Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp177660pxy; Wed, 28 Apr 2021 01:55:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxGwNt/ZgS1uVAMRl9eI3fPyunfVCt1DinQPU7szdSEOuatuMq33Ommm8qg8wHulFPGtL4/ X-Received: by 2002:a05:6402:441:: with SMTP id p1mr9729726edw.298.1619600111350; Wed, 28 Apr 2021 01:55:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619600111; cv=none; d=google.com; s=arc-20160816; b=eAzxHm/nxmACmRMXeThA4zOzw1yPHUwWGsnQj1tfPE6l6kLfaaiuLFJZRVW2RLGbvg hR9Bs/JzjLYKYNJbM2Ehjqfl8yN8QY3HO06eodCdpTCdFN3iSMOCTGjlxryo71jPNIuY i7XQ1ngj7pnyZ7vH89868mKioU8acMb7gSMw1PK35o+UHKgfb1MiLXedxmVtA67/2mG5 NFRnOc8C3iaWjkCkJCi6BwKkx7/FZrONw5bFKmPh5MnOadtAbhNPA8fTocPLvwmIVtwr 8F7d4sLO1tFQ54wzk6FdnVYAjX5J8PD7G2pEL/TXfwk6tdMOTcLjteU7zy+uQk0U29RF Wx0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=st53IE7TxYx80ppHm3LEcwUQ+stzkzzo9gXsN2oC72E=; b=LplF6L3DS9pkeHeHOi3DzA+gpLVyl6EayCF3zitF/1K2pk/2X+hcOcseU4zmROFLkz eeg0269KFQtciCXWcXiV/UPWsFojP77ulGdkJrTqEop3FN0Rf4JBsFJsaoL9nWB9urgP jwe7bsGsIfXmB467sA7Xr6IOYQurnqmTCViIhO4FwJuqCS0MroYwwiXiJD0yU+WdeWqn HiGJtcrErWKBmyzn1/54RHxYAoXW+T4NEyozeRaUjjXmw6h/NhGKGtPhyHYhPJ8oMkHX GMjew12UfXC13Csz4BD8rrLuh+r4Es2ydtQ3lZxw/CuLNBQw2bBxEvCmQw8L4/Mu2Xpl q71A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IsbfUnhU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n6si2327457eju.670.2021.04.28.01.54.47; Wed, 28 Apr 2021 01:55:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IsbfUnhU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230525AbhD1Iyk (ORCPT + 99 others); Wed, 28 Apr 2021 04:54:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:42878 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229643AbhD1Iyj (ORCPT ); Wed, 28 Apr 2021 04:54:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C5D3D61407; Wed, 28 Apr 2021 08:53:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619600035; bh=hIpoZCyQYqJ1W4QWID6HiWD7AXuql4uvapgp7+4BJbg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IsbfUnhUi56l/pW+1emnqKZ+vju/MM6AynrMhbYN8Fogi2aHyTE4O4bhtRlZXBPz3 4ghzvY5aOY9Z6toKZs+9igsxyRdHHls4XpsIynOn9rjxEtAmDr/45JkNDNElsDgakB lkR4AkQfuopt7objZwosN7+XiuAxai33dxyoCJa8= Date: Wed, 28 Apr 2021 10:53:52 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Kangjie Lu , Philipp Zabel , Hans Verkuil , Mauro Carvalho Chehab Subject: Re: [PATCH 102/190] Revert "media: video-mux: fix null pointer dereferences" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-103-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-103-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 02:59:37PM +0200, Greg Kroah-Hartman wrote: > This reverts commit aeb0d0f581e2079868e64a2e5ee346d340376eae. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: Philipp Zabel > Cc: Hans Verkuil > Cc: Mauro Carvalho Chehab > Signed-off-by: Greg Kroah-Hartman > --- > drivers/media/platform/video-mux.c | 5 ----- > 1 file changed, 5 deletions(-) > > diff --git a/drivers/media/platform/video-mux.c b/drivers/media/platform/video-mux.c > index 133122e38515..a754e20850c2 100644 > --- a/drivers/media/platform/video-mux.c > +++ b/drivers/media/platform/video-mux.c > @@ -442,14 +442,9 @@ static int video_mux_probe(struct platform_device *pdev) > vmux->active = -1; > vmux->pads = devm_kcalloc(dev, num_pads, sizeof(*vmux->pads), > GFP_KERNEL); > - if (!vmux->pads) > - return -ENOMEM; > - > vmux->format_mbus = devm_kcalloc(dev, num_pads, > sizeof(*vmux->format_mbus), > GFP_KERNEL); > - if (!vmux->format_mbus) > - return -ENOMEM; > > for (i = 0; i < num_pads; i++) { > vmux->pads[i].flags = (i < num_pads - 1) ? MEDIA_PAD_FL_SINK > -- > 2.31.1 > This looks correct, dropping from revert list. greg k-h