Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4423827pxy; Tue, 27 Apr 2021 04:56:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxzKVuDELbadA3rkbMQoieOkzTQDdTgSIUasJpxew2wnUhbVDKZwaJquFfdtT+x8YXwKLSd X-Received: by 2002:a62:3407:0:b029:242:5931:4324 with SMTP id b7-20020a6234070000b029024259314324mr22513093pfa.3.1619524580530; Tue, 27 Apr 2021 04:56:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619524580; cv=none; d=google.com; s=arc-20160816; b=H2LawNSpuO7blYcy+Ncc1yf/b5OrJ0VH8Riv7GIDPr70/W0CXHpnFp29JJShrMC7Pf B3y+Uw+S1jYi8MVtzDmggKuXfV4wZCd26bhaB1bjWUBzjYrD+WwweZdVFEBBxFdFdVPs xJ+HW9Ld44hiowqiSUqLkEFkuDJaHUHsmvw1elro5yOLFD7KZPBMCfTiRSDbMRLZjHg/ /KvSPiJcSPkbmANA/KZY24ZC7Weg9QxDejkxZrJTOwwJmS6JBZl/sJpg50geuBi7eOM9 QvbOquC7edRB4r9RF0flKl46ghxbzL7uyK8JzFGrNFzTy34MUEl2GGaaqgVuYBK/H61G tvyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=N1sZxH8uQfpFsKShEwFah01XVj1gUkdApB6JP1Nmswk=; b=nvx9WwRHdrj7X8nbtMnuX33gXkTZ+YVnNbI84zahUhrYDxCP9BG33Ib4kChMgPlmPR D6LG4q3jwDN568bEDFItTIVD7qxMaJzJlzY3CTM0LDKCl3iyj7QbqOpDUzWRPk7snn6j Aw0Us5UkOO1z3PlF7f0SSmBfjPC3MjIuo9evlrtDLlSq5sFFrg8rQa2wquPLVLD2hiyK ENaVjjTuBSfsx0eFzKR4jS7aeaAI4SjyifBvCO3XOIcpfHkpNA90a4R9iNei9B/vDQjK vDpjhTClC+fJm3yogkomWktTqjBlbCfoYTTZsExLqyXsLh7G3ahiMXc4v0nmlvjsEWOn QUqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tR0bWlm6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b12si3059974pgs.530.2021.04.27.04.56.07; Tue, 27 Apr 2021 04:56:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tR0bWlm6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235570AbhD0Lzd (ORCPT + 99 others); Tue, 27 Apr 2021 07:55:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:58824 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230365AbhD0Lzd (ORCPT ); Tue, 27 Apr 2021 07:55:33 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CD207613D1; Tue, 27 Apr 2021 11:54:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619524490; bh=dCGJFVdD2TOwzh2s6fuc7Ms91bZRRTyrTv18wTwGR2k=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=tR0bWlm6Mi2oSqEH5zhDIhsyXxatZh5TEhjzQgxnMQnFpmxT/sxLdEej4UnZx0AxX bLGAcAwWx6egMO7CwZNT4WFSHjY3Skhiw18R2PJufPh3CZWQXnWMDjPIGX2ubu8FfP 2fx9h+Bs+bxd9x72s31mKod1pbR1tmxNCuTSDwnA= Date: Tue, 27 Apr 2021 13:54:47 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Aditya Pakki Subject: Re: [PATCH 060/190] Revert "staging: kpc2000: remove unnecessary assertions in kpc_dma_transfer" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-61-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-61-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 02:58:55PM +0200, Greg Kroah-Hartman wrote: > This reverts commit d7a336d67ab5443a0ef14b8335d139e855e8a682. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Aditya Pakki > Cc: https > Cc: Greg Kroah-Hartman > Signed-off-by: Greg Kroah-Hartman > --- > drivers/staging/kpc2000/kpc_dma/fileops.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/drivers/staging/kpc2000/kpc_dma/fileops.c b/drivers/staging/kpc2000/kpc_dma/fileops.c > index 10dcd6646b01..7fdad86044ca 100644 > --- a/drivers/staging/kpc2000/kpc_dma/fileops.c > +++ b/drivers/staging/kpc2000/kpc_dma/fileops.c > @@ -49,7 +49,9 @@ static int kpc_dma_transfer(struct dev_private_data *priv, > u64 dma_addr; > u64 user_ctl; > > + BUG_ON(priv == NULL); > ldev = priv->ldev; > + BUG_ON(ldev == NULL); > > acd = kzalloc(sizeof(*acd), GFP_KERNEL); > if (!acd) { > -- > 2.31.1 This one looks fine, I'm dropping it. greg k-h