Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4515029pxy; Tue, 27 Apr 2021 06:54:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwpzAuTArF5DcT9m9Fy1osa/us7GgKRY1oCxlwdbnz8JmP8p+t9B6lfTckwWdcTuMZ3qqnb X-Received: by 2002:a17:906:5248:: with SMTP id y8mr23114007ejm.150.1619531688021; Tue, 27 Apr 2021 06:54:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619531688; cv=none; d=google.com; s=arc-20160816; b=Afko6biz74pdNhoDRbKtQVtiXJ+Xwa7/FJ1oa17LS9XblQTgMqSMxlp6BQXTvIzDp7 c9Ln6Bu3zt7pxFLs582/dLwdDi7FJYOQvGH8OzCmxYVihs/iAEZ4SnbuYzH36tZENbsa uRuoKx07HZbcSMuAI+5qfEk7AQdC5q1DeDh61PA0DC7EGwxVpxI30R6lbNdVFtAvVVV1 vjV2IpWVKk4UYHA/Q4hjUdaEnWzt2jK+wEDVTF3Y0oR2e5GmZnoRMyudT+y7FG4iblY5 YyXEoUhhmy6oWb6DyeTQRj1XC1mc9kEP3CWdLwUiEp3WBzAytndnXzI6aJ4vC+xIbA+/ PYQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=6Sba2t6CFlHIc7Z+D5yyAWP/QqQ7m8nQETNnq8sMsqc=; b=KK1NLV3Nt6p6Iewe7xfxYbnOwHwMYvOcGNjKUAgyunRCX0cKSb7XOpkvbfR2DN7GVR a3DEfXHYVYyy9ZIi5bXNPQ0jOoZXi009uziytSc5bf2S/ceMhV6c5FGwHlMUyXHJT9zh Bpn5zyQtaQYv8UIEXb+9wXWOK5oRLFsASLgPpOFxWFEcq9UOuOB0/VV/xNuFffnjQ+2n kQAE2kOyR1bnkO1h9C6XMoPyXTvazbSVRjK6YtEI3zmheSeb+eg9z881PMi+Ka+167b8 QBswUtFKdxSgEVCwqmE++PFtjr3eLo2atkwPp3+jcPMDI6fORHpcd/kz6/wwqriaG3wA N8hg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KdVtLwhN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hr29si15748925ejc.136.2021.04.27.06.54.23; Tue, 27 Apr 2021 06:54:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KdVtLwhN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236228AbhD0NyQ (ORCPT + 99 others); Tue, 27 Apr 2021 09:54:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:46714 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236074AbhD0NyQ (ORCPT ); Tue, 27 Apr 2021 09:54:16 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 131AD6101E; Tue, 27 Apr 2021 13:53:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619531611; bh=bdayeZlGT44icqqNC/aLu4vVwYiNwhseSegnyWX2UOY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KdVtLwhNpZXI1ycVOnSzgSu3T+JJs0Rj+T5Ae/CbCRthXGn5y1U3O6pBTS/l+BpVm KWO5nTJqSMLWq0qPl4fKrzqVdttM5Ye1QKE85sODQa2gO79prlMIubHEEB3jnJLme8 l7POCNtw9ExtogGh9gItFSoI1QUZcY/TCo/fY3Rg= Date: Tue, 27 Apr 2021 15:53:29 +0200 From: Greg Kroah-Hartman To: Takashi Iwai Cc: linux-kernel@vger.kernel.org, Aditya Pakki Subject: Re: [PATCH 130/190] Revert "ALSA: usx2y: Fix potential NULL pointer dereference" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-131-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 06:23:19PM +0200, Takashi Iwai wrote: > On Wed, 21 Apr 2021 15:00:05 +0200, > Greg Kroah-Hartman wrote: > > > > This reverts commit a2c6433ee5a35a8de6d563f6512a26f87835ea0f. > > > > Commits from @umn.edu addresses have been found to be submitted in "bad > > faith" to try to test the kernel community's ability to review "known > > malicious" changes. The result of these submissions can be found in a > > paper published at the 42nd IEEE Symposium on Security and Privacy > > entitled, "Open Source Insecurity: Stealthily Introducing > > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > > of Minnesota) and Kangjie Lu (University of Minnesota). > > > > Because of this, all submissions from this group must be reverted from > > the kernel tree and will need to be re-reviewed again to determine if > > they actually are a valid fix. Until that work is complete, remove this > > change to ensure that no problems are being introduced into the > > codebase. > > > > Cc: Aditya Pakki > > Cc: Takashi Iwai > > Signed-off-by: Greg Kroah-Hartman > > This is same like the revert#80, the code change itself seems correct, > but it's a pretty minor error path, probably no one would hit. > So, feel free to revert if it's in doubt. > > > thanks, > > Takashi > > > --- > > sound/usb/usx2y/usb_stream.c | 5 ----- > > 1 file changed, 5 deletions(-) > > > > diff --git a/sound/usb/usx2y/usb_stream.c b/sound/usb/usx2y/usb_stream.c > > index 091c071b270a..6bba17bf689a 100644 > > --- a/sound/usb/usx2y/usb_stream.c > > +++ b/sound/usb/usx2y/usb_stream.c > > @@ -91,12 +91,7 @@ static int init_urbs(struct usb_stream_kernel *sk, unsigned use_packsize, > > > > for (u = 0; u < USB_STREAM_NURBS; ++u) { > > sk->inurb[u] = usb_alloc_urb(sk->n_o_ps, GFP_KERNEL); > > - if (!sk->inurb[u]) > > - return -ENOMEM; > > - > > sk->outurb[u] = usb_alloc_urb(sk->n_o_ps, GFP_KERNEL); > > - if (!sk->outurb[u]) > > - return -ENOMEM; This leaks memory if the error path is hit, so I'm going to keep this revert as it it needs to be handled properly. And really, this code path is impossible to hit... thanks, greg k-h