Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4554336pxy; Tue, 27 Apr 2021 07:39:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx44sM4+Y6oNJMkzxp5Iw8OakNOxFS2igfq9HMsgceI9I79rVdsu7LmleBO1aQkvOb5GuED X-Received: by 2002:a05:6402:2810:: with SMTP id h16mr4622452ede.107.1619534371709; Tue, 27 Apr 2021 07:39:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619534371; cv=none; d=google.com; s=arc-20160816; b=k3C8aZhaHO+dRGFuh75IoOvMoRb4Oi1IapyEIIAFsDhIth4npfTr28ShWm6nrSjXJj UNfScHGoc8u3wUCP3YrtM7h7yTViUKGzBsKIDy4bfOhjx4kD0yqVBmxHZcfvUMbJfsun qAsWF+ONzN9Dy5OO2uQvhmi3Wy7VY5rbP9mBsnwO6W0WAnuKIQxp8ibxP3/hC0H7Fn/O BsyeLSCSmdPkfTJrgMewnDgT95KtOQdqf5vgcp68I8Kj047eQYDmr0qxUNMXvR12EQh0 u/jyNMNvVhUeA9V/Y2mhjHezVdN1gl97S5RwXxfbimPe8C/1dwOHMnyMu2yWlpA4vqNn jknw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=lylpy5NdRnbx6JnNpwJo1aCw1WeWC30r/Z91yKeDGXM=; b=ez2NxxrhPcVYB1acjvg7neVxnGniGhjSIgCM8i0/gWnBiK5p+8VYor+Bo285H+3Fhr LryzawrDSZ+tdb7htenPJnO+7E+WMlGRA1drTM7TwDLykWwrn6Z5BTetoDRmvKJtb4dn Rry2XabzihzunzrnnQz1dr+SU/GKz9NsFhqotyPMZ8BkgxLc8fiy/rMpRJfTcr1BYGje s0GM6bpfKiUAp3HxLw0/2Q5OH29q2R4WtPm7OfACvpo8mIJDXDLduLIHBUmeMg4GcOGS kYtNvn2lNZmU/k2XeyuCcM49FJTJIVW9GtHCjMM3CjPVq6yZdd52/i2wRPEW0e4X3UDZ EB/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=2cXHPnHv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y18si2319ejc.232.2021.04.27.07.39.08; Tue, 27 Apr 2021 07:39:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=2cXHPnHv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237133AbhD0Og3 (ORCPT + 99 others); Tue, 27 Apr 2021 10:36:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:46886 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237035AbhD0Og1 (ORCPT ); Tue, 27 Apr 2021 10:36:27 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9E9E8613BF; Tue, 27 Apr 2021 14:35:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619534144; bh=/fvN8vpLjyyHB75xCBB5urvAmpxQrVr9UiO9JRE1l70=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=2cXHPnHvCRusN0alREtgtpfQAe7rqQDOLB3NQEOmOoId6mDAzv+qUOWk8cGJKVmwn qjg2f1E8vfnTntnhBLhbSHj4CAMkxqDUGUlSFot6Nmh8f89zREZeE5RFrYrxtqEiqN CYUtdbtpYj6e+TGcORM9LRB7wteo1vgZyHsf3cSI= Date: Tue, 27 Apr 2021 16:35:41 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Aditya Pakki , "David S . Miller" Subject: Re: [PATCH 140/190] Revert "isdn: mISDN: Fix potential NULL pointer dereference of kzalloc" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-141-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-141-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 03:00:15PM +0200, Greg Kroah-Hartman wrote: > This reverts commit 38d22659803a033b1b66cd2624c33570c0dde77d. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Aditya Pakki > Cc: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > drivers/isdn/hardware/mISDN/hfcsusb.c | 3 --- > 1 file changed, 3 deletions(-) > > diff --git a/drivers/isdn/hardware/mISDN/hfcsusb.c b/drivers/isdn/hardware/mISDN/hfcsusb.c > index 70061991915a..4bb470d3963d 100644 > --- a/drivers/isdn/hardware/mISDN/hfcsusb.c > +++ b/drivers/isdn/hardware/mISDN/hfcsusb.c > @@ -249,9 +249,6 @@ hfcsusb_ph_info(struct hfcsusb *hw) > int i; > > phi = kzalloc(struct_size(phi, bch, dch->dev.nrbchan), GFP_ATOMIC); > - if (!phi) > - return; > - > phi->dch.ch.protocol = hw->protocol; > phi->dch.ch.Flags = dch->Flags; > phi->dch.state = dch->state; > -- > 2.31.1 > While it looks like this commit is correct, it is not, as none of the setup actually happens, and the error value is not propagated upwards. So this is worse than the original code being that an atomic operation can almost never fail, and if it did, a oops would be good here, instead of failing to do something that the driver now claims has happened. So I am keeping the revert. greg k-h