Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4553213pxy; Tue, 27 Apr 2021 07:38:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZ1JYC2o72wqA39MCZ4YTSDFLuMt5YuOFrN9gbNPtptVWsNTs2sERnqJIjNvBEEaZE2+vu X-Received: by 2002:a05:6402:234b:: with SMTP id r11mr4773915eda.137.1619534284529; Tue, 27 Apr 2021 07:38:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619534284; cv=none; d=google.com; s=arc-20160816; b=U6nw5BZzMRyjn8UDUgb89MK4XZ4efHdjxgjSYDkvTYriBm0mcbCTJYeAEG3vmx02lO CDggmBAd66YoJH77P0yhjOhX+JmXBqjwZlZw0t8E7vINtlFrizHjk8JZVxtpf33vqIZz 2sRjubjeKqlAeEPyfdaaKmhXlBJjDbLt55ieUFiDs0+WjJlH95ibj01N+kdwcWOAt2Oh acpx1HWwTwgmAcD//uaGG9QFbzCHWJkfXhvIx7V/Ho2RPU7zcCduYCd4vz7C5I8qtXN1 gt61XxkXX7wephhhjs48keuF+SwqBPRcBNe8sKydmIhPkuU4CBxoSxNUS6L5osoqg5Ph oYSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=XC3Mya18b2Gb2fciGCeaDrkEFWRdtDezxRreOfz12UE=; b=g5D80bL33cZGNjAjiEC3dI8oCQNcleGTtOI0aZenqaz+2pxgMgzJU54reybvEpsC+e K6WdIsOmlI6Eyh8/DvlL4GB8/kZapTeKKVb3C1iU7reg4xBk1+cEyudl+jdBvjbCQayI L+CrJvvKSNrWj0rN8kQTlgA9p5USld4B/6zKkuRrAsPC+RMWNidWLqv4ioxTnfTPZPxh yPpBBq14HRfSA+QX46+y1efZEHc/soEcXdmJoKBCafCOyBIrY0GPp1xmAIyAVvdVBUCm +c2AY/LVl2xADaDKVjKqrUZ+XJfPAGaXVhT9YfP49z7gJlZ7OaVnVuGHEf8wniwL7wZ8 3s1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VapxSDZK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si2518261edc.376.2021.04.27.07.37.40; Tue, 27 Apr 2021 07:38:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VapxSDZK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236411AbhD0OhA (ORCPT + 99 others); Tue, 27 Apr 2021 10:37:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:47288 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236173AbhD0Og7 (ORCPT ); Tue, 27 Apr 2021 10:36:59 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C5A19611ED; Tue, 27 Apr 2021 14:36:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619534176; bh=yCETJJmxhHYww65mXkY6GWSNZ0gE6JoG/QlayrvFeEA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=VapxSDZKhIf2kIB5UaY6zoo2xKmKFzFLvQMPjV25vZT4bZxYKV9E/crU2CpjlCkQ1 /KlEbOB4dOVYpmuHc+zlJWvjOT6rt7xx/DI8HIAhOq8k15mvW8KOiHDvtVfdS+qKJJ rU38r+WeSrvgC9l04ompueCoTnkqwuYuy9dQGy8c= Date: Tue, 27 Apr 2021 16:36:14 +0200 From: Greg Kroah-Hartman To: Felipe Balbi Cc: linux-kernel@vger.kernel.org, Qiushi Wu Subject: Re: [PATCH 045/190] Revert "usb: gadget: fix potential double-free in m66592_probe." Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-46-gregkh@linuxfoundation.org> <87czummtnw.fsf@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87czummtnw.fsf@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 22, 2021 at 02:43:15PM +0300, Felipe Balbi wrote: > Greg Kroah-Hartman writes: > > > This reverts commit 44734a594196bf1d474212f38fe3a0d37a73278b. > > > > Commits from @umn.edu addresses have been found to be submitted in "bad > > faith" to try to test the kernel community's ability to review "known > > malicious" changes. The result of these submissions can be found in a > > paper published at the 42nd IEEE Symposium on Security and Privacy > > entitled, "Open Source Insecurity: Stealthily Introducing > > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > > of Minnesota) and Kangjie Lu (University of Minnesota). > > > > Because of this, all submissions from this group must be reverted from > > the kernel tree and will need to be re-reviewed again to determine if > > they actually are a valid fix. Until that work is complete, remove this > > change to ensure that no problems are being introduced into the > > codebase. > > > > Cc: Qiushi Wu > > Cc: Felipe Balbi > > Signed-off-by: Greg Kroah-Hartman > > --- > > drivers/usb/gadget/udc/m66592-udc.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/drivers/usb/gadget/udc/m66592-udc.c b/drivers/usb/gadget/udc/m66592-udc.c > > index 931e6362a13d..75d16a8902e6 100644 > > --- a/drivers/usb/gadget/udc/m66592-udc.c > > +++ b/drivers/usb/gadget/udc/m66592-udc.c > > @@ -1667,7 +1667,7 @@ static int m66592_probe(struct platform_device *pdev) > > > > err_add_udc: > > m66592_free_request(&m66592->ep[0].ep, m66592->ep0_req); > > - m66592->ep0_req = NULL; > > harmless, can be reverted and left reverted, I guess. I'll drop it, thanks. greg k-h