Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4778924pxy; Tue, 27 Apr 2021 12:23:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyw8s67DRAllxRito1j+TBTf2nIG0Ehk1U763hlqXNRJw+fiYnlSyV8nQjgIpIBgmPIQ95b X-Received: by 2002:aa7:da8c:: with SMTP id q12mr6432392eds.80.1619551420826; Tue, 27 Apr 2021 12:23:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619551420; cv=none; d=google.com; s=arc-20160816; b=eU4T1+RcSpFb0Tym50g1Xg+PV9ISKdzYr2mUEHwOlnKkAg7gprXdg4vkubDMkXvbmg NK/jwl6UVDU4gTjCq2JTcm/KeJ2zO6QHHj6feBM9vwbZEGnI/0AkaQUNL+g+vZvQNxV0 XyIB6fBdbepzvjqR2/EufFLghH1P0L6pptSnD9jNXzc1eE5B/YFkWWTuOO6eVDdkJmMr 9aRBs2oUqzm3uAh0qoTs5JxhOuJThoQQUyRpkZY85iXBc0/xWil3JBdsjYd7eQW6G74e obRHAkzkgkSE54B9f62Fn1v8CdsS8oHEDzYu9Vr53SkEP/xozdyUhaV+xE9FBA2O9wPc +75A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=LY3gFeU1q8iFKq/jC5H7kixgFmtS9nXWZUQKza2+nQs=; b=u3cHOAC/JTG6B52xUpZaBE27ijtUafrZ92HnU8WZvZU7A74dZm1LRs8BjjHF3k9T2c XGHDPWYBLuCAz1U/Aw0ucXXIH7pPmfHi9re4YgxGDGVbFXkVIdHsqWifb2u/ZoIy0e04 xLjhhyDoA6Tu6xeS6nBSCvWG4Ah2wecXNLWUXgYw+LqdBST7ydekobVqqIh3WRtcLAvf CRGoL1MmpXwdHOFsxfGl6NNjDMbMkj2gy+B8RRarX+pEgZa9PclSmyAgYdkUN7Pr8wY0 ysjiqDV35giPtn1foMNNH4XFfFInkqQuU4WHnFdhtWbHMYDTvs2N/di7be6L8xn8AGBM dfIw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ejLPFi54; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v7si3973689edd.352.2021.04.27.12.23.15; Tue, 27 Apr 2021 12:23:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ejLPFi54; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236830AbhD0TXB (ORCPT + 99 others); Tue, 27 Apr 2021 15:23:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35220 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235563AbhD0TXB (ORCPT ); Tue, 27 Apr 2021 15:23:01 -0400 Received: from mail-pg1-x52b.google.com (mail-pg1-x52b.google.com [IPv6:2607:f8b0:4864:20::52b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1FB86C061574 for ; Tue, 27 Apr 2021 12:22:17 -0700 (PDT) Received: by mail-pg1-x52b.google.com with SMTP id b17so6038928pgh.7 for ; Tue, 27 Apr 2021 12:22:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=LY3gFeU1q8iFKq/jC5H7kixgFmtS9nXWZUQKza2+nQs=; b=ejLPFi54AqigD8xCtEcI/bn70WATJRYG2As1qBC+YuXQm1SWv9m/hdgTmS4XanEjDa HETTiVSvoPYLGmWkamYz8vD2hCsgq6UA08Quwf3V4hfiqAAFKfczCF5Q4cLDB7I0uJok 4QZgWpSJFOMS3zB+nE7AkDBWoirqoJka4Zhg7FYqrkU+Xp/ymomR10ZcbzEsdbdxkqwH RQPJUPC63PiEOAeeh+Du2ean63zb8FaKjsHoE2hfuZothOtvyZMOIMa+Ofi17rq8Nraf PdgSyfF5M6Xu4E2ZXQDga2ZCjH8TmPzoAnQ/aQWJ9OtfZTR6+GLV0dt45U8SgGzn6Rl2 GYuw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=LY3gFeU1q8iFKq/jC5H7kixgFmtS9nXWZUQKza2+nQs=; b=TOilWPBQUe4sYFp25ZLIsfdnlWSpWf/q/K8yDFEVAbu9CvxscgnjD2gbGj+vYmtrr2 ZtVa0q2KX4TafBw4Emyl9+4pykMCxwfIVYYqqgqRZ8D2bkR7y3fdG8aCHRi0aiSBsskD FCju/rLe9usZzhk3OQSR/QKaHtIEEZW8OjnwomCJ9UvJ1gKs+aUDS42G43lM4512c3ZC zNlz9Nz4kVdmoBGlpn9jND3iMFfrtgZAwOYtHrub3+kttRY1jugCmklBEZ25zBCrrfsg vs9dLFzdVXAZnyA+p3cuTcK/4+NrRLknOgHPCNHR52l57PoQgXCLx4K/BU7jKmXMxCoi AEkw== X-Gm-Message-State: AOAM5317/wYmGOt5eHFGRGzhUtKtuR4kM46ZfJhYfgYDK9MoRROKTNl8 r9RafQXS6x+pFgEAU9KzbU4= X-Received: by 2002:a63:e509:: with SMTP id r9mr23769212pgh.384.1619551336543; Tue, 27 Apr 2021 12:22:16 -0700 (PDT) Received: from google.com ([2620:15c:202:201:c54e:55f9:7bf8:7932]) by smtp.gmail.com with ESMTPSA id f15sm461778pgv.5.2021.04.27.12.22.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 27 Apr 2021 12:22:14 -0700 (PDT) Date: Tue, 27 Apr 2021 12:22:12 -0700 From: Dmitry Torokhov To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, Aditya Pakki Subject: Re: [PATCH 157/190] Revert "Input: ad7879 - add check for read errors in interrupt" Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-158-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 27, 2021 at 06:55:10PM +0200, Greg Kroah-Hartman wrote: > On Wed, Apr 21, 2021 at 10:03:33AM -0700, Dmitry Torokhov wrote: > > Hi Greg, > > > > On Wed, Apr 21, 2021 at 03:00:32PM +0200, Greg Kroah-Hartman wrote: > > > This reverts commit e85bb0beb6498c0dffe18a2f1f16d575bc175c32. > > > > > > Commits from @umn.edu addresses have been found to be submitted in "bad > > > faith" to try to test the kernel community's ability to review "known > > > malicious" changes. The result of these submissions can be found in a > > > paper published at the 42nd IEEE Symposium on Security and Privacy > > > entitled, "Open Source Insecurity: Stealthily Introducing > > > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > > > of Minnesota) and Kangjie Lu (University of Minnesota). > > > > > > Because of this, all submissions from this group must be reverted from > > > the kernel tree and will need to be re-reviewed again to determine if > > > they actually are a valid fix. Until that work is complete, remove this > > > change to ensure that no problems are being introduced into the > > > codebase. > > > > This one looks really OK to me and does not have to be reverted (unless > > Aditya will come clean and show the error introduced?). > > I'll drop this revert, but it isn't usually good to be calling printk() > from an irq. How else do you suggest we tell that something is wrong when communicating with the device? For these types of devices the communication is essentially unsolicited so we can't pass failure to a caller to deal with it (i.e. unlike USB there is no URB posted that we could fail and use as a mechanism to signal error to some other layer) and while we could invent "something went wrong" input event so far there was no interest in having anything like that. I'd suggest sending KOBJ_ERROR uevent when a device driver detects anomaly in the device it controls, but I wonder how systemd would react given past experiences with KOBJ_BIND/KOBJ_UNBIND. The message is ratelimited so it will not overfill the logs... Thanks. -- Dmitry