Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1243563pxy; Fri, 23 Apr 2021 03:50:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxG4Xf29fbKgGdbszIeT88iQEOr76zuiIZ9VQuz2ceomXX38SlEhDtjpWKdNDvq/irpsANU X-Received: by 2002:a05:6402:4308:: with SMTP id m8mr3708463edc.209.1619175030561; Fri, 23 Apr 2021 03:50:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619175030; cv=none; d=google.com; s=arc-20160816; b=DfgvHr8JB11jPSGKVUe92uNqLlq3ZUEEVBR8vE7gSzvmkk8h8EUdy5djpToF21QXa7 jw9iDbPaZ4FOnQDc/uQYmvuSSYYk9j0g5PUFPuakRqQiOy4nEE5XxhTIpQqG0lt/oYHc mYVARGrjmlOEIOG3N54eA03k07QNVlCzJj5ptWJwN6rDW+63wpXc3Ad+2fU44fdLYk/3 RVAakf4I7YbS5LUZRGZGluDDx8jirv5qcWZsp4zgxIYdgTha0xJRghVR01tV72N6wKDz Iwfb3/37Ghvv6dExDADdLX8QxRUIhup+oT8tNhbV/7/dJlXzwdlMoaHNp+OVFDAmTOOX KLYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=z3W8Y+bdcT590UIoeJkPZmIhE4d5WHkACqIS3vHhHp8=; b=UWMHAI2ZCegjQPFG3ds4V+q6MpSpT7NMA3bhxxMoWmEKPCjuElsC+MeKM7TNzlu/Pu RJMpGv8b9YFdV51mT0FLRm64nwLW43sl95zi0a3q/OfnsFQY+Rg2qxo5Oa8Em2BSI8ms YbbtVDHDGolqfkjE+GF6oAnOAW1pgFPQH3prwtRmEkGkXtPyl+7NOq8FsRcYx5AcQ0Xu C/83bEYcS/tKQC9BQwQlB5oscORKpi9kUew7cdgT1CD0POO35UZCXmD5/nxGtFisegrH EjHjksYwg7N0m8x8KbGMr9jtpqbJ5+m2RH/Vz+vySf1wNUkxdscAc6ea3Sv88pWMaMcc cSig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o7si4742095ejj.449.2021.04.23.03.50.04; Fri, 23 Apr 2021 03:50:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242180AbhDWKsn (ORCPT + 99 others); Fri, 23 Apr 2021 06:48:43 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:36448 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242162AbhDWKsl (ORCPT ); Fri, 23 Apr 2021 06:48:41 -0400 Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: eballetbo) with ESMTPSA id E9AFC1F43A37 Subject: Re: [PATCH 025/190] Revert "platform/chrome: cros_ec_ishtp: Fix a double-unlock issue" To: Greg Kroah-Hartman , linux-kernel@vger.kernel.org Cc: Qiushi Wu , Mathew King , Benson Leung , Rushikesh S Kadam References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-26-gregkh@linuxfoundation.org> From: Enric Balletbo i Serra Message-ID: <8825f20c-7e58-c44e-fa7a-bca811add5a1@collabora.com> Date: Fri, 23 Apr 2021 12:48:01 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <20210421130105.1226686-26-gregkh@linuxfoundation.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Greg, Many thanks for the patchset and notice us to take attention about these patches. On 21/4/21 14:58, Greg Kroah-Hartman wrote: > This reverts commit aaa3cbbac326c95308e315f1ab964a3369c4d07d. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Qiushi Wu > Cc: Mathew King > Cc: Enric Balletbo i Serra > Signed-off-by: Greg Kroah-Hartman I've reviewed the patch again (also double checked with people involved in this driver) and I don't spot an obvious issue with the original patch. Without it, on error path, the read-write sempahore used, will be released without having held it before. So it's IMO a valid fix that would have to be done the same way after revert. Please don't revert it. Thanks, Enric > --- > drivers/platform/chrome/cros_ec_ishtp.c | 4 +--- > 1 file changed, 1 insertion(+), 3 deletions(-) > > diff --git a/drivers/platform/chrome/cros_ec_ishtp.c b/drivers/platform/chrome/cros_ec_ishtp.c > index f00107017318..d4f41d68232c 100644 > --- a/drivers/platform/chrome/cros_ec_ishtp.c > +++ b/drivers/platform/chrome/cros_ec_ishtp.c > @@ -677,10 +677,8 @@ static int cros_ec_ishtp_probe(struct ishtp_cl_device *cl_device) > > /* Register croc_ec_dev mfd */ > rv = cros_ec_dev_init(client_data); > - if (rv) { > - down_write(&init_lock); > + if (rv) > goto end_cros_ec_dev_init_error; > - } > > return 0; > >