Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4723459pxy; Tue, 27 Apr 2021 11:06:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwyNOGQE03t6oL8LKP2vdTDPDo/EXRXHD+vbapDOAd7PMWHpZmQmuMXo9k3OolfWrlnkzz3 X-Received: by 2002:a05:6402:254f:: with SMTP id l15mr6020461edb.189.1619546813721; Tue, 27 Apr 2021 11:06:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619546813; cv=none; d=google.com; s=arc-20160816; b=0Fa+zIl7O5dPcX2jIDDlHceoJIw+rPD7IPvfwx3Gylq9CI//RvYrF+I2Y8JDsZSWZx OVMhaWgx34FUUjXE8LLeEvU8dYTyKIsmvN7aWnIx4vsbgLG8PdZpbczuISe0DENVx2zT ID57kUdKf7smoxCeZHd7jxp2K3k6J3zECaU4HriyhJkPdVibk9qiYvNjrFf+shg2E1mx pHKXm5RdGWq7iDbVsVnSU03uA6njYsr5DR3FbOuymVyjmnOSk9yk6j0srmvZgWor9sh/ LHNFvmStsnEE24/AeA7C+szAB3xvgudQJdQ18zPK3Pq/zlXrLpLpeeUB1ITdPNLHbKTK bvCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=mDU7qOyIda2GdFeWtztJLR5SO2jU+hevtv/+t9U+5mo=; b=p27UvnDcn/pIxub3oucFxqakZ2FF73kGL4n64KLjS36/o1MEtX2QBiPMb79JjsTHr0 DuJldhw911qdak1hoesvBJ6uUrLScuVXXF6puznLPdjAynJM5S1g4UCC7y+tayildmJH UeKwjUseNMXqJV+S9tUlRvQnllfIrqJ8rkg/C7WvR9C23LPhpwN1Lnqoo/v/QkJC5loi DfDQtJsSBD77nqxdwnTqeFeJ+5qHwyT+GfVdldt+MLiHOHpDCFy6pl9/NNfRUC3Z9FBO zQYwykxbGof5mJ24nK/cvDQ5WEFIZ5IssXWp7f0M603Lh+z1/PPp47Y+OeolwYXDJbUh EIhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="GJBAnH/K"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w13si3111557edx.373.2021.04.27.11.06.29; Tue, 27 Apr 2021 11:06:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="GJBAnH/K"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236571AbhD0SFo (ORCPT + 99 others); Tue, 27 Apr 2021 14:05:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:34822 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230219AbhD0SFo (ORCPT ); Tue, 27 Apr 2021 14:05:44 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8A24360BBB; Tue, 27 Apr 2021 18:04:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619546699; bh=OR+iH4W1v5Kg3fqB0TVCptrknTXzGJeZlnHbGR9M0/E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=GJBAnH/K7UKb1y/Fa8vcjHMoN2hNO6zy2jV4RZct5Feua5n3F2HhZU5F0ux+3/B62 /IPzdujBzJWK4DYV1ZeLDBIO1eUMaYMCYT4mkagGr2z5kkvenPSUdG9E0Uux8NqIlo wMYMBwmhesdhKOMb19xsvacYC79RylFk4dH6NBhs= Date: Tue, 27 Apr 2021 20:04:56 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Kangjie Lu , "David S . Miller" Subject: Re: [PATCH 172/190] Revert "net: (cpts) fix a missing check of clk_prepare" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-173-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-173-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 03:00:47PM +0200, Greg Kroah-Hartman wrote: > This reverts commit 2d822f2dbab7f4c820f72eb8570aacf3f35855bd. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > drivers/net/ethernet/ti/cpts.c | 4 +--- > 1 file changed, 1 insertion(+), 3 deletions(-) > > diff --git a/drivers/net/ethernet/ti/cpts.c b/drivers/net/ethernet/ti/cpts.c > index 43222a34cba0..60fde1bb9665 100644 > --- a/drivers/net/ethernet/ti/cpts.c > +++ b/drivers/net/ethernet/ti/cpts.c > @@ -778,9 +778,7 @@ struct cpts *cpts_create(struct device *dev, void __iomem *regs, > return ERR_CAST(cpts->refclk); > } > > - ret = clk_prepare(cpts->refclk); > - if (ret) > - return ERR_PTR(ret); > + clk_prepare(cpts->refclk); > > cpts->cc.read = cpts_systim_read; > cpts->cc.mask = CLOCKSOURCE_MASK(32); > -- > 2.31.1 > Original looks correct, revert now dropped. greg k-h