Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp543454pxy; Wed, 21 Apr 2021 08:56:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyVq/I5lKDdjLExGPhbSI0RRCCXTJcpLAJi/PdQvtCJlX+I2PbG65gVhrNkwt30MFv1gbvh X-Received: by 2002:a17:90a:280e:: with SMTP id e14mr12057956pjd.4.1619020595428; Wed, 21 Apr 2021 08:56:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020595; cv=none; d=google.com; s=arc-20160816; b=vWMSJysORR4Bdy1PYtk0/k6En/tRFE2uI5GBW4QQmi6VbhO+82uGpVsWZ7S6PXLw6J pn47qzzpXf3++EcOHXVR3iSa+6FaD6dS4YEB49P5X1DK2j2wSG/PgmRLpffKKIDyAwpH YoWtXmI+8ga6sotR87a46M8Wf2mPC9RDjqLtmgy2XdbTU6OADRQOk4PYk4wl840xtPYb 8vOKpxszizyURsvruT1Haim6n/nCH43+tAElu8LCfzTyWfbt+K7HQ1wZcpLcjPHYKmUG 0/gw03tNobHxrySZyh19VIa9r/NuHt4QfL50YgzlJBM05ACsNBOEEircjVuIMTSDsIv+ SIeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=COBLvZc5ExjaREFPiivZP4rukfdZuwKokw1Etezzh3c=; b=e/m4eCWRJATEbFCVX/Hj5DyUuNKsnggGAlc4oaoRIVhiBck9l+eKmbyBxV0tzX1kkg nukPr38E/yNojHU3qQb32ehH6IVVh9LRLaa9mJOIBhy6mGExHPHWj/34/ihqFQPjjBnz yfs2nmrh/ODycwNi9Ja81dv+KE9c62t87/kzO3hdNlJ2DebqDgDkXuez8UY+TFD09zFq amu0XBrke5SFwXEjD6x9pnBgkdh0m/2GsAgxDe0NIPzhOSpZDIo4zU6L2GQQ9u4wTXSV Pw77EE/8DcE7ElXALdgvKOQy9CSNvFC9yzal4D6C5tsBpk551YkmqnreiLz2r3Lfm/jP b/FQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="TkWL9/ce"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n15si2961327pgh.315.2021.04.21.08.56.23; Wed, 21 Apr 2021 08:56:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="TkWL9/ce"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241529AbhDUNJG (ORCPT + 99 others); Wed, 21 Apr 2021 09:09:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:46758 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241024AbhDUNGf (ORCPT ); Wed, 21 Apr 2021 09:06:35 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 68A746145F; Wed, 21 Apr 2021 13:06:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010362; bh=0ZEwjABnJptGu2Z4uoQca2QnVVVB3eYxPhwHonNiRXA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TkWL9/cewR33KuS7gStJhdipIWU+f2aXT7FS5YV5B+hF8u3U0jA4YgwJXP3JrnjiA eBeKD8OfGmcqtq3JvO+Kr2Zqj1iwy06eIOnEooDuyZTCAGgly+12hgQqmBKBhXA/u9 kR54d01qoJVplf6f2aLg94wK0mQsMfl8MvAsEL0g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Geert Uytterhoeven , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 073/190] Revert "media: rcar_drif: fix a memory disclosure" Date: Wed, 21 Apr 2021 14:59:08 +0200 Message-Id: <20210421130105.1226686-74-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit d39083234c60519724c6ed59509a2129fd2aed41. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Geert Uytterhoeven Cc: Hans Verkuil Cc: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/platform/rcar_drif.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/media/platform/rcar_drif.c b/drivers/media/platform/rcar_drif.c index 83bd9a412a56..1e3b68a8743a 100644 --- a/drivers/media/platform/rcar_drif.c +++ b/drivers/media/platform/rcar_drif.c @@ -915,7 +915,6 @@ static int rcar_drif_g_fmt_sdr_cap(struct file *file, void *priv, { struct rcar_drif_sdr *sdr = video_drvdata(file); - memset(f->fmt.sdr.reserved, 0, sizeof(f->fmt.sdr.reserved)); f->fmt.sdr.pixelformat = sdr->fmt->pixelformat; f->fmt.sdr.buffersize = sdr->fmt->buffersize; -- 2.31.1