Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp541917pxy; Wed, 21 Apr 2021 08:54:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwXfGVsLQeNemWkedGqfuZibE3spb/sCjlJjmzvwL3QGL09zDFY9VjX5+/ISj9mBqgseX8/ X-Received: by 2002:a17:90a:5295:: with SMTP id w21mr11804562pjh.94.1619020463242; Wed, 21 Apr 2021 08:54:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020463; cv=none; d=google.com; s=arc-20160816; b=dNtrRYEZAMXnBoELSZgPeNMI/JknNNfJWm0FlBxdalO9zqJf9TPz/SOR8AUt8FwqAf QspIMCfCbPQGhqYCxjk/7mlSgfaGj5VgL+5koYKBRRxtdsMUjVrKHCKxqpaInzOOiDqL cvPObQilvvtKqu7Tiz8RHxbHg9XLAdiFEf0dwZYYkMVK26sz3A6E1Bq8N823utc184Gu RK0iie7FTANpd7lstYV2j+GORrlXQ1A1G4VTwCs0UPzyEvwikPWArhLMYy5pGtsQhe17 MYbJpBUt0ct4Q57RwhsHc8br8vsmlOH0NqJpuklAe1uGox0k2rDTy6w7MjjvI5FKCUSl X2BA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=oXSlc7TxXaiER6PRro/gczkH6iyjZXl1F/Hy2fJKR20=; b=oVCBrTwdgsdKEBFWeAXjeQRCaId8i1xhdv4SIyvKvx/NzTI3DnJiSp0oJuhBo/l+RR fXAYL1V61OTCXi0v3uInMkqmwioToYPDjgHGzxBDlS3BtSPUYsEVDhqtjeYEKm35l/nW QdEtUvMuM/HzrrzIB+BBmA0LbGmsr+RAx7/Oi72Aq+GbJqSZrI7eDIdgi0Ip3+bMGsrW UMI5pcUpnX6lHy6OtaISyGto/+ou1e15/p0BIOY4eOZVPbD1tvjNBigCeptsuhh28TgS ibySualAqZ5C4+p4uEOvtrMNX1pSdLs9oYoy/Qxp7qvwyNCGtRWnjKfkifGwEtjr8yd3 osEA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CAnxi8kE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p6si2731043pfo.293.2021.04.21.08.54.11; Wed, 21 Apr 2021 08:54:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CAnxi8kE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241092AbhDUNIP (ORCPT + 99 others); Wed, 21 Apr 2021 09:08:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:47424 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239666AbhDUNGI (ORCPT ); Wed, 21 Apr 2021 09:06:08 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3C2D66145B; Wed, 21 Apr 2021 13:05:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010334; bh=g7T7F/HL29LRdez0m2U2NDAgyqKQOAAT6blQsVHdKjI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CAnxi8kEoIODQ6IPoolsHEfz5/RaQI3wB0rSPJ3RTh/kjyVIjyLdaZAn7969Bqu+q VulDNAFPGR7abmK/3syTM2Hga1K5XbAkLHb4FImW7WHQ4qDkdwZVvBHyMgGL7ish62 NE0fLTgRUep83Ogw7O3AC70sXyBPRoENRzWQx9o8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Aditya Pakki , Finn Thain , Rob Herring , Bartlomiej Zolnierkiewicz Subject: [PATCH 097/190] Revert "video: imsttfb: fix potential NULL pointer dereferences" Date: Wed, 21 Apr 2021 14:59:32 +0200 Message-Id: <20210421130105.1226686-98-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 1d84353d205a953e2381044953b7fa31c8c9702d. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Aditya Pakki Cc: Finn Thain Cc: Rob Herring Cc: Greg Kroah-Hartman Cc: Bartlomiej Zolnierkiewicz Signed-off-by: Greg Kroah-Hartman --- drivers/video/fbdev/imsttfb.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/drivers/video/fbdev/imsttfb.c b/drivers/video/fbdev/imsttfb.c index 3ac053b88495..e04411701ec8 100644 --- a/drivers/video/fbdev/imsttfb.c +++ b/drivers/video/fbdev/imsttfb.c @@ -1512,11 +1512,6 @@ static int imsttfb_probe(struct pci_dev *pdev, const struct pci_device_id *ent) info->fix.smem_start = addr; info->screen_base = (__u8 *)ioremap(addr, par->ramdac == IBM ? 0x400000 : 0x800000); - if (!info->screen_base) { - release_mem_region(addr, size); - framebuffer_release(info); - return -ENOMEM; - } info->fix.mmio_start = addr + 0x800000; par->dc_regs = ioremap(addr + 0x800000, 0x1000); par->cmap_regs_phys = addr + 0x840000; -- 2.31.1