Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1424849pxy; Thu, 29 Apr 2021 06:55:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyp8ExPbUBJesofWOISngzZ56hRdPOK/TGl4e2EhuKP9/2ylbrh0+//iuB88v0ozwg3njk3 X-Received: by 2002:a17:906:ece1:: with SMTP id qt1mr35625072ejb.385.1619704547738; Thu, 29 Apr 2021 06:55:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619704547; cv=none; d=google.com; s=arc-20160816; b=a14GPqx42aGGSx6IEDVSz00jJmwrGtUSc64gqfB2vgzAFDzDDWcllnTOhEFVbCdcoR zV4nWIR0A+/ZNm1Pfgh1eC/k+XxLUCpEP4JgnmL3e3LcOHi4uZVPzwQMXeSyTtop9/Jv jAhGExLAvW55eU2Gs+rxmaSENyNeZI9XiQl/2uGMejBc3oQ0rKpqoYcVyHdKYXvwPn8o MIqxWhhoohLEqDlnP1C1eyFRA4k/JP99C3XBzn7/rzVnGnTe7yGNEGr/4245LQjmD0YD OfrD1z+66wHhfJSdihj/yjihDfPyB6ow0cQIP3Ikv+1uvqNqLee/BbIAOnSDXtADmE/z mkOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=hPTfKfHhjoqJRWyRE9NkhOSz8Lse0NL+fiycreq/Zx0=; b=gAAViPsA/i8+K9dgD8Nf+scKTo4iiAQotPyD+KBNCJ7E8yraqfkAksLXFmA7I6ywIA fZTiOFjP78iiaN7hPUU88Se8kAeLSVYtwZilvWlSnEfkr6wLCMhp5SAJ9T7VAuzx3LcI Duvvn8FY0/6j3/Ot5EN4qXm+DZA4YHx5Xizh5PGEUxqzHaE5CLLvqVHsFXmGnGQ2LWpN oUwUu6sIjkNQhSQq70GdXKkq8IlkEDwXjlEAQDwkdQGl1EU9uwpshseUH5xzBKQZLEsA 2n+JMk/x2PIMLRfIJstzINcGWhFgyeIfRUzDbNAYHJNCSsSYgGW9yDA0V1tDV8nzVLlX F7oQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SfYs0Jlf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n25si2789796edq.246.2021.04.29.06.55.23; Thu, 29 Apr 2021 06:55:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SfYs0Jlf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237349AbhD2NzH (ORCPT + 99 others); Thu, 29 Apr 2021 09:55:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:44016 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233862AbhD2NzG (ORCPT ); Thu, 29 Apr 2021 09:55:06 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 344F861407; Thu, 29 Apr 2021 13:54:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619704458; bh=y/KSgaD2/mqGMlekuhyd5x478LgNEJTau9K+E8yRMlY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=SfYs0JlfAyjPspN8DJlYf1seeCx45i8MoX8QD7xYEL9Vi8Fvdz5rnpIBpref/AQSJ 5jVuVicHwjQIYXHDtQrySVwEDqugFUZ00qIWeJD2Zo2o2B+TLmIkrsgga+2JShOWyO 1k9nU+ZZa9RS6Y7B5MzYNSm2FgrgsNT4cQS2B3GQ= Date: Thu, 29 Apr 2021 15:54:16 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Aditya Pakki , "David S . Miller" Subject: Re: [PATCH 1/7] Revert "rocker: fix incorrect error handling in dma_rings_init" Message-ID: References: <20210429130811.3353369-1-gregkh@linuxfoundation.org> <20210429130811.3353369-2-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210429130811.3353369-2-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 29, 2021 at 03:08:05PM +0200, Greg Kroah-Hartman wrote: > This reverts commit 58d0c864e1a759a15c9df78f50ea5a5c32b3989e. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper submitted to the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota) but later > withdrawn. > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Aditya Pakki > Cc: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > drivers/net/ethernet/rocker/rocker_main.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/drivers/net/ethernet/rocker/rocker_main.c b/drivers/net/ethernet/rocker/rocker_main.c > index 3473d296b2e2..35ebeeb40639 100644 > --- a/drivers/net/ethernet/rocker/rocker_main.c > +++ b/drivers/net/ethernet/rocker/rocker_main.c > @@ -650,10 +650,10 @@ static int rocker_dma_rings_init(struct rocker *rocker) > err_dma_event_ring_bufs_alloc: > rocker_dma_ring_destroy(rocker, &rocker->event_ring); > err_dma_event_ring_create: > - rocker_dma_cmd_ring_waits_free(rocker); > -err_dma_cmd_ring_waits_alloc: > rocker_dma_ring_bufs_free(rocker, &rocker->cmd_ring, > DMA_BIDIRECTIONAL); > +err_dma_cmd_ring_waits_alloc: > + rocker_dma_cmd_ring_waits_free(rocker); > err_dma_cmd_ring_bufs_alloc: > rocker_dma_ring_destroy(rocker, &rocker->cmd_ring); > return err; > -- > 2.31.1 > The original commit here looks correct to me, so unless someone objects, I'll drop this revert from my tree. thanks, greg k-h