Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4717757pxy; Tue, 27 Apr 2021 11:00:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyPm6JPRny5Z6jk33nmvU8fUfjZFNyAo9oq/1h0pU/aVHo8f+Xh7mwnt/DdqoQVxBFUalC/ X-Received: by 2002:a17:906:f285:: with SMTP id gu5mr24912093ejb.226.1619546409414; Tue, 27 Apr 2021 11:00:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619546409; cv=none; d=google.com; s=arc-20160816; b=lVLV0ie+sqVaYsdibHxu6BObLstKm5GEr2qloKNTPJ7DFLnCRn3Q8vwtpIDx4XKVyd RaAnjyoLlZsk85KJq9skrQTv3/n21EFyWEXTkhk6gxcdIQIPf47Ckw5zmCpj78yW1fOe OghpWZpEGdlBlDmBEI0x3Lj9zHcI0vmafzvq2SWLdDycHQGEQco3uxlbI1UNX04IQGiY GPrjyAgW5TPnb7R0unaOfn+/pzO+0+0lXARxCAyySkb519c6xPaZGizCG3YjD7/SjOKz kM07DahlNf5xaEJ20967ryRZ5XsWuftsXtsh02bM+ygp7zPEvR4D3JituDn1emo3WOv1 GmAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=tie87niy0uPaXzhrhJHu7rG6uSFg8B0j7smdvmAowIA=; b=tmnVQ80bNzREHV1D+flTqq3OIlbRb6Ep5H7HDiU2znI2fPSnbTN2S6WIGAQaMW8SRQ 6whAu1re3kRILhr3cazK3NmCLBZ1DxkzXaRKufLuHIO3tEOvwJ12FEA6C8lWuZm2msMF qTFoUlm2BszS7J2d1VRNbaPtui1FIBiWs0nP5noZIvMlx2b6BUQjBNHo5gU0q3BKHgLG Uq3wcRDiqJtBuAXBd4JARxgM9J7ZidqvWxsU9hPcH//x46wSrR9QuYB4cy7kseKJSzm5 K7FSFI1gLUxGlEfF3ZGEJI3gNZf0Oh2vQk++1qDc/7APq+YBhZEHrmAB3qqX2L+3pcN9 ugiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MPAvxUaV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jg13si561899ejc.430.2021.04.27.10.59.44; Tue, 27 Apr 2021 11:00:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MPAvxUaV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236817AbhD0R6z (ORCPT + 99 others); Tue, 27 Apr 2021 13:58:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:58932 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230219AbhD0R6z (ORCPT ); Tue, 27 Apr 2021 13:58:55 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1D12D613C0; Tue, 27 Apr 2021 17:58:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619546291; bh=UGJqCc4+/xgm/VnWrKNR8nxLugg0ogLVphDp7bF+svo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=MPAvxUaVRE6lRm/otvyVZ8f72iM5jCTEgLXDbIm3NB9MULNL5lfwVVR0mkWeci/il CG8qcPpLJ4TnE4k32Uh7GIKMuzk6VZAkKm6ilogZlLqGcadOSAjzSvX//WFTuvUmx/ WjkKWES3onlTvpwbndbqsiHPYdAWN7P/XwpDuIyI= Date: Tue, 27 Apr 2021 19:58:09 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Aditya Pakki , Daniel Borkmann Subject: Re: [PATCH 066/190] Revert "bpf: Remove unnecessary assertion on fp_old" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-67-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-67-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 02:59:01PM +0200, Greg Kroah-Hartman wrote: > This reverts commit 5bf2fc1f9c88397b125d5ec5f65b1ed9300ba59d. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Aditya Pakki > Cc: Daniel Borkmann > Cc: https > Signed-off-by: Greg Kroah-Hartman > --- > kernel/bpf/core.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/kernel/bpf/core.c b/kernel/bpf/core.c > index 75244ecb2389..da29211ea5d8 100644 > --- a/kernel/bpf/core.c > +++ b/kernel/bpf/core.c > @@ -230,6 +230,8 @@ struct bpf_prog *bpf_prog_realloc(struct bpf_prog *fp_old, unsigned int size, > struct bpf_prog *fp; > u32 pages; > > + BUG_ON(fp_old == NULL); > + > size = round_up(size, PAGE_SIZE); > pages = size / PAGE_SIZE; > if (pages <= fp_old->pages) > -- > 2.31.1 > The original commit here is correct, I'll drop this revert. thanks, greg k-h