRn62C75WKB3YyS3yeFgRdU gsukqH7/BcVZ6HTAYvZyeHxoMroJDM0LeDwc6qssaruu/GiebTnXEV5T8DMTRWXe8DRJ IgQC/cbxhnSIc0NkUIUJAHEJWBvbBqk83ddfu19r7PYNDW+gUKDa/jT78in0GNRu5gcA mNow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=LxYSRiN/4vnbgNOulU4Ba4TZQ9y/Pa5+QQK2vzsk3ec=; b=uK5Bhyde1avoDh95VzDWrR2FiWAMmGPfdwum/kXjnldlb0iSFN+4RVfbHlKuelpaCW XkEYwKDfsns1DdA6BQMOsR331i88V8LN06DvQfn0w6pHwca8XGJceN1SJx0pFMX9GEJ0 GYPrNfcehuqDJZ4im/M25qlBXTLVxOVgPe2PyXqvuH9v/Fyd0fOT+JNM1Hj/3x6F9Rur r1/8Kwov6++eCuk3py9W0mOolmgUL1PRRAOhgxutAC3k+Vk2fC8lBIvmW+0n1PzM8haM A0g5u+2g0BLKiwqC9L64zbTKaYTsGF9xXjfI6neqoX6h+rxiYmgSJ0jKk3FCLPT4ux+v IyYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=by83PEfl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z4si99915pgu.473.2021.04.21.09.49.10; Wed, 21 Apr 2021 09:49:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=by83PEfl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242613AbhDUNP2 (ORCPT + 99 others); Wed, 21 Apr 2021 09:15:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:49250 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242049AbhDUNJp (ORCPT ); Wed, 21 Apr 2021 09:09:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E6FF36143B; Wed, 21 Apr 2021 13:09:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010552; bh=n8p7gmoBMGxYaYDIWV+TarqBdxopoMWdbljAJqiCndA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=by83PEflAD5OKbW5Z+zeJ5SGcVa+COi+kHkNRNgtss8PJvbOrpHHILXe2Ue6uTPGZ rZLY9B3+x87domz6AL39mi32pkLVY9tyhChMbJpzL5/fZY4gbkzsAYuqVDzUXfeSAi JxT8k83ycNA4kCCVZjhaVZXSpSPnub4NfdwGTWzc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Kirill Tkhai , "David S . Miller" Subject: [PATCH 176/190] Revert "net/net_namespace: Check the return value of register_pernet_subsys()" Date: Wed, 21 Apr 2021 15:00:51 +0200 Message-Id: <20210421130105.1226686-177-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 0eb987c874dc93f9c9d85a6465dbde20fdd3884c. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: Kirill Tkhai Cc: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/core/net_namespace.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/net/core/net_namespace.c b/net/core/net_namespace.c index 43b6ac4c4439..9ae0b275238e 100644 --- a/net/core/net_namespace.c +++ b/net/core/net_namespace.c @@ -1101,8 +1101,7 @@ static int __init net_ns_init(void) init_net_initialized = true; up_write(&pernet_ops_rwsem); - if (register_pernet_subsys(&net_ns_ops)) - panic("Could not register network namespace subsystems"); + register_pernet_subsys(&net_ns_ops); rtnl_register(PF_UNSPEC, RTM_NEWNSID, rtnl_net_newid, NULL, RTNL_FLAG_DOIT_UNLOCKED); -- 2.31.1