Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp582587pxy; Wed, 21 Apr 2021 09:48:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxE1ryZSo+aWqBd+rLilCPYZ+c51oRyQB/lGai4IZayYsuXXblANrPFDBzKnJ2DFm1y8o7/ X-Received: by 2002:a63:e00f:: with SMTP id e15mr13955398pgh.317.1619023681403; Wed, 21 Apr 2021 09:48:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619023681; cv=none; d=google.com; s=arc-20160816; b=wc77uxv+ghgrfP42l9rSIGsuy3p7Kqr9ZTXk0oqBpc3NcAfBYc3OxZCu2Vs9EG7O16 mkJfX5jXlyMaidMSl0Uvgb4SNKyx4R7XxfY7jcNLryjVgslRQBlaO3VzUDwLjMGq+45q NszertjDG3a9YH0Mi8aW2ukHQxJUNc6yTAx4+FEYFwhqNPeN2J5lcacG4d5UNARid+dH oX5dmVyvRsoALpQcVSZK9rMUzj5a3Cusu2FBX+dT+NI9UTfZJy4YbFg+r5C8TqdwXk0c fwchWivoSStC+hEeQZy0dskeEsLHnj1OdIj/cHzjE4P3D9x9RdVGafaO2xuJrJ3NX7dP V/zQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=io+zJfM6lCLmUfhd6bKrsAIG2Ce7u5hHV79udJOHQR0=; b=IROJqZokGQTn5A0ok2As0Ef9u0UEC03u27kh69S+IHP0HX97KJA/KGU9zLcFLABddF k8eLkII6Ysi7Z9t9kcpf9lkTRlJ8NwjlWzF8eu7C19n5L3mGpL5RYWLiFU+4CBA/jZ/h LGr9VgMgHhfZBmZTGNBMLfOc+ApMUaw8ZzWyDmpPA3lSIi4aIrKzrOLsPbYkOCPcGH8D MrGZ91hlgyUNCkGF4g/oVjG1L1aVoYhaJKHFg1DfqU+zoAK7RNowhDkqwWiVWdIKLbDx MUoZTqqMGzxE/5Z4UXIoqHgRJi9aeTT/WYTtcaA2GUMeYsFPliPiVSm8XAMCR95sLvmk RkZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=J3E3Xsy7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si90211plo.388.2021.04.21.09.47.49; Wed, 21 Apr 2021 09:48:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=J3E3Xsy7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242179AbhDUNOY (ORCPT + 99 others); Wed, 21 Apr 2021 09:14:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:48828 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241930AbhDUNJe (ORCPT ); Wed, 21 Apr 2021 09:09:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B004661457; Wed, 21 Apr 2021 13:09:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010541; bh=Ou1R9w3f+npUv/Jrxwt8MJ0KDgjjFawshzKVNswysck=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=J3E3Xsy7ifCyq5glQ8+d4ZIGqTQDo+4o3Ws1E0H4MCwvD4y5xgH1GE63F4BmGZzSn hxueslXmRQx3YVG7jdV969fvp1RFmz9MNxnHRAk6dj1HvHXOUj1xNTZFcIz/s6Qfco p738DZMK2417mZMJL201DwhgaeaSa6rfkJnveQLI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Sean Young , Mauro Carvalho Chehab Subject: [PATCH 146/190] Revert "media: dvb: Add check on sp8870_readreg" Date: Wed, 21 Apr 2021 15:00:21 +0200 Message-Id: <20210421130105.1226686-147-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 467a37fba93f2b4fe3ab597ff6a517b22b566882. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: Sean Young Cc: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/dvb-frontends/sp8870.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/media/dvb-frontends/sp8870.c b/drivers/media/dvb-frontends/sp8870.c index 655db8272268..ee893a2f2261 100644 --- a/drivers/media/dvb-frontends/sp8870.c +++ b/drivers/media/dvb-frontends/sp8870.c @@ -280,9 +280,7 @@ static int sp8870_set_frontend_parameters(struct dvb_frontend *fe) sp8870_writereg(state, 0xc05, reg0xc05); // read status reg in order to clear pending irqs - err = sp8870_readreg(state, 0x200); - if (err) - return err; + sp8870_readreg(state, 0x200); // system controller start sp8870_microcontroller_start(state); -- 2.31.1