Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1386933pxy; Thu, 29 Apr 2021 06:10:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwIsF8wrbmXx/C2Z82e0WZa62eq0Uw614ySkH6vdBn+LjfdETsurrankhy8xQrL7O6uG/Vw X-Received: by 2002:aa7:90d3:0:b029:241:21a1:6ffb with SMTP id k19-20020aa790d30000b029024121a16ffbmr32460115pfk.43.1619701823909; Thu, 29 Apr 2021 06:10:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619701823; cv=none; d=google.com; s=arc-20160816; b=Zi3fI4KWc573wLpTV3BHrzD7huRO7tNU6dnCm4cL7qLWpyqpnmba7FgB6fO4tvGF7U EPJ8EapzhyDvaY6FxGfCQXouj8K6rKytjcCn/ztY/xijOile3QgrEu0dR1p5qngjxVA1 KjkSPoNYqceiO8eQpdnIo6hkQJfVQQVeFgqx3g597hxvgrKhjCIvhovjQQe+LrYtC1N4 wZiR24fHRLAQtvbbvxq43kUuviUjPFU1bslp0W1dhHYlI/FmygnYW2ZZP7bF8AD+tBfW USTweuy9M2F9wc0GJZCdbe4BZtoWxf3tEn+CxHTM87UTNFIbUS6RhegqPOzC6UACeBua yvvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=xmTgUrJfeXq7xcOmj3kppUu31w192Jh8hnspjaYTHO0=; b=SYIeVu+mykHnN4dzReB887P0fQCTjhEwD2tpYpH6XoJBvs/b8ofRYBX2Q/Tbzgsl0O uG0ES6RBTIruOCQikDyBNYtJOv+n60d0C3EvKcgfPdR4yDhmqc73sXQ1kcRn/h0BWbPf NLr7pG1bX5iB9hF/gnBeofaShtEbGIIpuqR0m380/o56AV86smYbIvHm8QYGDjRrQW48 G/PJ5MsyD7TEXISr8NvURHK2WhCgJdjW0+9RT+UaaGRuNlyYF4Y2QuqO7aT1bcCWQres kJzQvpT+pr4/nDuX+A3VwRRRe1H9GqsRE7bItHD78ottNe/Umw95jdjuI4/kqk+fw0eF q02w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T7HL1uZG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z12si3560379pfa.306.2021.04.29.06.09.47; Thu, 29 Apr 2021 06:10:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T7HL1uZG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239255AbhD2NJk (ORCPT + 99 others); Thu, 29 Apr 2021 09:09:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:34416 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238456AbhD2NJM (ORCPT ); Thu, 29 Apr 2021 09:09:12 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8B73A61057; Thu, 29 Apr 2021 13:08:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619701706; bh=vQaYKW+5nQgdI7Y2naghwyxtzkgbBNkMPs+FtpwjlaY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=T7HL1uZG+VieWMUO3PIAiWmxjrEpjoduDtqDExdoNG4P6FvXTCwkDE1fk7hJ9lkNv gHU0m+m5bQmhYhUki+uekkCOjQ6YPW8V/Uq6Y6dFUdbyXFH9fHHi71QCwLeGBwdKH9 By8rGt1gIgBOQKcblqJkDDrygLYY0CvAYwVBzGPE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Kalle Valo Subject: [PATCH 3/7] Revert "orinoco: avoid assertion in case of NULL pointer" Date: Thu, 29 Apr 2021 15:08:07 +0200 Message-Id: <20210429130811.3353369-4-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210429130811.3353369-1-gregkh@linuxfoundation.org> References: <20210429130811.3353369-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit c705f9fc6a1736dcf6ec01f8206707c108dca824. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper submitted to the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota) but later withdrawn. Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/intersil/orinoco/orinoco_usb.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/net/wireless/intersil/orinoco/orinoco_usb.c b/drivers/net/wireless/intersil/orinoco/orinoco_usb.c index dd31929261ab..60e626eb913d 100644 --- a/drivers/net/wireless/intersil/orinoco/orinoco_usb.c +++ b/drivers/net/wireless/intersil/orinoco/orinoco_usb.c @@ -1392,8 +1392,7 @@ static int ezusb_init(struct hermes *hw) struct ezusb_priv *upriv = hw->priv; int retval; - if (!upriv) - return -EINVAL; + BUG_ON(!upriv); upriv->reply_count = 0; /* Write the MAGIC number on the simulated registers to keep -- 2.31.1