Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp563496pxy; Wed, 21 Apr 2021 09:21:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyz6KgjMgr1ajTFaGDjLuRU6O+W+wZNJgCmiZyRyNExEmeI4OxtxFLI178RzxxB/W9SNkKu X-Received: by 2002:a17:902:f254:b029:eb:6a57:9d11 with SMTP id j20-20020a170902f254b02900eb6a579d11mr34465051plc.81.1619022085137; Wed, 21 Apr 2021 09:21:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619022085; cv=none; d=google.com; s=arc-20160816; b=RaHuaMIgfV+z/VC0FGB+WRdoM+BGX7sNKoKxXA/yf6vNIIzyg8SwOj312durQi1hnM IftLPcxN4Ag/rOD/QImjLqWFQlLFCEGAwxUsJh7xzqMetXga5pwbROlIzhnq5G6gOWEK VeG9FiQWRsNJ9eR8ivMRSvvXJLySe0HD1hm2qb6LA4/H9KDv5EsdrRED9kjwif39kzz3 geOJvh0yN1fd4scBay3cFzc1MlJ0W7+zv3O9HBKJ9qZ4jSLmmUjtTXXnDlfamQbkH2mQ 1uxVlNr6py9vd56Cj7VFQyjzgf3YiJ5mBxwezFopGqAb+kjPrdKvWiECsHc20nzvjlD/ dkWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Obh6K7DmmlD48/reY+YPznfQLYuycMS0qEk+n3u5lko=; b=r1Fv46lV73rdGOfaVDgBD9FGeypr5amoOqYQlvwe66GDaCbWbkybZGAQ2R9bDn1woi TPdx+ZuYk2tEJ2oTERfNyM1MqfZZuRRIg9irZptEmLLWGTmsFHc6p8hHbFmt7LYuHpr1 tQU/2UMmyhOg9fw83pEsTbmCCSVCmBaymUOZa1dOQePXWIsrDdoW/zO9xl/Tc/9qLzcV w8PiOibLgzv9fB7B8o63ZfVCE8l7dySpFB58FU5I9BRaRTylVsA//+u8sNsuC5z6Hbh3 /Z+YK0/VcnIv5mHySdSfdnreMmQhrVZaF3LoZ1ZOlNqZTgO+nBPJK7OkDO7ho5lHCa+r yMyQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="it86d/5U"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u22si27858plq.297.2021.04.21.09.21.11; Wed, 21 Apr 2021 09:21:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="it86d/5U"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242111AbhDUNLm (ORCPT + 99 others); Wed, 21 Apr 2021 09:11:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:46346 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241494AbhDUNJB (ORCPT ); Wed, 21 Apr 2021 09:09:01 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 667A461458; Wed, 21 Apr 2021 13:08:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010493; bh=LjRPFfaiBM794yDXhw61zjcLIyxr26zjVv2XqpLbM9w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=it86d/5UulW32oERWFxno7pOm38n8gW8KEiDuh4ZhRtEgMtaAjK6xVWPkQ5i/bJZk 7SkMtK/PtbUIQCjOrSlFhKOOGfLF45QrwoP+FaaZP2VvHLNGB5d+ZFUk9ng+VAQiNX 0MPvT/wczfb8j+togiF2/Pq+GZ/YvgKrPML0/PNY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Dmitry Torokhov Subject: [PATCH 157/190] Revert "Input: ad7879 - add check for read errors in interrupt" Date: Wed, 21 Apr 2021 15:00:32 +0200 Message-Id: <20210421130105.1226686-158-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit e85bb0beb6498c0dffe18a2f1f16d575bc175c32. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: Dmitry Torokhov Signed-off-by: Greg Kroah-Hartman --- drivers/input/touchscreen/ad7879.c | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-) diff --git a/drivers/input/touchscreen/ad7879.c b/drivers/input/touchscreen/ad7879.c index e850853328f1..8c4f3c193550 100644 --- a/drivers/input/touchscreen/ad7879.c +++ b/drivers/input/touchscreen/ad7879.c @@ -245,14 +245,11 @@ static void ad7879_timer(struct timer_list *t) static irqreturn_t ad7879_irq(int irq, void *handle) { struct ad7879 *ts = handle; - int error; - error = regmap_bulk_read(ts->regmap, AD7879_REG_XPLUS, - ts->conversion_data, AD7879_NR_SENSE); - if (error) - dev_err_ratelimited(ts->dev, "failed to read %#02x: %d\n", - AD7879_REG_XPLUS, error); - else if (!ad7879_report(ts)) + regmap_bulk_read(ts->regmap, AD7879_REG_XPLUS, + ts->conversion_data, AD7879_NR_SENSE); + + if (!ad7879_report(ts)) mod_timer(&ts->timer, jiffies + TS_PEN_UP_TIMEOUT); return IRQ_HANDLED; -- 2.31.1