Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp535395pxy; Wed, 21 Apr 2021 08:44:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyfTbC52/F0ppIqKbsCP1kEFO9oIUtP2T7Ce9jgsFOkI90M9go56u5SpvzVoKhiUAK4un+5 X-Received: by 2002:a17:907:3e27:: with SMTP id hp39mr34641000ejc.373.1619019862802; Wed, 21 Apr 2021 08:44:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619019862; cv=none; d=google.com; s=arc-20160816; b=fEpnxeLwG4xTsE+R0hKJkVfTpJPefEDF6Vsno25IYvKocYa1h99kvA7j7i/Nen5NV3 bFGkC5ai1egzrccdxTwIe3yOdNIPElW/BvDSV4gYlKTGODFjrOxm8rb+B1kYes5pH3BI aCExTVExqLq624vzsD+ShoUdpTRFGM7IuUOY4uFPi6qL2WohIutDNiO2BwMogHjHILb7 fYCGrmHzZhOV1Ct1aYN06HBU7D7qXAEz44eJQzO5/YKDQkYlR4gq/iX6jsaeb86iWYHY 4KxmDcLXkX6reMDQZhTu+axMTiyCIrMy5wpcE0zt9GoqTrFHtFDew14hohyKcTbi0Kyi zCMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=p2PVW66zzQuSfqEeQVQp3NL2Q5+0D3hSoCns9XgUh6w=; b=f4tPzhZBJVg9O962Qgs25cJ6SbC2B5HB7BdEiTLsgFg4m3mavd05cf5neNfjq0e12V h3l/YHlRLka8/OB9Y6XlioK/5pzPEW1SOnsbZD9Gd28C3sTZZ0yL3LW6IT6KwHtX+SQx Q8FqoOaD/qi+yPOi8BKvOxFKQKRn3ETMoPlzI4GPVepUzA8hDmCaTOgWmJrGXUMjh7aG /CaijrtDtIcxQNNsqJrhw9YSS2cHEBIATb3lAMq8iLE7b0lpVQuKa0wiw0Nfq3MlPsFV 1zgAyY02NRwYK6KGrtiyAtMdqTzWXHXmTRdw3Hm0QP4s0oYMv18Ds1/4ikkB4W4k94Rp YPRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dHxo48oJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x21si2098501eju.341.2021.04.21.08.43.58; Wed, 21 Apr 2021 08:44:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dHxo48oJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240617AbhDUNHZ (ORCPT + 99 others); Wed, 21 Apr 2021 09:07:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:46720 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236928AbhDUNFk (ORCPT ); Wed, 21 Apr 2021 09:05:40 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 63B3061454; Wed, 21 Apr 2021 13:05:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010308; bh=iSKulrRmBlFONhrKe+nLABavZ756490dIAbF6AGDErU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dHxo48oJQ1ok/+2GnofoO7pO93jqPA+Qlcg7e0uGKvxXEWa6KJ9LBh6b98treUzL9 VkyMJtk8tWtUMabjO3xBvV5Ci18z5t8yiZZitcZvDQB8v241UVM82L79aB7d1u/D8S t5WF35A+fg/4nKMptv2cCz/i32hGGsJU0eTrc+Tk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Laurent Pinchart , Ulf Hansson Subject: [PATCH 088/190] Revert "mmc_spi: add a status check for spi_sync_locked" Date: Wed, 21 Apr 2021 14:59:23 +0200 Message-Id: <20210421130105.1226686-89-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 611025983b7976df0183390a63a2166411d177f1. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Laurent Pinchart Cc: Ulf Hansson Signed-off-by: Greg Kroah-Hartman --- drivers/mmc/host/mmc_spi.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/drivers/mmc/host/mmc_spi.c b/drivers/mmc/host/mmc_spi.c index 02f4fd26e76a..cc40b050e302 100644 --- a/drivers/mmc/host/mmc_spi.c +++ b/drivers/mmc/host/mmc_spi.c @@ -800,10 +800,6 @@ mmc_spi_readblock(struct mmc_spi_host *host, struct spi_transfer *t, } status = spi_sync_locked(spi, &host->m); - if (status < 0) { - dev_dbg(&spi->dev, "read error %d\n", status); - return status; - } if (host->dma_dev) { dma_sync_single_for_cpu(host->dma_dev, -- 2.31.1