Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp510408pxy; Wed, 21 Apr 2021 08:12:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyZXwdN0WRely9aCSRhkaGaKVEqGcEklZuohdqGIwJnE7uLVmZrS5uDZDda7+EUu5rb7shb X-Received: by 2002:a17:90a:f298:: with SMTP id fs24mr11957311pjb.129.1619017956107; Wed, 21 Apr 2021 08:12:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619017956; cv=none; d=google.com; s=arc-20160816; b=f9woGluzUa+LqfLdz5Bvbb1ciqKJ1gAdLVTv9ptTevKinqNsOlSMfET8GROrHrHz4K wbZ8Vi7FM4+sja6l6Hr4Mw6ob14E/PTdmiyZweuB6rfjbKQDtZRYLnhl526Vq1z2YbyH nTQ/qj2nZyVNHtDzoif04wWurXYRaHbayAaFb8bTLimXzc2bL+KV8OWSOiTOsf2SK7eQ lsve84hxJRVHIMJDCwqrJE0iP2h5EBXpK9UPdUGKEVWusmNprY8RkotXqNP3UeALsPea CjhAMCrwsUTIgjvMtJ5X5ewyQaIPDpRkMfMy/p83CHyQ/ozl4tIcBt/zgbeo7PC55zc1 XpxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=En0DYVgy6AHSnXPD88tUIcqagNsLgbupAOubt0UJ2wU=; b=p7oOXJVflUBbblkWzWz0B5YTRUN6jHcEQUm1pfpmeW1YWOXyxK6ALgZhmUN14q3DCr 3ZVoTAPYEGbe743x+Jsqos07WlMdf4FzogDykw8yURREYsRe59O45sDNLkR4sOWV+Jp3 yVQgBoThMG07Paypi5OD3SFlFn477KcOKrf15UaxdazHmFHL833KxaJ+IQztyoKIDC5d c1Coa4IsvvyrZ3rRl+OoZtdTK9zph/67yK4feiInvkh4pUGGozlEOI9CFV/ThaOeUb5t 9DrBQLR5ZpzExOiVpVhbM5OvI55ryISD1vtR8QGEfOly+b42lgbQqG7PAx4IehpvBy99 12eA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=n9Wk3Ea7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m17si2991557pgu.584.2021.04.21.08.12.23; Wed, 21 Apr 2021 08:12:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=n9Wk3Ea7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240645AbhDUNEy (ORCPT + 99 others); Wed, 21 Apr 2021 09:04:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:44302 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240612AbhDUNED (ORCPT ); Wed, 21 Apr 2021 09:04:03 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 42C696143B; Wed, 21 Apr 2021 13:03:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010210; bh=TvnieelAUSi/kput2ZUsThvUtBXN6s3HC7/1/YfUMGg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=n9Wk3Ea7B+86KF1Ny0YfMg1DfdhzeRJo0hftmURO542o59NIGau2KmNLZ3fAeQWhj fsr/8umMbsP3soqiJtRH6BitFluhnYVHJ5/jXotgz768oCIdgjizYOxjk1bdQ1SC83 aO46y//b3FbXqLvWAmjMH5uH4dTsIRviX4JO5KIE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 052/190] Revert "media: media/saa7146: fix incorrect assertion in saa7146_buffer_finish" Date: Wed, 21 Apr 2021 14:58:47 +0200 Message-Id: <20210421130105.1226686-53-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 639c0a5b0503fb57127fa8972208d43020a9bcf6. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: Hans Verkuil Cc: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/common/saa7146/saa7146_fops.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/media/common/saa7146/saa7146_fops.c b/drivers/media/common/saa7146/saa7146_fops.c index baf5772c52a9..c256146fd3b6 100644 --- a/drivers/media/common/saa7146/saa7146_fops.c +++ b/drivers/media/common/saa7146/saa7146_fops.c @@ -95,6 +95,8 @@ void saa7146_buffer_finish(struct saa7146_dev *dev, DEB_EE("dev:%p, dmaq:%p, state:%d\n", dev, q, state); DEB_EE("q->curr:%p\n", q->curr); + BUG_ON(!q->curr); + /* finish current buffer */ if (NULL == q->curr) { DEB_D("aiii. no current buffer\n"); -- 2.31.1