Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp579378pxy; Wed, 21 Apr 2021 09:42:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxKjKpCVZ2D32kpOa0rLIVyAdYQMa5EILGWRep9ZOwAH4BS+ZRxHFVR1YbHFK1Xo/Tp75BS X-Received: by 2002:a62:1d8a:0:b029:24c:4aa1:ad01 with SMTP id d132-20020a621d8a0000b029024c4aa1ad01mr29718092pfd.27.1619023373336; Wed, 21 Apr 2021 09:42:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619023373; cv=none; d=google.com; s=arc-20160816; b=WVkRBSZe/RRSVLxrIYJ942fwM1ZewYXnysYZybX54J6YooCquLTG9uBpflVJ/FWCWq ugiISel2J7ns9vLGGbE7CDM/8XiRmppqX5MZ2h27GfA3viCaH6d4RbVsz0A3Uw/cRPn7 RbnhZOGxnQxy/t8DOOhWNhZptAgK0SbSo1HV1qoe8Sa+uDVCW5FZbZxi/tZ9qRZdaobo XTnAF1FCKMrtuMhDj1HpaDbCNoapm6B9FRxhraQMcCnpiFSFOheJP6GI/4ShxnVcFbZe Av+fnxWc8MiI9MqnnM+4nMX2l9o8zHPFqMZOwkDxAtng3M2YfS6/v3mvgy+N6JwyCO8/ 94WQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=fMJphrB+JRONcjTxYGOb86GinRjLTIhDEKSoajxtmlk=; b=cnHBMj2IWgFD/iPFndKZP47lY2tzssmE7MdgCDF110aQL1H0bIYB37rB4bUHVvfrTH l3vnpGjHvRQXYBKIx2TZimBClu3KXbAc71Z5zN+zEUWO2n1IrXVIkTalIHvtjnmg4hG/ nFPsyCFxZIIk7gBFvuHQDHjhhK1PwtxWyTL0Z0P8R90Via2IrjLsv5fZAKvRAYSWPRJ+ Mkru3y+4m0etmaZw+8hITfoqdtKAsss9QlZI17yqU+SoYtmdE4U/7UE7FbSrTvuPRwpB twh/++NUxDKj3GEo//mZjzdXI25mv32I3Ge/nT+YhciOY9huOGdtmLJg+AwPWARCDUhL mf6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vEt9ttEI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j11si1706pfc.134.2021.04.21.09.42.40; Wed, 21 Apr 2021 09:42:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=vEt9ttEI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239552AbhDUNLv (ORCPT + 99 others); Wed, 21 Apr 2021 09:11:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:47370 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240259AbhDUNJC (ORCPT ); Wed, 21 Apr 2021 09:09:02 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id D729361483; Wed, 21 Apr 2021 13:08:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010498; bh=+eSpDulGIXLB+9N7y1IDh61crDCGaP12XCiwBGfl7uA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vEt9ttEIFqBlC7knhOxC7x5Vokcqngg4dnQoaOprKDhsLgbOiMDlL4F612p+Jnp3W //wMoO9UGcgfptF18YkxBRPkV87i2EoegFGOp6cJshrC/ONVIeer7W2KxwupOSACJV PV0T2EscrGe8Ua/LUabc5WBOyoRMU8gXZFIgo7tQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Takashi Iwai Subject: [PATCH 159/190] Revert "ALSA: gus: add a check of the status of snd_ctl_add" Date: Wed, 21 Apr 2021 15:00:34 +0200 Message-Id: <20210421130105.1226686-160-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 0f25e000cb4398081748e54f62a902098aa79ec1. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Takashi Iwai Signed-off-by: Greg Kroah-Hartman --- sound/isa/gus/gus_main.c | 13 ++----------- 1 file changed, 2 insertions(+), 11 deletions(-) diff --git a/sound/isa/gus/gus_main.c b/sound/isa/gus/gus_main.c index afc088f0377c..b7518122a10d 100644 --- a/sound/isa/gus/gus_main.c +++ b/sound/isa/gus/gus_main.c @@ -77,17 +77,8 @@ static const struct snd_kcontrol_new snd_gus_joystick_control = { static void snd_gus_init_control(struct snd_gus_card *gus) { - int ret; - - if (!gus->ace_flag) { - ret = - snd_ctl_add(gus->card, - snd_ctl_new1(&snd_gus_joystick_control, - gus)); - if (ret) - snd_printk(KERN_ERR "gus: snd_ctl_add failed: %d\n", - ret); - } + if (!gus->ace_flag) + snd_ctl_add(gus->card, snd_ctl_new1(&snd_gus_joystick_control, gus)); } /* -- 2.31.1