Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4697655pxy; Tue, 27 Apr 2021 10:32:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyrMRCWRqMPlyODoU8H6HXHZfFLkTbSf9OQWJu3vFJtEWqc2yr3SUBJzTpTo1cJdlTefZCp X-Received: by 2002:a05:6402:28f:: with SMTP id l15mr5934001edv.246.1619544751001; Tue, 27 Apr 2021 10:32:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619544750; cv=none; d=google.com; s=arc-20160816; b=RxmdQthxOEZO9tplZIi0xOtdbT5XxqnDZTiylCWwnDHl5pjDwgj2E7bvJnyFzw2B77 1AsUjWqFfb4Vd9FXi3kOVidQ1TpEwQ60VL2LjmLL1KBnT4mQzqcElVBXACanNA1s3aro Zx+6lD1ldNstgklPsgxNw1liciIj1u5JiM+ymoOYAib5nKZVaC53UaobM5gwITBca115 lwx2kVkuX9g1GFfCVF9kSev5MhpAIPtk1buP1X7xm0qxbTkh4Pde9TWswp4mrzOpUoMt p91ky1cXyAsdP88PIM5OwhRCr0Ue+0oNHk4T9KrTKIJHH2JVsoLUTi4TQDAk33r+iCDO 1ngA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=k3TmazaLSNT8RkiHvNqJ5f6YxOrEysTqIrAyedZPs8o=; b=iUvLqrTKuNphNb3NyYYFSpFB9f39yO+4AN4V6daUDHM85TkKboEITF0E3jpTkqWzaT 4wrg2t7YazI8nkSF/kzj2k64+fnD8tq8f/4KDALWxTrKFvvAW2NpQyM+WaZKK9HNxoY8 VjIWYoXLpGvoy49NvPxsUlN4tbsQiKuKkEaWtuMdCvgRgRWXUq0GRHhO2DjQSwTnEiFk 8kXCGRNvq2nayc1Ufp5WwmvGivgP7u+2gMXVoRjvp3B/kyRQjO8E/5dy3F1CmIASrfam F3mXig2cyGwxNhEc6ZCP2K+jnvXaAhuiU7Hc+tTx6G945uOwgLrN2ER965VfaCLBP/1i stBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=hFGxdMN0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d26si3204271edr.15.2021.04.27.10.32.07; Tue, 27 Apr 2021 10:32:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=hFGxdMN0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236019AbhD0Rb4 (ORCPT + 99 others); Tue, 27 Apr 2021 13:31:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:41348 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235593AbhD0Rbx (ORCPT ); Tue, 27 Apr 2021 13:31:53 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 206A0613E5; Tue, 27 Apr 2021 17:31:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619544668; bh=/rQqaMen4CdzB60Rxa/kOLj5DJX3AW+xBuggzpn42zs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=hFGxdMN0uYeFwxePEQT/CMAzyaqOIxnFp5LCIbIl2bmX+obM6+y0ZB+275hyV43U9 MgO7g/tTL85HaVZS/2Z/k4izVarIR4YnYzR7PHy54pxESnaRLM50DGNdIKyiAPYPFZ q4EXVkmcA+8ahsVLlE7G22+jmPupou7uQxNxsi2A= Date: Tue, 27 Apr 2021 19:31:06 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Kangjie Lu , "David S . Miller" Subject: Re: [PATCH 138/190] Revert "net: liquidio: fix a NULL pointer dereference" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-139-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-139-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 03:00:13PM +0200, Greg Kroah-Hartman wrote: > This reverts commit fe543b2f174f34a7a751aa08b334fe6b105c4569. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > drivers/net/ethernet/cavium/liquidio/lio_main.c | 5 ----- > 1 file changed, 5 deletions(-) > > diff --git a/drivers/net/ethernet/cavium/liquidio/lio_main.c b/drivers/net/ethernet/cavium/liquidio/lio_main.c > index 7c5af4beedc6..6fa570068648 100644 > --- a/drivers/net/ethernet/cavium/liquidio/lio_main.c > +++ b/drivers/net/ethernet/cavium/liquidio/lio_main.c > @@ -1166,11 +1166,6 @@ static void send_rx_ctrl_cmd(struct lio *lio, int start_stop) > sc = (struct octeon_soft_command *) > octeon_alloc_soft_command(oct, OCTNET_CMD_SIZE, > 16, 0); > - if (!sc) { > - netif_info(lio, rx_err, lio->netdev, > - "Failed to allocate octeon_soft_command\n"); > - return; > - } > > ncmd = (union octnet_cmd *)sc->virtdptr; > > -- > 2.31.1 > While this does keep the immediate "NULL dereference" from happening, it does not properly propagate the error back to the callers, AND it does not fix this same identical issue in the drivers/net/ethernet/cavium/liquidio/lio_vf_main.c for some reason. I will revert this and fix up both files properly in a later on patch. thanks, greg k-h