Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp588870pxy; Wed, 21 Apr 2021 09:57:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyCEFEoYbxTUhkB7OKI0r4u3iLMpY1+V/F+Nv0f3OJhQg9LquTGjNXdYA7DzyPIIxj4bEp5 X-Received: by 2002:a50:f395:: with SMTP id g21mr40526971edm.238.1619024231781; Wed, 21 Apr 2021 09:57:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619024231; cv=none; d=google.com; s=arc-20160816; b=VpU4jfxB4Xt0psityZI/wM/oY7bton2lV+d1OUi0vNwvNs2Obogj3BudtqPrX4yS6c EMRpms00fXWjhsxRv3AL3EFzO9desxAuahQ2vmtLvfYQbQ0UTY1n72IDyMlPjmdf238O jpR76tQUGEikc/tUW+hJoJXVAr3k1HygoTif6kY1okciUVnB1ejLt/VobLllIOC0t86+ A3aMjlOhFWJqW/V+h9u845x0ISDvzaFjcp4zexkGjlHIEBqqf+OD+tbXcm9SJ9kO0GoS neas2R7Fsrb/BYRijW8mb0kaoR+RVtx645LfxyT8ElY9UKzApDBq3wzngDbObKkBDlyj mn4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=gmBdGfaZHRTmyBy6DhPZupXouuxGWwXMydco2FiAQ50=; b=JYDX35kRajc9MKcGF62IHZzJ51CcfNNa6Jk9W4Zsq+mgl/hk0EuKMRaiclCMy72U6K 0A/utAu1qy14ddbBil2agcMbMyuhc7MgvscAQlHHpQ3g6bTUmAc30Gd8QQc5//1EQpgD Kh7ufGCZG47oiBaZSRj8MSJe8z4E6W3Ue8uX+uTZZTQfthOv8rUrFSNvkQ4UpkKWac3k alpGHng0/9FozQXuQ1cG/Ld1n52atOOTq6IFcm0MYkbNt1dsy5pEbpWaD8X/1fWaOfTu vVUGYizIL4n67uZXyzpvO6B0/oqq5vbezgQfqK/Uvetl6/QkNN9cquWHDDyB/vJHOuLr AXXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=03vnQbmB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h3si2169892ejq.357.2021.04.21.09.56.48; Wed, 21 Apr 2021 09:57:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=03vnQbmB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241786AbhDUNST (ORCPT + 99 others); Wed, 21 Apr 2021 09:18:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:49410 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241394AbhDUNIX (ORCPT ); Wed, 21 Apr 2021 09:08:23 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id AD44461467; Wed, 21 Apr 2021 13:07:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010468; bh=aUJWd+OylxRtW9cpzhgsQHFCpPm4R0a4bxN9pT391Vk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=03vnQbmB7OtCW90DgYhDoFU5+FgvaIv0DU5R5NE6TnQeTWc86GrmKLBW46rXbDLi2 vPFYyyhNkInikZKJoxRsNsawyvGo/2LtqbOKc6zn2NBtfL1KB6tqA5cdzeOIHty2T/ fYo3dfqrbvfuR5wHhDJUkiix0eSMWmrdksMt9oFs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Dan Williams Subject: [PATCH 112/190] Revert "libnvdimm/namespace: Fix a potential NULL pointer dereference" Date: Wed, 21 Apr 2021 14:59:47 +0200 Message-Id: <20210421130105.1226686-113-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 55c1fc0af29a6c1b92f217b7eb7581a882e0c07c. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Dan Williams Signed-off-by: Greg Kroah-Hartman --- drivers/nvdimm/namespace_devs.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/drivers/nvdimm/namespace_devs.c b/drivers/nvdimm/namespace_devs.c index 2403b71b601e..04f7cb7a23b7 100644 --- a/drivers/nvdimm/namespace_devs.c +++ b/drivers/nvdimm/namespace_devs.c @@ -2297,12 +2297,9 @@ static struct device *create_namespace_blk(struct nd_region *nd_region, if (!nsblk->uuid) goto blk_err; memcpy(name, nd_label->name, NSLABEL_NAME_LEN); - if (name[0]) { + if (name[0]) nsblk->alt_name = kmemdup(name, NSLABEL_NAME_LEN, GFP_KERNEL); - if (!nsblk->alt_name) - goto blk_err; - } res = nsblk_add_resource(nd_region, ndd, nsblk, __le64_to_cpu(nd_label->dpa)); if (!res) -- 2.31.1