Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp547258pxy; Wed, 21 Apr 2021 09:01:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx5JUORElieAQTISX9zyYFHJYjyfjAs/sRh6HOqFpSvhZt2Pvs4ZHIqNTBPlOx888L8oov9 X-Received: by 2002:a62:784b:0:b029:263:9b6b:9e81 with SMTP id t72-20020a62784b0000b02902639b6b9e81mr8745653pfc.77.1619020893080; Wed, 21 Apr 2021 09:01:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020893; cv=none; d=google.com; s=arc-20160816; b=XURfBbmAPqBN+4j4Dwr4svfLfzrZ48Rr86MT5HJBl5VEvWwO+bOD5Rh+XyPWhHFKhD ZuR0MSeDfnYsJ7vUz+tt/0tvd3OOUBkcbkgTe6EweokOG1+T6wjwzq5Zlu8KzIZbskbj qs891xkWQIMwFygYx/0hK6tKDaRWb29HV77Gaoykp7LPXQm30XE24HBsRtxwsnvQgIfa 8oa65XrVRcsR9US7/ETkbUEX1AeCi3lj/HhH9M9LO6zQyZ5cz/7hk4p0UTIL2M5ezSG2 KM/3lRmy+njSozCrnPI8zEMAPbyB4LWqlp7GeCwjnoCCOzFsCTxk1e2Kd7vcufxivdwX fNng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=OJhmX7WNA3SwjpZpUpVejlnNmv9DNMO7i8wfFMEdZhg=; b=XEKhq6EC/so7x8xicvwCyMK1o5JGPb3RRFKTMhE0S63q23r0Hhcvj9nUllHMSiRX8m FA0QpouceDsFaVcn4r8QRIQ6ZK1m8gckFbplHWYAkB61R5RzROl4cBO2HtDIfCXM4NL4 DpnTwLapl6p5jDrBDHU1mddtHyq0mLkE4Q0mtKaQquT75eqPtMlfO2UMemrKJlrcoSzE oXYs/vVbDRI2eCiJjSBWx8nTVi/V+/rRWlXogn7GPIoxHM4607YmJ9RJTxSKm2GBafKH Eb+c6AeXI86zui9W21ePD1LYQotuoCnNnlXDklbm3u31jSx1NQnFdW8tmfPVqghyTRRJ 6n7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eAXjs9Sk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u5si3152961pgf.471.2021.04.21.09.01.20; Wed, 21 Apr 2021 09:01:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eAXjs9Sk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241398AbhDUNIY (ORCPT + 99 others); Wed, 21 Apr 2021 09:08:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:45702 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240759AbhDUNGQ (ORCPT ); Wed, 21 Apr 2021 09:06:16 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2E11761457; Wed, 21 Apr 2021 13:05:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010342; bh=juUxxHyTJNXY+DhWA+mtTWofbBqB/c0g4+Ki/KsCe38=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eAXjs9Sk9BPSZnVBD30gz9H01sud8IxcsrLofdFT7IwwO7iwzuJeT1Zx1mijzT8aE adS6XWX1WPWtIxr+fOxUWccFKqNUvXznhoEm9Q8zfhCaCFBC/p9L8wus6U0sKZzSt7 R/Grm8+iNaoQ/3UiX9DZHKXXVa8nSCQp5aKWJ5DQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Vaibhav Agarwal , Viresh Kumar Subject: [PATCH 100/190] Revert "staging: greybus: audio_manager: fix a missing check of ida_simple_get" Date: Wed, 21 Apr 2021 14:59:35 +0200 Message-Id: <20210421130105.1226686-101-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit b5af36e3e5aa074605a4d90a89dd8f714b30909b. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Vaibhav Agarwal Cc: Viresh Kumar Cc: Greg Kroah-Hartman Signed-off-by: Greg Kroah-Hartman --- drivers/staging/greybus/audio_manager.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/drivers/staging/greybus/audio_manager.c b/drivers/staging/greybus/audio_manager.c index 9a3f7c034ab4..7c7ca671876d 100644 --- a/drivers/staging/greybus/audio_manager.c +++ b/drivers/staging/greybus/audio_manager.c @@ -45,9 +45,6 @@ int gb_audio_manager_add(struct gb_audio_manager_module_descriptor *desc) int err; id = ida_simple_get(&module_id, 0, 0, GFP_KERNEL); - if (id < 0) - return id; - err = gb_audio_manager_module_create(&module, manager_kset, id, desc); if (err) { -- 2.31.1