Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp589975pxy; Wed, 21 Apr 2021 09:58:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy8iPkKDL7nH0G6pdj7NEbTm/EnuYEmjQ4TR4y/cSzOpU6o+MrffgdL+yG0WtmU0vejknWY X-Received: by 2002:aa7:c391:: with SMTP id k17mr21595231edq.153.1619024338627; Wed, 21 Apr 2021 09:58:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619024338; cv=none; d=google.com; s=arc-20160816; b=0LkM6+YWzUSy303jPzNNJWTo9KgwKUEL0In9ggNuWTxTEqm2m5CxoNpmsxgDFcBZFk GL58/KzzXWtMg+t3wRQqrpSVMKb30uaw/acU9dTh8uF95UwnGSroRVbp0W80YDW4w6dv Vuxp4teTi+mk0sRoh9kLfJF5OXlfXxhWhdMhWIB1YfG7tdTHTfQwyxP1PiP+OB2AQo+6 i27zI5WqGuC7wVrgPhDqEsOyhAAqn1YjJK8eDcgLkiIiWzdUzK7mjkWsKv952Vi0db+3 iysoIa3cMmo9TDmMj2Rw0qPThfwMcEhsYtix0/58JKuH7iUJcJlUJr/puKNDwZxfx4Fz 2zUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=LnmExDnhF8vGhY2haeiwbe8jdawqEQbdY6cZo9w1g0c=; b=dHbODREvm5tUqU1u6/2c7P4SZdzm1MTTh7DLC4yXIAoyqXkWdXLmRw0b1g14Q43dM6 nem4ATkAzrs+jqLFUv/kexoJayNJ42l52tIlK1+9pSt3II27h3z0/vi0tMVTLXFEiEqQ FYBGI+DumQZP/h9xCTOI+4lR/PiztHi1MD6XGSSOmwoztn/DmrY01VebbUk5EcjuCLlW MtJs+/JsBqKhIg1wllz+7CznowSnbnbEAOPQ1XwPP7Qd2Gx5Bwa0L+y+IoEtCmwDJL6a rcXVL7EdxuR53qtfiqgksgI+IA9TuqksInkY89Xx31SYfko8FzZn2W2ngupJFGpd7yE3 YWnQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=I5n9tqUX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ay10si2262051ejb.482.2021.04.21.09.58.35; Wed, 21 Apr 2021 09:58:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=I5n9tqUX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240731AbhDUNTt (ORCPT + 99 others); Wed, 21 Apr 2021 09:19:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:53880 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241013AbhDUNKm (ORCPT ); Wed, 21 Apr 2021 09:10:42 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5D87261469; Wed, 21 Apr 2021 13:10:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010607; bh=XCGS38mhYxLD3/cRVW/efDV0uQs7n1/+j8g/mA/sRhw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=I5n9tqUXXMpF/Lp//eeZx6QSrFAn8KpRDWKBP483ZG9isCymxM2NvOtsYZiCg5/kn i2gPQnRO8R5YZmnaInlfcAq8oYpS7gEU/OLytuyTF2HQXMoP6QYKLcNm8wSsUaa10w ys2UGfCtBDUQSFIxxPX4P8ffBbdZRXEmbB1zrFHs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Wenwen Wang , Adam Radford , "Martin K . Petersen" Subject: [PATCH 189/190] Revert "scsi: 3w-9xxx: fix a missing-check bug" Date: Wed, 21 Apr 2021 15:01:04 +0200 Message-Id: <20210421130105.1226686-190-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit c9318a3e0218bc9dacc25be46b9eec363259536f. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Wenwen Wang Cc: Adam Radford Cc: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/3w-9xxx.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/drivers/scsi/3w-9xxx.c b/drivers/scsi/3w-9xxx.c index b96e82de4237..4c5d4ea8a592 100644 --- a/drivers/scsi/3w-9xxx.c +++ b/drivers/scsi/3w-9xxx.c @@ -886,11 +886,6 @@ static int twa_chrdev_open(struct inode *inode, struct file *file) unsigned int minor_number; int retval = TW_IOCTL_ERROR_OS_ENODEV; - if (!capable(CAP_SYS_ADMIN)) { - retval = -EACCES; - goto out; - } - minor_number = iminor(inode); if (minor_number >= twa_device_extension_count) goto out; -- 2.31.1