Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp589884pxy; Wed, 21 Apr 2021 09:58:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxc/WfdN1tyxRr0iWNKz4JeBeA8NGqoNQaSEqkY2H1Oxl18OVwJ9LaxIpcYO0eXsgtnxw1P X-Received: by 2002:a17:906:138c:: with SMTP id f12mr33614242ejc.180.1619024330190; Wed, 21 Apr 2021 09:58:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619024330; cv=none; d=google.com; s=arc-20160816; b=etTENLfxu6JFNtVYBrxy1pCcctHsOvbsCtlV3IQnxoBLEVqBPOlN9WaWho+gfcKpW4 2RD1mGJTpPSxbzp8uMxbTkkjEfwFJG3whCZvE/hrXut/6jyRbrQLQphbD7CcaiuFyK63 NhWJd7owMSwvFLq0NORCikLX3EZ+I/J7PYIwjGBhElE3ZThienM9F0IMSUIQl5MXMhWE sMJkF41f8/NpVrC6VTjBJ6FRRNK0CYSnwRidTPMLRHraF8qyKWOl8jld6YfwHkatgxax YDCmFteZKWcdwEW12s7Zhiy0oAEuSY37X55n81NhKsxuChzwWvaCa55+9AY69wAfgg0T yqKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=EU0qV87n2SCk5jf/4s8FEKan3qO6fktJ0fE2HoIgkak=; b=qtD2S/IfvXN50DimAAYRX+A5+AFz1wh6F6IrNrgOwZneCS0Hno7aTRcl5ipN5wglwD CDfmZ904gf6V7mW0CeEV971sNn5s2wadlhniw+2DUggn0x4ejuLSOUb/uLBXB4oinFGO /Jx5VmCBDSUUpqPu/e8qwlzQcAjK0p1KqcN2rWyGj+9IjlN836l1eFhYbIbqxUZxF/G3 FfJPO2/+uCHk8B5iyDMegpfocOStqjm8bp+XevThzYwB5gWIpeSRX2//R+vn++GbcNcy klvECpx3EoOd92fHDDDKAci2o1d3rJnv6H7axqy9buFqgNulXD6Tj3e6AB0GX1IjwEEv 2MLQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=aYye03X9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b6si2824209ejb.398.2021.04.21.09.58.26; Wed, 21 Apr 2021 09:58:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=aYye03X9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242982AbhDUNTo (ORCPT + 99 others); Wed, 21 Apr 2021 09:19:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:53810 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241212AbhDUNKi (ORCPT ); Wed, 21 Apr 2021 09:10:38 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B086D61458; Wed, 21 Apr 2021 13:10:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010605; bh=aO3XaVz4NRMbQy2cpkc3LwKWJ3zyQhq8qYCW+0ke/VY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aYye03X9dI/xyK31L6J4VwetErbEh5lE0VpC1jNxhZkDIuUhhU/hmMzi5KDjEyRbc MxdqPx2tPiLJf1Y/f9RTcBa5VosdHV9wz9ohedquIQ8R93CRX2xo5xE1qIBX4Oeb32 yFaHqLxVMdAVro3nfP+o7nPZzdjdS0M/MXX23UCI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Wenwen Wang , Adam Radford , "Martin K . Petersen" Subject: [PATCH 188/190] Revert "scsi: 3w-xxxx: fix a missing-check bug" Date: Wed, 21 Apr 2021 15:01:03 +0200 Message-Id: <20210421130105.1226686-189-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 9899e4d3523faaef17c67141aa80ff2088f17871. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Wenwen Wang Cc: Adam Radford Cc: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/3w-xxxx.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/drivers/scsi/3w-xxxx.c b/drivers/scsi/3w-xxxx.c index d90b9fca4aea..8f52f35e40f1 100644 --- a/drivers/scsi/3w-xxxx.c +++ b/drivers/scsi/3w-xxxx.c @@ -1035,9 +1035,6 @@ static int tw_chrdev_open(struct inode *inode, struct file *file) dprintk(KERN_WARNING "3w-xxxx: tw_ioctl_open()\n"); - if (!capable(CAP_SYS_ADMIN)) - return -EACCES; - minor_number = iminor(inode); if (minor_number >= tw_device_extension_count) return -ENODEV; -- 2.31.1