Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp547405pxy; Wed, 21 Apr 2021 09:01:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJymN8tdGqspR+bFJn65LDvisOg2huiQo1W8H3DEBpqP8WGjiT9Q2OjICngtHShTUinQDr8V X-Received: by 2002:aa7:934f:0:b029:25f:35d6:a1ed with SMTP id 15-20020aa7934f0000b029025f35d6a1edmr16508942pfn.1.1619020902063; Wed, 21 Apr 2021 09:01:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020902; cv=none; d=google.com; s=arc-20160816; b=0b1NJwnUuFpCPyJnHKVA3aDnoCpmYJ2dQYGECRx6g2kEClxUaXdFUjQS9D0OeVFqWg hMd6f8y3B/+YjXSS6qI2kYb34IfuiIhhM8T1ZlVfbtOTAh9Tc5QwxfyUkPmg+eRdQmG3 wacLT38V55c6US5kkh1nx6quurg2ojO8bdBHRqbE416MGRdymQZtglsruwhitFUZhO+5 BjvIvwondlzlupoXlhfw4rC63FABAsSTRp/0kf4xW9Na8LRYoYuXiaZAxynqMIX3xKLV zF5rnjYSHo8cMr+TWme2IFG6MpgOXbLlrK4E2tiypzMjuKjNIZbzYksKH+re9xeLUmTp n9ow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=/4DJXCRvwAG6Q2iVLZLtEoyqvCmt42TUMB1wQ/9TGGw=; b=GX/RyOd+4jG2aI+1U1pTd23vZR6IDLPvdfRkU0LWW8R8V3Oqu4lcmdBJDmKMGFOJEr X23mfU8sy0X4MejwtxsVfRU4NJ1ypRzSOH/nHc6KB+qmUArIYqs0OIyf2O0XaOz1QoTw bezTJOFEROQ28pRTYqd7hH5c4NvBweV+ZII8n6jHa/y2vESJWdHizjev3iEqzii1D7/N FOC9Ef5K6G/BjBG1WeVg981dN1SPZ4XdXo0UsU6RQS74qK9Xt299BFU+4mAN7q3kh1vm uuDS00txYrLmzy7EJySGseQ2spx8irflkDVu8BSBHrJ4p6uKGoHPpn+d2stUOYJPF3sv lr8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=E5bnp02G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ck4si3124547pjb.55.2021.04.21.09.01.28; Wed, 21 Apr 2021 09:01:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=E5bnp02G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241198AbhDUNIc (ORCPT + 99 others); Wed, 21 Apr 2021 09:08:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:46576 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239604AbhDUNGV (ORCPT ); Wed, 21 Apr 2021 09:06:21 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C2DFC6146D; Wed, 21 Apr 2021 13:05:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010348; bh=91wwQTLszap9hlXYtl2ct8GpI7EFi+4sg4UwdtlKRDE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=E5bnp02GnUSFDs64DlVp9wlIYIR2YmGeRBMgtnVoDRNi/ZIEcSTgsirWdGHOOFTHD eQsROKJYoV4bcDIn6uzsJhq3I2V9uG0uBaR6jf6wjHn0t6srE9H9xv9KlFpNPq/PR9 t04ynQb2W4vUr94IvAExUamzHNv5TACuT6wZGwI4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Philipp Zabel , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 102/190] Revert "media: video-mux: fix null pointer dereferences" Date: Wed, 21 Apr 2021 14:59:37 +0200 Message-Id: <20210421130105.1226686-103-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit aeb0d0f581e2079868e64a2e5ee346d340376eae. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Philipp Zabel Cc: Hans Verkuil Cc: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/platform/video-mux.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/drivers/media/platform/video-mux.c b/drivers/media/platform/video-mux.c index 133122e38515..a754e20850c2 100644 --- a/drivers/media/platform/video-mux.c +++ b/drivers/media/platform/video-mux.c @@ -442,14 +442,9 @@ static int video_mux_probe(struct platform_device *pdev) vmux->active = -1; vmux->pads = devm_kcalloc(dev, num_pads, sizeof(*vmux->pads), GFP_KERNEL); - if (!vmux->pads) - return -ENOMEM; - vmux->format_mbus = devm_kcalloc(dev, num_pads, sizeof(*vmux->format_mbus), GFP_KERNEL); - if (!vmux->format_mbus) - return -ENOMEM; for (i = 0; i < num_pads; i++) { vmux->pads[i].flags = (i < num_pads - 1) ? MEDIA_PAD_FL_SINK -- 2.31.1