Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp579925pxy; Wed, 21 Apr 2021 09:43:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzNOoEZ3cEDsGEaiFTOFziEE/EUd/T5oUnXqwrqNH9puT00R60gDOEzoTk9GK0TekYx7c4n X-Received: by 2002:a17:90a:db4b:: with SMTP id u11mr12071676pjx.154.1619023425992; Wed, 21 Apr 2021 09:43:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619023425; cv=none; d=google.com; s=arc-20160816; b=i4zfWjgTg1pvImFF1ZMXK2wubERBTll6mrG1hkrFR7K2uH1KOXUPruJ5dZBg5cD9aZ PN4zsAh9KBt6zb2FTPhCsysi2BcFEj9VyYr9vNUKX/97s7v6VryCiFVmTmwzheXXqDQ2 bA5dCE2+bHRVtBqfwuuHasEI5ZVRAG9oKStN1Sx9AwyYQ8BYW+oBFfwhbWduYoSNnnQ5 88oxygHtkCLNpfJSuVp4bqwEMUI9HHtWgZ5s2pobxXUf2K8SkU5DzYMHPo4CF5Ex/f64 0TfTbEkhRRRjFGL8chsqB7rj/BB73dsD/oBamC3sGCG1IIsQzzxy3S4nZJOzA/+0s3C0 J8RA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=KxhaFpGoyKK159C1TplmKI/2Tz83F1XMSzlZlYqxRdg=; b=YnARZ1xTZYDoYy2FSEseHzjVy2UvzuuosbbMCbdjfbdh8F2/03RbcI/IU++f3EuerE rLCmIPMZPvNqFG9MK06NP0UMuU/wYjXrmDfZrDQ66qPtYSfmGApzDSGSYjJTYYyrLftU aDanhSixxWN6wTNrr2oyJ+qYls6zo5K2ZfL5ijDUHEahyGvnZXPVm7PHibHJ9lzjvyjV i84sfBEP3j5bcFZZAepC8avIup1KXWT7Eb1dCxGVnfvUQ+oIq41t/nkxrqOqFhOcsjxo 32PYeLd1m6Zr4APnvNGQPwj6lKorPZTUpeAGCGVdGFPs4DKhTcKuASO9GNAsz5DE2Uh0 DGVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=BKEG5M5z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v63si2888938pfv.304.2021.04.21.09.43.32; Wed, 21 Apr 2021 09:43:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=BKEG5M5z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241533AbhDUNMT (ORCPT + 99 others); Wed, 21 Apr 2021 09:12:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:48880 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241571AbhDUNJJ (ORCPT ); Wed, 21 Apr 2021 09:09:09 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 21FC76144B; Wed, 21 Apr 2021 13:08:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010503; bh=BGH4gs/Sb4oEddOobnSfQ3BAzaHXyA0jcebArj3gFz0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BKEG5M5zanSGZbYEp7g7Q9aY6aHNjfcr3eSHkAa4pjjVweonbk3o4maqN5sK3YeLZ 4K18fgXdKgPMrXzoV7EP+Wmhu/ook7oTb7vXsTJFoVFxyoyhX0Gu6MwPfVcSjnuf1T 8uno6vY+K61LDaWOA9kPsifTq0o10BgyoxsgcwWY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Dan Carpenter Subject: [PATCH 161/190] Revert "staging: rts5208: Add a check for ms_read_extra_data" Date: Wed, 21 Apr 2021 15:00:36 +0200 Message-Id: <20210421130105.1226686-162-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 73b69c01cc925d9c48e5b4f78e3d8b88c4e5b924. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: Dan Carpenter Cc: Greg Kroah-Hartman Signed-off-by: Greg Kroah-Hartman --- drivers/staging/rts5208/ms.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/drivers/staging/rts5208/ms.c b/drivers/staging/rts5208/ms.c index 9001570a8c94..37b60ba1bdfe 100644 --- a/drivers/staging/rts5208/ms.c +++ b/drivers/staging/rts5208/ms.c @@ -1665,10 +1665,7 @@ static int ms_copy_page(struct rtsx_chip *chip, u16 old_blk, u16 new_blk, return STATUS_FAIL; } - retval = ms_read_extra_data(chip, old_blk, i, extra, - MS_EXTRA_SIZE); - if (retval != STATUS_SUCCESS) - return STATUS_FAIL; + ms_read_extra_data(chip, old_blk, i, extra, MS_EXTRA_SIZE); retval = ms_set_rw_reg_addr(chip, OVERWRITE_FLAG, MS_EXTRA_SIZE, SYSTEM_PARAM, 6); -- 2.31.1