Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4669987pxy; Tue, 27 Apr 2021 09:59:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzYvhG5GW7ryj7x1YF0SwhAeFLDP3YVnaBvzvMdXFrRmltTAg014RVXaJXUq6t1Y7CAbVXZ X-Received: by 2002:a17:902:36b:b029:ed:4645:2ed1 with SMTP id 98-20020a170902036bb02900ed46452ed1mr7973199pld.16.1619542774078; Tue, 27 Apr 2021 09:59:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619542774; cv=none; d=google.com; s=arc-20160816; b=F2iwHooFQFC6wYZ6uYgyJI2h9qn6W0vqul7/+zBV5ZfupLW1JxDlZI0y5si/onN0r5 eAgKqdSd7og/MTYmSiPqFaaS2VvBxgppsehXtvtTl0H6LdIYm5GX2JoqysOhYPlbGXCs veKw9/Pt2FbkuWkElft66IRA3ZFhEfiYAUz83CppqrSHOwGpQDvLqgUox6wICAFs/msd hOtDtum34HBABLUbRaHT0GeRCn8ZKrR+xdCSlgpcdj800MNa6T1R0NWsC5LjXBcr6msF snTLzjF349x9ChLH+Pnu0cQXUWEcG5cVym7sDvxbYMqRXdYebjvv3UCySYdPqlVFTdhZ +4FQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=f8X9uQiZRv77tg/dnk/yvnhZL74Y/rLI3mhJciwFtBM=; b=UYZkZHcixDSYycCs8+JN1QWADO/GZfDhwudFhl0B/i/pJ7IXott9OHH7hjzEb3lKgE Ho563sVlFGxVSDbyDHiifEpzGg6qKlLfN9vIRYVFYTnZqimv/xSjm8cIp41dTJ4IUBPo fj2x+FBDgrcSPYKXLKDS5tyDIRU/PzJT4IBNWJYQrl3uF4BilWj80juVohhoc9eCPl69 t/FtDA6PfIJy9O/Zu5vtHYBx9+VdyR8It1OBYNGtMtvpKVXiQuRlsaUElaCOevuNR1ve d8Kdm1C3kHpz9PF7yoNrewVaKgF84X6CJfuTzJ0gPV2Y+12tTpUVpRqe4Q2WfrPjHcOe OxWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nI8iQq8A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l3si510880plb.38.2021.04.27.09.59.20; Tue, 27 Apr 2021 09:59:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nI8iQq8A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236780AbhD0Q7Q (ORCPT + 99 others); Tue, 27 Apr 2021 12:59:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:44368 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236682AbhD0Q6o (ORCPT ); Tue, 27 Apr 2021 12:58:44 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6FDB361026; Tue, 27 Apr 2021 16:57:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619542679; bh=XXTIRzTyh3ChGseuPedmLI1W2XpKE8yN+5870OP+DHg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=nI8iQq8AF/vubwGnqKtGrCUx2gyco2xm6YwMeFaCib/04ryqXgW215+pBpcN78+Y4 K6mD5vyk6dya2vnvUVKchZQ6yjOP2cTOEW3mPY8yeSElJrkCd3AN+BSp5X6lzNtrd6 f3xd3so51VeE0eRA7gE0O4Q2JONWPD+GAT19Bqpw= Date: Tue, 27 Apr 2021 18:57:57 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Wenwen Wang , "David S . Miller" Subject: Re: [PATCH 180/190] Revert "net: socket: fix a missing-check bug" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-181-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-181-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 03:00:55PM +0200, Greg Kroah-Hartman wrote: > This reverts commit b6168562c8ce2bd5a30e213021650422e08764dc. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Wenwen Wang > Cc: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > net/socket.c | 11 +++-------- > 1 file changed, 3 insertions(+), 8 deletions(-) > > diff --git a/net/socket.c b/net/socket.c > index 84a8049c2b09..d4176362a27b 100644 > --- a/net/socket.c > +++ b/net/socket.c > @@ -3182,14 +3182,9 @@ static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32) > copy_in_user(&rxnfc->fs.ring_cookie, > &compat_rxnfc->fs.ring_cookie, > (void __user *)(&rxnfc->fs.location + 1) - > - (void __user *)&rxnfc->fs.ring_cookie)) > - return -EFAULT; > - if (ethcmd == ETHTOOL_GRXCLSRLALL) { > - if (put_user(rule_cnt, &rxnfc->rule_cnt)) > - return -EFAULT; > - } else if (copy_in_user(&rxnfc->rule_cnt, > - &compat_rxnfc->rule_cnt, > - sizeof(rxnfc->rule_cnt))) > + (void __user *)&rxnfc->fs.ring_cookie) || > + copy_in_user(&rxnfc->rule_cnt, &compat_rxnfc->rule_cnt, > + sizeof(rxnfc->rule_cnt))) > return -EFAULT; > } > > -- > 2.31.1 > Original looks correct, dropping this revert. greg k-h