From: Song Liu <songliubraving@fb.com>
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: "linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"stable@vger.kernel.org" <stable@vger.kernel.org>,
Guoqing Jiang <gqjiang@suse.com>, Aditya Pakki <pakki001@umn.edu>
Subject: Re: [PATCH 134/190] Revert "md: Fix failed allocation of md_register_thread"
Date: Fri, 30 Apr 2021 06:10:24 +0000 [thread overview]
Message-ID: <14DC41E8-99F5-491A-93EF-598D10E381FE@fb.com> (raw)
In-Reply-To: <YIj2nsovH/+ujHL0@kroah.com>
> On Apr 27, 2021, at 10:46 PM, Greg Kroah-Hartman <gregkh@linuxfoundation.org> wrote:
>
> On Wed, Apr 21, 2021 at 03:00:09PM +0200, Greg Kroah-Hartman wrote:
>> This reverts commit e406f12dde1a8375d77ea02d91f313fb1a9c6aec.
>>
>> Commits from @umn.edu addresses have been found to be submitted in "bad
>> faith" to try to test the kernel community's ability to review "known
>> malicious" changes. The result of these submissions can be found in a
>> paper published at the 42nd IEEE Symposium on Security and Privacy
>> entitled, "Open Source Insecurity: Stealthily Introducing
>> Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University
>> of Minnesota) and Kangjie Lu (University of Minnesota).
>>
>> Because of this, all submissions from this group must be reverted from
>> the kernel tree and will need to be re-reviewed again to determine if
>> they actually are a valid fix. Until that work is complete, remove this
>> change to ensure that no problems are being introduced into the
>> codebase.
>>
>> Cc: stable@vger.kernel.org # v3.16+
>> Cc: Guoqing Jiang <gqjiang@suse.com>
>> Cc: Aditya Pakki <pakki001@umn.edu>
>> Cc: Song Liu <songliubraving@fb.com>
>> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
>> ---
>> drivers/md/raid10.c | 2 --
>> drivers/md/raid5.c | 2 --
>> 2 files changed, 4 deletions(-)
>>
>> diff --git a/drivers/md/raid10.c b/drivers/md/raid10.c
>> index a9ae7d113492..4fec1cdd4207 100644
>> --- a/drivers/md/raid10.c
>> +++ b/drivers/md/raid10.c
>> @@ -3896,8 +3896,6 @@ static int raid10_run(struct mddev *mddev)
>> set_bit(MD_RECOVERY_RUNNING, &mddev->recovery);
>> mddev->sync_thread = md_register_thread(md_do_sync, mddev,
>> "reshape");
>> - if (!mddev->sync_thread)
>> - goto out_free_conf;
>> }
>>
>> return 0;
>> diff --git a/drivers/md/raid5.c b/drivers/md/raid5.c
>> index 5d57a5bd171f..9b2bd50beee7 100644
>> --- a/drivers/md/raid5.c
>> +++ b/drivers/md/raid5.c
>> @@ -7677,8 +7677,6 @@ static int raid5_run(struct mddev *mddev)
>> set_bit(MD_RECOVERY_RUNNING, &mddev->recovery);
>> mddev->sync_thread = md_register_thread(md_do_sync, mddev,
>> "reshape");
>> - if (!mddev->sync_thread)
>> - goto abort;
>> }
>>
>> /* Ok, everything is just fine now */
>> --
>> 2.31.1
>>
>
> These changes look ok, but the error handling logic seems to be freeing
> the incorrect thread, not the one that these functions create. That's
> independant of this change, but seems odd. If someone cares about it,
> it should probably be looked at, or if correct, a comment would be nice
> as it's really confusing.
I don't think this is confusing. raid[5|10]_run() creates two threads:
first mddev->thread, then mddev->sync_thread. If we fail to create the
second thread (sync_thread), we free the first thread (mddev->thread) in
the error handling logic.
Thanks,
Song
next prev parent reply other threads:[~2021-04-30 6:10 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20210421130105.1226686-1-gregkh@linuxfoundation.org>
2021-04-21 12:58 ` [PATCH 040/190] Revert "ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()" Greg Kroah-Hartman
2021-04-21 17:54 ` Rafael J. Wysocki
2021-04-27 14:50 ` Greg Kroah-Hartman
2021-04-21 12:58 ` [PATCH 041/190] Revert "ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile()" Greg Kroah-Hartman
2021-04-21 17:54 ` Rafael J. Wysocki
2021-04-27 14:50 ` Greg Kroah-Hartman
2021-04-21 12:59 ` [PATCH 081/190] Revert "tracing: Fix a memory leak by early error exit in trace_pid_write()" Greg Kroah-Hartman
2021-04-21 13:29 ` Steven Rostedt
2021-04-21 13:33 ` Steven Rostedt
2021-04-21 13:51 ` Greg Kroah-Hartman
2021-04-27 12:00 ` Greg Kroah-Hartman
2021-04-21 12:59 ` [PATCH 119/190] Revert "tty: mxs-auart: fix a potential NULL pointer dereference" Greg Kroah-Hartman
2021-04-22 5:03 ` Jiri Slaby
2021-04-26 17:03 ` Greg Kroah-Hartman
2021-04-21 12:59 ` [PATCH 120/190] Revert "tty: atmel_serial: " Greg Kroah-Hartman
2021-04-22 5:18 ` Jiri Slaby
2021-04-22 6:47 ` Richard Genoud
2021-04-26 17:04 ` Greg Kroah-Hartman
2021-04-21 12:59 ` [PATCH 121/190] Revert "serial: mvebu-uart: Fix to avoid " Greg Kroah-Hartman
2021-04-22 5:25 ` Jiri Slaby
2021-04-21 13:00 ` [PATCH 134/190] Revert "md: Fix failed allocation of md_register_thread" Greg Kroah-Hartman
2021-04-28 5:46 ` Greg Kroah-Hartman
2021-04-30 6:10 ` Song Liu [this message]
2021-04-30 6:34 ` Greg Kroah-Hartman
2021-04-21 13:00 ` [PATCH 181/190] Revert "dm ioctl: harden copy_params()'s copy_from_user() from malicious users" Greg Kroah-Hartman
2021-04-27 16:58 ` Greg Kroah-Hartman
2021-04-21 13:01 ` [PATCH 187/190] Revert "ALSA: control: fix a redundant-copy issue" Greg Kroah-Hartman
2021-04-21 16:30 ` Takashi Iwai
2021-04-27 13:57 ` Greg Kroah-Hartman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=14DC41E8-99F5-491A-93EF-598D10E381FE@fb.com \
--to=songliubraving@fb.com \
--cc=gqjiang@suse.com \
--cc=gregkh@linuxfoundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pakki001@umn.edu \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).