Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4562765pxy; Tue, 27 Apr 2021 07:50:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwpVdOTONOCO7y0zw+jMapdwpffTv7/T0J398TUsKjDKjll3lLqEfihmxhQkQPX+9o59Nid X-Received: by 2002:a05:6402:440f:: with SMTP id y15mr4860343eda.145.1619535021653; Tue, 27 Apr 2021 07:50:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619535021; cv=none; d=google.com; s=arc-20160816; b=x4BbtA/5Mwl2amNN9P2EnPhuHPpUZgu2ge2+FrEdpCBXEaOqBlcJdUndFEUPemn9Cw TMS/LRWbaNRCGoxhVgt+D4K461zdNvQ9ja8By2fvOXqvHO8/yY8uAIwOnWDapktbsC/z YMIftb50JL7ehTPe51UId2HXnUEdv8UaLLMc+gpWPLNYXA4frezvsCyYK+F4A0y6vjJx qHYThGvuc+m3J5Fulh7nkEwR4qDdsLbjocTKfAsBY3HQ9J5Niy+kaaWuLCkM+goJ5kkp HbFD88hZY4ES/qJg0bs0W8f01BXSXK3ORd1j+lsOu4Tx8wDdTdy8qqasweQ23DJYj7QJ 8prw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Hhewrwxv4kFxeQ4/aRN7pOhXXqbtCbIg7SJDsHLSwSw=; b=nGS/ShKMA4bYBBimcQgu4Zk90kopbhj2yhKNkg2LKsCOKubeX9aJFGDj2k0wXeOaWv li2T3XbM3rCaRz7+8+c0VDRaThLITgw7nzcGQxAAJ9/LZyZGeLFbNmyou3oTxpv7vbtt y0VKNhh4D7fL5Dyyp8HdWhfYwJ7bAWxOyLfqRSjWWfeI1MP0HuZnnKrwzUfWjV/v4xFs PuJaoKAHpfSilGeo05kQN55KCJxy9UH+SRZ9Tk8g6FbKMF65iO0LelxGLQXRpVJ5lstC 7LS5zCnLrhxI0gffb057wbu8Zetti8sS4PO/QlR2zW2PyerqUHJY+XZPbwy6FBXzijqs ovaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="m/CgspFo"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m9si57399ejj.467.2021.04.27.07.49.58; Tue, 27 Apr 2021 07:50:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="m/CgspFo"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236928AbhD0OsR (ORCPT + 99 others); Tue, 27 Apr 2021 10:48:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:54272 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236144AbhD0OsQ (ORCPT ); Tue, 27 Apr 2021 10:48:16 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BD1526113D; Tue, 27 Apr 2021 14:47:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619534853; bh=cKkLQ95Je/QorK/a/rFq7G7ggV1k4FkpERCQAR3fLbQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=m/CgspFo7EeAJ/fv9C9XaqwjtBm6RNaiLXtmTKVnfHTSj6rBsSk3pxdV6/T/731fh SO4l19yaGtUhknZC68ZIB34lIwVe91KsjiFRWxXm5sgXAY7BaKveLuaarttQcoAK1j j53hv1PqKS4oQnCvGWqPoP3qjPFeFhvdAJ/mIfv4= Date: Tue, 27 Apr 2021 16:47:31 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Aditya Pakki , Sinan Kaya , Vinod Koul Subject: Re: [PATCH 162/190] Revert "dmaengine: qcom_hidma: Check for driver register failure" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-163-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-163-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 03:00:37PM +0200, Greg Kroah-Hartman wrote: > This reverts commit a474b3f0428d6b02a538aa10b3c3b722751cb382. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Aditya Pakki > Cc: Sinan Kaya > Cc: Vinod Koul > Signed-off-by: Greg Kroah-Hartman > --- > drivers/dma/qcom/hidma_mgmt.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/drivers/dma/qcom/hidma_mgmt.c b/drivers/dma/qcom/hidma_mgmt.c > index 806ca02c52d7..fe87b01f7a4e 100644 > --- a/drivers/dma/qcom/hidma_mgmt.c > +++ b/drivers/dma/qcom/hidma_mgmt.c > @@ -418,8 +418,9 @@ static int __init hidma_mgmt_init(void) > hidma_mgmt_of_populate_channels(child); > } > #endif > - return platform_driver_register(&hidma_mgmt_driver); > + platform_driver_register(&hidma_mgmt_driver); > > + return 0; > } > module_init(hidma_mgmt_init); > MODULE_LICENSE("GPL v2"); > -- > 2.31.1 > The original change is NOT correct, as it does not correctly unwind from the resources that was allocated before the call to platform_driver_register(). As platform_driver_register() should never really fail here, I'll just revert this patch and maybe someone, if they care about this driver, can unwind the mess here. Given that this driver doesn't look to ever be able to be unloaded from the system, failing the init call does not look to be a wise idea. thanks, greg k-h