Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp304400pxy; Thu, 22 Apr 2021 02:32:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxNPM8hOqMfKe5C3KznUPmGV5jhN4N1XnFa+rKu1ZC6qfRgiuEt+4i0+khyFcI2uSpfc6L+ X-Received: by 2002:a62:2a14:0:b029:263:20c5:6d8c with SMTP id q20-20020a622a140000b029026320c56d8cmr2562147pfq.23.1619083965601; Thu, 22 Apr 2021 02:32:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619083965; cv=none; d=google.com; s=arc-20160816; b=vKQB/iHIRPPzwxRDSRyBVgvjPXaQPWIGddeeVSRNQ0QLOQiDMUd+fXcrfLf67x/SL6 eoC2u4HokyDkSNX21ERp0ajRcQc44vGcoUaKuBlN3W5FvDzMgUMtT2/ChYQCAHvtyztr phyCy9uQr6TpKpPFuN1/tqlw5HZnFpFKkRiqbAusj+c06TQTYoVV5+A4CTwmZblbpiP4 0z8N6N+2Q0lmztsWNav2x7To/1xONd1ltxYePyeDebH0NgakUaPcxoDVjxiYqsZApQwa XTLBdykBFQfWfLhl4tv2Xc4gK3Pq5PgFnqEl3TWDbuOVqdHJ962eGo84g3LVnhD0v4jf t39w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=HhRWPmFQnHFk/zVesPvc+B0+RV8SgtWKFiZxs3yMN8o=; b=GTpYiTpX8eZHfD1lt+MNBPviGiIsGHpleTqSwH2BxbCmIQSSNx514cUUQyg6Zn4if6 yKtIvrOGxqPUVFMKWCip+nvsFGJRK9moUrHcAXzmQ1yAut/9qlZisFLE1GaMuSTXITMh 8xM9/kZd/PDo7HKve+ZEuCF0CpK14D1nSk23/avNm9yQQXcSAYx/PdRPToThRd1Pf/zZ 05uLqNTHgS6G/2usmiN4WCTinOOq77HnmdqWr8qo1vAh9FtRR3291gCuZdkxDe7I4fYt 3dQ3BPvY+x6GlWNiw8i2P3asTJSuV+6tjnxh36QTAO8IQvIervb8+GWLR8Yp94RpjRXY xdVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hg14si2488560pjb.133.2021.04.22.02.32.32; Thu, 22 Apr 2021 02:32:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235553AbhDVJby (ORCPT + 99 others); Thu, 22 Apr 2021 05:31:54 -0400 Received: from foss.arm.com ([217.140.110.172]:48980 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230285AbhDVJbw (ORCPT ); Thu, 22 Apr 2021 05:31:52 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id BBDBB11D4; Thu, 22 Apr 2021 02:31:17 -0700 (PDT) Received: from lpieralisi (e121166-lin.cambridge.arm.com [10.1.196.255]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 038373F774; Thu, 22 Apr 2021 02:31:16 -0700 (PDT) Date: Thu, 22 Apr 2021 10:31:11 +0100 From: Lorenzo Pieralisi To: Greg Kroah-Hartman , kishon@ti.com Cc: linux-kernel@vger.kernel.org, Kangjie Lu Subject: Re: [PATCH 089/190] Revert "PCI: endpoint: Fix a potential NULL pointer dereference" Message-ID: <20210422093111.GA20094@lpieralisi> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-90-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-90-gregkh@linuxfoundation.org> User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 02:59:24PM +0200, Greg Kroah-Hartman wrote: > This reverts commit 507b820009a457afa78202da337bcb56791fbb12. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: commit log and code update] Hi Greg, first off, thank you for doing this. This Cc should be fixed up if we go ahead with the revert (I can take the revert via the PCI tree and fix it up myself). I totally understand your concern (and the nuisance it is causing), the commit we are reverting looked and looks legit - just let me know how it is best to handle this please. Thanks, Lorenzo > Cc: Lorenzo Pieralisi > Signed-off-by: Greg Kroah-Hartman > --- > drivers/pci/endpoint/functions/pci-epf-test.c | 5 ----- > 1 file changed, 5 deletions(-) > > diff --git a/drivers/pci/endpoint/functions/pci-epf-test.c b/drivers/pci/endpoint/functions/pci-epf-test.c > index c0ac4e9cbe72..39dd394284a5 100644 > --- a/drivers/pci/endpoint/functions/pci-epf-test.c > +++ b/drivers/pci/endpoint/functions/pci-epf-test.c > @@ -915,11 +915,6 @@ static int __init pci_epf_test_init(void) > > kpcitest_workqueue = alloc_workqueue("kpcitest", > WQ_MEM_RECLAIM | WQ_HIGHPRI, 0); > - if (!kpcitest_workqueue) { > - pr_err("Failed to allocate the kpcitest work queue\n"); > - return -ENOMEM; > - } > - > ret = pci_epf_register_driver(&test_driver); > if (ret) { > pr_err("Failed to register pci epf test driver --> %d\n", ret); > -- > 2.31.1 >