Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp550047pxy; Wed, 21 Apr 2021 09:04:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyj1v/est8WnCw5RPhcB4zbiuKtioHJJEvnZI0DkHcm5QyAU4X4LB9+hT0YdHovydOrLn2b X-Received: by 2002:a62:770e:0:b029:261:d9ed:fd6a with SMTP id s14-20020a62770e0000b0290261d9edfd6amr12379310pfc.75.1619021088074; Wed, 21 Apr 2021 09:04:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619021088; cv=none; d=google.com; s=arc-20160816; b=S43EGHnkPahfccXmukd537BjvwVMDrL8yX0HLMduEQSe/vQg42rGyDKOVk7yelBZ5A d1uq9DBCZ8W7a0TbGxVzgRQwSI5GZaxjhBFDdgUfg6JGoVljFF/ZVJ4ndtDNe/digSlv 2KGIUCx1/N6IGsCO1Y6YI0676+8n1ygCtXT61EvtIOGBTnFZscrhYrZ24YatYBujCM1z onpnDIEr9KcjIabYfS45tliYd/fzxEDbx84t4eGZhzzmsF0t81vnHpzkVKOU1+S6CizO Kfm4p1l0JZz78FHzRSBR4Uc5XzH3JVWAkr01Xe2rHs1Eg8r77OWf9bVw9IgMF2Mk9iBr LaFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=FQ8fs4HD8qiuNsgAzS5XttUp1aVtjnlFCAEDKwEzfWA=; b=p1dKSFz+Q5sh3u/glD0/pFZwtfyr89lkW0D6ci8uQRlvOkQZ7AUVjzkUos8SY46Qqg n/ikiw/Jt5TO1yiKCqZLzgvCe+fHv+m8cNppEdbp8jXJ+CscQ/mJM2jtgn6gjpG5XODf 1MxJxiSXn99yKCoVJpHbOUci4/+df8/V1gZDkK/cKZ/QEr88nSB6C+rloYFXklWYdmI7 i/gwy0tJA731T0G3MiunnDXkR5FvMJQJHz3ngyMNnyYIvkuTxPvi+YKQ/V2zji8TwLuM EpWs/VZvfqZ7+as3LJuH3TVM+49ImrJu30PWcuT+7/6wH9Do1RwujiWE/GHEDcBf/aXZ KHRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eZRBz5m6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z4si3375674pgu.473.2021.04.21.09.04.36; Wed, 21 Apr 2021 09:04:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eZRBz5m6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241846AbhDUNJ1 (ORCPT + 99 others); Wed, 21 Apr 2021 09:09:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:46346 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235456AbhDUNG6 (ORCPT ); Wed, 21 Apr 2021 09:06:58 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E533261474; Wed, 21 Apr 2021 13:06:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010380; bh=A5H84BYQVsP5HzrkIMZJRxI8oGI0GZQ58oRok65LThc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eZRBz5m6IBuf8DUnsFC2Av7ZjMBpK0hB2ka4Q2L3acP3hPmkaJFp4ZPWkShJGVFqH iWmqW9PHaKiXm0jF7AeZHoAI5AQkOWhflsJENYbxNWrS+XhW8em3B3NlX1UQbt5Z3z H4FmF7lDVJX0l6QDhKCTO4PvQPfIeEWRVS0+EfHs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Mika Westerberg Subject: [PATCH 116/190] Revert "thunderbolt: property: Fix a NULL pointer dereference" Date: Wed, 21 Apr 2021 14:59:51 +0200 Message-Id: <20210421130105.1226686-117-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 106204b56f60abf1bead7dceb88f2be3e34433da. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Mika Westerberg Signed-off-by: Greg Kroah-Hartman --- drivers/thunderbolt/property.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/drivers/thunderbolt/property.c b/drivers/thunderbolt/property.c index ee76449524a3..b2f0d6386cee 100644 --- a/drivers/thunderbolt/property.c +++ b/drivers/thunderbolt/property.c @@ -548,11 +548,6 @@ int tb_property_add_data(struct tb_property_dir *parent, const char *key, property->length = size / 4; property->value.data = kzalloc(size, GFP_KERNEL); - if (!property->value.data) { - kfree(property); - return -ENOMEM; - } - memcpy(property->value.data, buf, buflen); list_add_tail(&property->list, &parent->properties); -- 2.31.1