Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4736955pxy; Tue, 27 Apr 2021 11:23:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwLg7ycGV9JuEKN5YxxWbml9pnDYUvqV91u8bdUrsZBGVbkziNZzXuNx5IELsVdhZUy2LKR X-Received: by 2002:a17:90a:f684:: with SMTP id cl4mr15469379pjb.139.1619547839658; Tue, 27 Apr 2021 11:23:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619547839; cv=none; d=google.com; s=arc-20160816; b=A7CphAKgaVTTup3WbbXiM7jO3CBUGRKWFHKLgknV0KIvZuICzBRt0C4RDEoovu3VXa 9hCe6h1Nzn0Q8+cnunUePTamU+PV7vNeMt/tcixZP8GimU2fl4y0kEMhgdrzT8wMNU/a UXyGLIx/S28OjkGLeAKIIgWkNKSpp9WzFJy9b2sHyS7l2ie7hB3zEdV+JQ3xgLPjz69n 6k2SR+YcX15MblWJAwg+qqGZJlZbRlHHvAZJ3NhJ6Qtby/HrHxKYZWlgw8l7wNYmMBMv 3fDU7UX4nnobLNx+NofEQlEyPmkb4eKn4uPFapc0w3tjs0FPrryf1hrCq9T3/mRnbBiC 6L+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=aikGTeN4qoPJT5L87jnA1yyOQKv3ZbplWkIXhuSdwxg=; b=nd06i6XMG9EznU4wFZfxujW6Atb5P/dORBPYuMNL8bjPx4kk7dVZdW67uegCiY1I8P WWH3MGGL3PdOrOrsjQBFdOwS8LBbdTBrZrRkAQsHPRfxUP7YmjxFkXKrNwOZ1nOXV6y6 MXXZN0twKJfwJk14Mo13szBsZ2ds9o4e7EoqgbmtZVR1klIni8srVihzPs23OkBldWx3 oVj9p9UP8IoNLzO+RURMoxZYihjyoVh1zJn4Uw+df3tJOMUISes5o1utR5mw08oZFTSQ ByPMDtBjy5YJbaFKwZkJzPQNJkiqWVEZYLG9hXQIi0R+01y63BhNXca8uQGiAKO8Ud9r NTLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CQtTtNzS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t18si579897pgg.214.2021.04.27.11.23.46; Tue, 27 Apr 2021 11:23:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CQtTtNzS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238241AbhD0SWg (ORCPT + 99 others); Tue, 27 Apr 2021 14:22:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:43806 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235647AbhD0SWf (ORCPT ); Tue, 27 Apr 2021 14:22:35 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 0C7E6610A5; Tue, 27 Apr 2021 18:21:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619547711; bh=W/lR0B3B/jG31hu8CSs1S2F5UKwfxbYKEgGBGRZCgH0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=CQtTtNzSBNbGTcAG+wzKWNkFEEJ+bDwqDIxlhxkNul6Cdge21LkceU1QTa17ufT8H cXXNHowXH85yDMqrVfqgO4ijCTh8zbLaehcebsnMq+hAoBnBzcgeNBG8BiLskM7W06 pF/pVVHuQE4mgV3KrJGlG672SzxUxa8DlKOnVsm8= Date: Tue, 27 Apr 2021 20:21:49 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Kangjie Lu , "David S . Miller" Subject: Re: [PATCH 133/190] Revert "net: qlogic: fix a potential NULL pointer dereference" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-134-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-134-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 03:00:08PM +0200, Greg Kroah-Hartman wrote: > This reverts commit eb32cfcdef2305dc0e44a65d42801315669bb27e. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > drivers/net/ethernet/qlogic/qla3xxx.c | 6 ------ > 1 file changed, 6 deletions(-) > > diff --git a/drivers/net/ethernet/qlogic/qla3xxx.c b/drivers/net/ethernet/qlogic/qla3xxx.c > index 214e347097a7..50dbb8205e6c 100644 > --- a/drivers/net/ethernet/qlogic/qla3xxx.c > +++ b/drivers/net/ethernet/qlogic/qla3xxx.c > @@ -3863,12 +3863,6 @@ static int ql3xxx_probe(struct pci_dev *pdev, > netif_stop_queue(ndev); > > qdev->workqueue = create_singlethread_workqueue(ndev->name); > - if (!qdev->workqueue) { > - unregister_netdev(ndev); > - err = -ENOMEM; > - goto err_out_iounmap; > - } > - > INIT_DELAYED_WORK(&qdev->reset_work, ql_reset_work); > INIT_DELAYED_WORK(&qdev->tx_timeout_work, ql_tx_timeout_work); > INIT_DELAYED_WORK(&qdev->link_state_work, ql_link_state_machine_work); > -- > 2.31.1 > Ideally you would have added a new goto tag and put the unregister_netdev() call in that, but the logic here still seems to be correct, so I'll drop this revert. greg k-h