Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp541960pxy; Wed, 21 Apr 2021 08:54:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzXbNQ5AeiamNYhhbiVDdU41KMmVPDu0T6qm99PiXiJYFHL9Zb1mnfeYMW59zIa7MQzwR+/ X-Received: by 2002:aa7:cd8b:: with SMTP id x11mr10743831edv.87.1619020465761; Wed, 21 Apr 2021 08:54:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020465; cv=none; d=google.com; s=arc-20160816; b=sCe8cDRGkBJEvMufT6iOq5s+z6wtgWU2eP951Z1qoQaWrM3QebtPlVXCIdH5kZn5Gu hMZG4MhpJRUA0uuQXRpm0mVRw/dtK1resXkSIizjFEipb8BYYURjgRWl/Uj0KzZx/+Ti gnd634fIjlbfnvN8vy8eWct80Zgdjv1CsetahRqbO+BhlX1eTdhKhjont1lYXE+Xck4m Ltw/abGRa4QW1RHzYyXPfb4vMSpWr2nGaSh6NDPqV4nj1YZnasxgDPvBjZUDJlcTCmLu ZxPYilPG5iacHUTcX86P2ZXCCTDI8Mhc32JmjOZ76HCIAgJdxdgGf/TicrkoolOh7sje IrPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=sCWd2QoOhmTcVXoA9mA8yNdl1JSpMrRasoU3SlbBvGA=; b=xZyUMkPypkB2cgDN+iu6Z/keAtmWpom6EsUyTNbnQbwwif6RiJkZ118FeMVhXEdz/v TB6vQcIckmX80BkCfNrJ9qJFoouv0CuR3+CsjVOvap7i78VjqpmVxyWrTMBJApJoIU1b PisAcmECYat29EAqY+XMfekMGCRzsybAF4dWbXBM5BPjLQxT5KKbedwVEN83itOBPL/+ BKdVoB7qR57hiTzeVf3igQ0w39VWXWh/U8x6/mAQpI48bZsUE8zM2c3TSiuTrVMBLdEn 3PV6MoeK7wNl657zNCcfkp1Q7/+78xGYgQsxoPJFYeIjK19FBEjA/0tOUNaFc0dTtyRx d9fg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=v0rYMu+i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ds10si2666032ejc.559.2021.04.21.08.54.01; Wed, 21 Apr 2021 08:54:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=v0rYMu+i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241271AbhDUNH6 (ORCPT + 99 others); Wed, 21 Apr 2021 09:07:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:46176 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240488AbhDUNFw (ORCPT ); Wed, 21 Apr 2021 09:05:52 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2AD776143B; Wed, 21 Apr 2021 13:05:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010318; bh=ojQvf/A1spJ4WB9WSdcGXFWVoC+D29fj+3vCBlmlzQ8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=v0rYMu+iagqI4BlEp9p+2Jy//nFBx+xFHJg6TZRjksgR/9WtfSChjMJTMGyHuJObH /dG1FsCfWaIKK1PSyfkBQi+mlYpZOFbKtoqduKjgt0MjtVmRrM0F6gIb/4BfwmMKCf 9xjITKYFfSERiyAkAT5eS/Td617ehqLNy0wJIE4s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Sebastian Reichel Subject: [PATCH 092/190] Revert "power: charger-manager: fix a potential NULL pointer dereference" Date: Wed, 21 Apr 2021 14:59:27 +0200 Message-Id: <20210421130105.1226686-93-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 75cf4f5aa903604e1bd7bec2c0988d643c6fb946. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Sebastian Reichel Signed-off-by: Greg Kroah-Hartman --- drivers/power/supply/charger-manager.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/drivers/power/supply/charger-manager.c b/drivers/power/supply/charger-manager.c index 4dea8ecd70bc..f34c07ffcfe6 100644 --- a/drivers/power/supply/charger-manager.c +++ b/drivers/power/supply/charger-manager.c @@ -1749,9 +1749,6 @@ static struct platform_driver charger_manager_driver = { static int __init charger_manager_init(void) { cm_wq = create_freezable_workqueue("charger_manager"); - if (unlikely(!cm_wq)) - return -ENOMEM; - INIT_DELAYED_WORK(&cm_monitor_work, cm_monitor_poller); return platform_driver_register(&charger_manager_driver); -- 2.31.1