Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4721092pxy; Tue, 27 Apr 2021 11:03:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwUIsRmvYc/g17HKmNzidjR8Fht/4O5H5J3MFcGByeuFV4Dlhe93NDgof1FpD7kCVStHrOe X-Received: by 2002:a17:90a:5998:: with SMTP id l24mr6161957pji.76.1619546635832; Tue, 27 Apr 2021 11:03:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619546635; cv=none; d=google.com; s=arc-20160816; b=vruwdywlR/cSfl1mMMi1Jdqes46RsDUEPfQbk9S2EM5/EvUneLvIxSf7F/V/Vbei2Y Y1xVl0bs3Gd9v9tv7ovLC92diiD/PGBE6QkHdXC33qtNIU/BSqY+A9fonPCM9lqqiB/3 49ckh6uOQUSeYIEgf552KFVTpQEMeLuAxdhM4MyIcTrcvMi8fMYIpsnlXhHaGeaxMzpm xP9FoZ3ZjxCXePKaX5dkERatD9haZJRj4Uh/m9ukeKJSXDlaWZtXCEJqNfL9Zhx/DZC8 4SaNKTh+HR3AuvlcaxTJoCscxGTPRv6bBGZ6/0ZBH8vHOWL2iSi6m/pBAD/trinuEF5f 9VAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=BZ6Z+TX9Vc/HlCTGUsfZ1lldvWTPaAMeOFnkSjGPXbY=; b=wWNFQ1zft5cWjt6yz5xSxk2fbJe2S1VWm/SvIBv+rMgPEnuKTnOzW5DRHtSNmUxd+w puHjReUF4J+rYOCEary17EtWe0D+OHqOJem4DEgteBeTybylM83HbCVWgx6Yq94tvlm+ HZYHg2EAI4aNEKRMT9kJZ90cqfypq8JB7uKu/t7YJdUZYNI9ewGFB+cQoqZwFqWTq8jb 8nokgMwsOILXlEHyZ2/iXxjEc8VG1gj3QCZnt51NDLniAz4TDDmRRNdnwkcZO764iSDC K5SqhGsbeJ9UyWoz+wCpXzLYynJtk40Hn5jyTkzBkalufD9t7kydPveJacJH5Macaqg+ piTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wN50moHG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 59si632855pld.20.2021.04.27.11.03.42; Tue, 27 Apr 2021 11:03:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wN50moHG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235974AbhD0SD0 (ORCPT + 99 others); Tue, 27 Apr 2021 14:03:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:33262 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230219AbhD0SDX (ORCPT ); Tue, 27 Apr 2021 14:03:23 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5C7BF613BD; Tue, 27 Apr 2021 18:02:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619546558; bh=aMurAj7JN3YRMgPSgw5O66t/kwQi1HMqtywDqU3E44k=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=wN50moHG7/7B9tKdIrN9g/yL3MholviTusyYZ6z1x9oQiBEWMCYK1/EhU/6YTKqdH +/ZQ4e35Qmob6BSs7fBCICVEHNYn5K3WNQCPraCtieIcapCqSnBGiuY1gqJhCayWL/ rVWQC5e0ohZpw2HIA3Dsfdn8l0PEaqxxxeMdh/Xc= Date: Tue, 27 Apr 2021 20:02:36 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Kangjie Lu , Ursula Braun , "David S . Miller" Subject: Re: [PATCH 090/190] Revert "net/smc: fix a NULL pointer dereference" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-91-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-91-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 02:59:25PM +0200, Greg Kroah-Hartman wrote: > This reverts commit e183d4e414b64711baf7a04e214b61969ca08dfa. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: Ursula Braun > Cc: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > net/smc/smc_ism.c | 5 ----- > 1 file changed, 5 deletions(-) > > diff --git a/net/smc/smc_ism.c b/net/smc/smc_ism.c > index 9c6e95882553..6558cf7643a7 100644 > --- a/net/smc/smc_ism.c > +++ b/net/smc/smc_ism.c > @@ -417,11 +417,6 @@ struct smcd_dev *smcd_alloc_dev(struct device *parent, const char *name, > init_waitqueue_head(&smcd->lgrs_deleted); > smcd->event_wq = alloc_ordered_workqueue("ism_evt_wq-%s)", > WQ_MEM_RECLAIM, name); > - if (!smcd->event_wq) { > - kfree(smcd->conn); > - kfree(smcd); > - return NULL; > - } > return smcd; > } > EXPORT_SYMBOL_GPL(smcd_alloc_dev); > -- > 2.31.1 > The original is incorrect and causes a memory leak. I will keep this revert and fix it up properly with a follow-on patch. thanks, greg k-h