Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4707637pxy; Tue, 27 Apr 2021 10:45:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwJOuNNe4/XhnceHCxxY9PVu8mTEO731LU2bfmMR8R1bGG3vjHPi4tCrNH+RoiTJsY72opF X-Received: by 2002:a17:903:30c3:b029:ea:afe2:56f5 with SMTP id s3-20020a17090330c3b02900eaafe256f5mr25623769plc.64.1619545533712; Tue, 27 Apr 2021 10:45:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619545533; cv=none; d=google.com; s=arc-20160816; b=YiV/1PV5MhymxgK26tR6TZgsv7VcvomhHrunqkRbYmg5C0s48tzbYosYpiRPuaawPx WrsBy2Tc6xlxdLzH3YXkuFtWPWjoVCi5Uog09yGD4KLSDJDkcC2IWIft79svqOkRVsq5 Yll9ABqb5B44IOwZadmzMg19KhBrIzT0YS5gQDIsWK2+nATM8TVE71Us8TluUeCvXo2l 8lbQrfTl5JWs8qw7M+FkCUDJXJFsjib7P+shRAQGIRFlu5Rld/IcomDDM/JYJc1fS3ly Sw4hfMkHxakiYTGmsYU4sEQby16ilZ4uxjby5cgRGdHqvXz6/dKi9JZueMBMYWLDMoAE +3qw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=EiAdgQ3khS16V+YUin4wJH3k5Oq4PvRRW4YiNVRTXDo=; b=pJ/3vsZ7af6TK/cScLI8sqUgfN/t7A/+H3ItirM+Yb8vVITPbAaAuLmM1va+no+m93 dpnEwclSg8UcgDFIFisfUJPkASXvTy/yLQdQk69kvWmffukJB487rNYTG6CCnxqjSjFV URgyOTRjoUFgX6MYfLgghMSyuNIWChS+B5abgFH9tS3Sz0kSI/ACu+bRMiGHv7uQQFCu XoB9Q2ckrYrDXQ3JuE1rTB/KQp0Z+nKG+tN2pOBKPNBO+x5nb1RIRh8XTWPGcQPuOUqe d3UsYZPrdoRQm9F+xXPiudmbbvZvqlVnwOJgWCOau1MPnvQy+abCyBkLmvzI7qZfUzeY v7MA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KCF7I+xs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q36si499538pgl.469.2021.04.27.10.45.19; Tue, 27 Apr 2021 10:45:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KCF7I+xs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238744AbhD0RoX (ORCPT + 99 others); Tue, 27 Apr 2021 13:44:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:49288 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238405AbhD0RoN (ORCPT ); Tue, 27 Apr 2021 13:44:13 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B75E2613DC; Tue, 27 Apr 2021 17:43:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619545410; bh=YmtUdF/PDrd72Ow41Ca153ZqTiQqG2GJdZ4ihac78dQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KCF7I+xspnEFGPWWhDoYF92WV4+fobxEjVTZUIexxVfIP3YTJyF8uXn6RseOX3tlg JkyAqF9WtmyzKI+CVATwFgVmrVTOyVn3GQ1uG2co2+lKaNsf3ayHibqA5tyIDWp/KW zKicFerNpiSSjNjllBdBjM8fhV1sAjdhoz84NQns= Date: Tue, 27 Apr 2021 19:43:27 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Kangjie Lu , Kalle Valo Subject: Re: [PATCH 141/190] Revert "libertas: add checks for the return value of sysfs_create_group" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-142-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-142-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 03:00:16PM +0200, Greg Kroah-Hartman wrote: > This reverts commit 434256833d8eb988cb7f3b8a41699e2fe48d9332. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: Kalle Valo > Signed-off-by: Greg Kroah-Hartman > --- > drivers/net/wireless/marvell/libertas/mesh.c | 5 ----- > 1 file changed, 5 deletions(-) > > diff --git a/drivers/net/wireless/marvell/libertas/mesh.c b/drivers/net/wireless/marvell/libertas/mesh.c > index f5b78257d551..c611e6668b21 100644 > --- a/drivers/net/wireless/marvell/libertas/mesh.c > +++ b/drivers/net/wireless/marvell/libertas/mesh.c > @@ -805,12 +805,7 @@ static void lbs_persist_config_init(struct net_device *dev) > { > int ret; > ret = sysfs_create_group(&(dev->dev.kobj), &boot_opts_group); > - if (ret) > - pr_err("failed to create boot_opts_group.\n"); > - > ret = sysfs_create_group(&(dev->dev.kobj), &mesh_ie_group); > - if (ret) > - pr_err("failed to create mesh_ie_group.\n"); > } > > static void lbs_persist_config_remove(struct net_device *dev) > -- > 2.31.1 > The original change here is incorrect, the error needs to be propagated back to the caller AND if the second group call fails, the first needs to be removed. There are much better ways to solve this, the driver should NOT be calling sysfs_create_group() on its own as it is racing userspace and loosing. I will keep this revert and fix it up properly in a follow-on patch. thanks, greg k-h