Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp421521pxy; Wed, 21 Apr 2021 06:19:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJznoeMa68izUvw4aHmqsVMKr01Pd0UfQ79x1m1tRjgjNrBY3526eWkWqpE4jFxlz5wR9N2J X-Received: by 2002:aa7:8d4c:0:b029:21c:104b:f6cb with SMTP id s12-20020aa78d4c0000b029021c104bf6cbmr28829995pfe.26.1619011168595; Wed, 21 Apr 2021 06:19:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619011168; cv=none; d=google.com; s=arc-20160816; b=Qj7TAZ8UDea5QJWKgfW/1Z+PRwmFMLdaheQGmxWMSb9k7EE0+FZyKqylwpcBWk6HyI hKOz5zAWa5KScy2wgVeSrdnpC8s9RQ/Poqdd2FJPEc9XYQNr6riPup5h/CoKUFNbjIBa NbpK1+rDhdUfU0o+5WQuCUfO7OEhE6cEAOQ2RZ2HanTn9wXgaaR1vBwy9DjJKkPALjBy IYw+/CUh1lGiOsmCTiClV9WuJSwtw6r/fFGpPvGRbfSJCRJK2tkrwO63vfhQF6jRvb7h jRfiTrsvB4CJsQHnV3I9PMv6IWxSjxGFAUHkz/v7jc4/mWugzalDx+Q4SiM9YO+bzo+Z rImw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=RxVdGlj58w4Sy9l6haR1fw2QJFgf1eSNqwlNXvzNfik=; b=r2stZNtHS9BG6gzq8So/D4D2PY7xHdj2QQND0Trici54Fxqp6QxXpOpGmy4cB/Kh/8 84QKxpS0ifktSUkpqAYwRys149FXo2Zia4eTttabwjlKrBC2a2gKNCoZl9Ooys9SAEU3 5GUtdIT9B3hkoXzpRyU6sUYQshGIh1chSuHBkRrNLcwVqke4NbAXF0rRjfeMSP305KyA VCbfnXzzmWPmsS+8emdLJo7i34v8BjTd1D7Z3SYA2x364WZTW8wJSNeCNLc5kSN60Lm9 xzhC3Yzj9JctbAzA0YMqnZ2WXQ436omcTo+N6AWu/U5ImWDAWwKEfcOU/MLDlLd/E0rD JAJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=o9t63TJj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h14si3011315pgn.82.2021.04.21.06.19.15; Wed, 21 Apr 2021 06:19:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=o9t63TJj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241500AbhDUNSJ (ORCPT + 99 others); Wed, 21 Apr 2021 09:18:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:49250 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241396AbhDUNIY (ORCPT ); Wed, 21 Apr 2021 09:08:24 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id DC2766144C; Wed, 21 Apr 2021 13:07:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010465; bh=0smudAQ2kY65xOvvC+YoieWAC/LJ1y76Yvn2nO1wstQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=o9t63TJjBUxhJ19d8XHbCAtuZU5OWj6NcPTFG+cfGwcBEiWIr/tLt0u8+ErfjD7zd ma+9dGuZmvHZrM4GYkDpLFVZfNivhNKxug8m3tWRXHgcH9AY5vDU+mEvX/uXq6ddIR 9vlBVmtiJpsh/RocDuYrZfDs/pWUdaWpYGtYK0U0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Andrew Jeffery , Bartosz Golaszewski Subject: [PATCH 111/190] Revert "gpio: aspeed: fix a potential NULL pointer dereference" Date: Wed, 21 Apr 2021 14:59:46 +0200 Message-Id: <20210421130105.1226686-112-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 6cf4511e9729c00a7306cf94085f9cc3c52ee723. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Andrew Jeffery Cc: Bartosz Golaszewski Signed-off-by: Greg Kroah-Hartman --- drivers/gpio/gpio-aspeed.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/gpio/gpio-aspeed.c b/drivers/gpio/gpio-aspeed.c index b966f5e28ebf..91d0fdf8469d 100644 --- a/drivers/gpio/gpio-aspeed.c +++ b/drivers/gpio/gpio-aspeed.c @@ -1231,8 +1231,6 @@ static int __init aspeed_gpio_probe(struct platform_device *pdev) gpio->offset_timer = devm_kzalloc(&pdev->dev, gpio->chip.ngpio, GFP_KERNEL); - if (!gpio->offset_timer) - return -ENOMEM; rc = devm_gpiochip_add_data(&pdev->dev, &gpio->chip, gpio); if (rc < 0) -- 2.31.1