Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp580074pxy; Wed, 21 Apr 2021 09:43:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSsuFmg0Ps019P0z82jszjPvnM/wTM4nZ2y9gawGnF/pO4TCXseR9GxlZeUvUaFafQu8Ng X-Received: by 2002:a17:90b:3887:: with SMTP id mu7mr11981133pjb.65.1619023438817; Wed, 21 Apr 2021 09:43:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619023438; cv=none; d=google.com; s=arc-20160816; b=gMSpc+qCorzkde0MhqilBLEdTcCnwRGypL/w4MKvX6ympzvjxsvmtyUEt9Nx/zoTR5 sJUbN4eAcCZBtYS/1X7KB4x9fcm1pc2tc9iquAVS6Qn/dpvJ87PhydKw4aauYbakIErp u/IBjAJNq7uBAPOGE+kKGC6rn7yGUCD5bGNuNjWU6z03931f5BRCv2UVhyOJjDY/E0vK jD4M1ScE1ZD7v7TTx1R2hnPEfyPVXvk1Q8L+Zhk8U0OkCi9z3oJxnZnLZAF1dtQCka2c cdxg1iNbnwIsIc4G9wVxQMBT+BdmEf7oUP1wvfLLZchR8ZmPgyY+rfyqbcKONlIDFEv1 6ftw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=X/2apUnciA3Viy//K9ZasnvyUQz/v/Mo7ooVnIMCJQ0=; b=ekVHA2MyxXmbvGLU8CVtM3/J+EWo508xUCVG3Nml10UfLrM+OSuMYuxZp3ycXJFEYC 2V4Vt447JTNG9UdLylkSO9UW5V8g2cF9YgPbeUbOs49RJ6Ve99XxhImp1mxXyjF3YgFW T8TYB2Pv+odhLt42wCUM3izpxb9E3mz1xHOQVtmxH+TA7LgkUSn2gDQ4sP155jI877m5 9a5trxvWBHZfxyyX/13VfBPQQ0JthLFbsGtY55dQMBaqp0ADLi5qpO3PE+sPbw6D5BWW n+ZvphQkRVjTw5wzI9p1Pr3REYXKTpJwfTGC2Iy6nWoHxFhry5lq31SnmUtUXNrVs9wW tSnQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fc1L71pQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b7si82493plr.271.2021.04.21.09.43.46; Wed, 21 Apr 2021 09:43:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fc1L71pQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240582AbhDUNMl (ORCPT + 99 others); Wed, 21 Apr 2021 09:12:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:47824 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241617AbhDUNJN (ORCPT ); Wed, 21 Apr 2021 09:09:13 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 658F86148E; Wed, 21 Apr 2021 13:08:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010514; bh=NL/FvtLF2xja/XQx0lXWzcV2m/s8o4G1C3XYDMvHdkw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fc1L71pQPurC+vc2ASVRU8Fka8a1td9UvEUyJcdlH2PIXVDu6Bhpq1DyBmLbNZcve miHnb94JXgqJ+sHzvpKtJi3ubDn9zDcxCHWt5ZkQXlMpSOhkc8F19HULovaqoSBtCe 2sNz6ykrLxvSSwkbep9ZZTnvMT4Smk7J71ovj76g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Jonathan Cameron Subject: [PATCH 164/190] Revert "iio: ad9523: fix a missing check of return value" Date: Wed, 21 Apr 2021 15:00:39 +0200 Message-Id: <20210421130105.1226686-165-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit ae0b3773721f08526c850e2d8dec85bdb870cd12. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Jonathan Cameron Signed-off-by: Greg Kroah-Hartman --- drivers/iio/frequency/ad9523.c | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/drivers/iio/frequency/ad9523.c b/drivers/iio/frequency/ad9523.c index bdb0bc3b12dd..91eb47e27db0 100644 --- a/drivers/iio/frequency/ad9523.c +++ b/drivers/iio/frequency/ad9523.c @@ -944,14 +944,11 @@ static int ad9523_setup(struct iio_dev *indio_dev) } } - for_each_clear_bit(i, &active_mask, AD9523_NUM_CHAN) { - ret = ad9523_write(indio_dev, + for_each_clear_bit(i, &active_mask, AD9523_NUM_CHAN) + ad9523_write(indio_dev, AD9523_CHANNEL_CLOCK_DIST(i), AD9523_CLK_DIST_DRIVER_MODE(TRISTATE) | AD9523_CLK_DIST_PWR_DOWN_EN); - if (ret < 0) - return ret; - } ret = ad9523_write(indio_dev, AD9523_POWER_DOWN_CTRL, 0); if (ret < 0) -- 2.31.1