Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1388601pxy; Thu, 29 Apr 2021 06:12:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwlgyrNVwv8VQO3JdgpVm/NzDehacMcThxmvB+wT43TO74phVNffr5MxhpzFFKROXvg4OyR X-Received: by 2002:a17:903:248e:b029:ec:b399:7d75 with SMTP id p14-20020a170903248eb02900ecb3997d75mr34696202plw.35.1619701921208; Thu, 29 Apr 2021 06:12:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619701921; cv=none; d=google.com; s=arc-20160816; b=dtpvuI3K5FMqhIK7bzifa3te+Xt6DRbVHP/ae0rLNdKlhn/nNPl6m/AeCrr7k+NKE7 NVUR71udx3VhryKD9HOe/l1s1ndrLxc4D562JHrrr2vQPYyDtRW/mPaCDyyVKFE4Bx+h gBKz2ROH/xQrKLnq9MJirRX8NuW56aS9LxIFJk4kY5MCRMySgpylGYVZiXH7q1C+bELU jl/zCi7/mbQsd4BcJWJBoUnJfV8JBfNQ7oCH7DFfx7xKubPsQ5unQ0kJ6+kADSz+aELg 0pZ0E05vhGkHILRIoOaHEyR2Ck42BtM+0nD76/NVzICX7tvaBcOImYuFjFGUx+0w2i3s QphA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Q2CUPzvXyiINo2PCAhdLm0Bb4+tr6gikPYABx2xhs24=; b=dP4ycTO9ag0IA6rNf+Iz2EvKhLHl8KcCwnNmGa3thzQaXx2FB41bGwBmVoMxwtzSWt R/o+kt5VaqPD577vo+E+BMsP3NmqmnmfolMX6+o6zseW1iAiXh645+ssbMqMD8LiAKCH 4+9d8Axi0KSyfjDaWNFdkBkKGAkCIib3J9+AX4GFFQy5Ai/ERe46kgzhUB9TP8bDzkXJ cmoG5KajxUtbpHoHzLyUkQRMGtPwgoPolnW56fqDU52GBCMiI1mc725Cj6aA8631VL/R AtiP2i7cei0sRGQ+tWS3B5i7Ycr6v2cU+ldbQXsgqxg2f9L5NMwAtlLBSw1tZgsUVSo+ g57w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=sr7OYTZX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x19si450342pgf.296.2021.04.29.06.11.45; Thu, 29 Apr 2021 06:12:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=sr7OYTZX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238948AbhD2NJw (ORCPT + 99 others); Thu, 29 Apr 2021 09:09:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:34518 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239283AbhD2NJW (ORCPT ); Thu, 29 Apr 2021 09:09:22 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 54F0861405; Thu, 29 Apr 2021 13:08:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619701715; bh=Qq6zqxXGnHN55zcsQq4PlqMEr8TPdjCE0M6HA3cwXfE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sr7OYTZXvEIAWBRGPXUeqqWsH8IyIjRLg75AMj/a9gUnnbTGy+KW/pTfdflT7Xc0t 3+Ji0/qAAGx8uGDSXywnjSvtgvEwl9F9AUA1KQzKzp6lBJXl+LyYnTem24+UzOC0KG C4JwaDhN8ul23U1kSccH8joP6SJR1dUFpurvt+jk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu Subject: [PATCH 7/7] Revert "serial: max310x: pass return value of spi_register_driver" Date: Thu, 29 Apr 2021 15:08:11 +0200 Message-Id: <20210429130811.3353369-8-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210429130811.3353369-1-gregkh@linuxfoundation.org> References: <20210429130811.3353369-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 51f689cc11333944c7a457f25ec75fcb41e99410. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper submitted to the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota) but later withdrawn. Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Signed-off-by: Greg Kroah-Hartman --- drivers/tty/serial/max310x.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/tty/serial/max310x.c b/drivers/tty/serial/max310x.c index 8534d6e45a1d..a3ba0e6520a1 100644 --- a/drivers/tty/serial/max310x.c +++ b/drivers/tty/serial/max310x.c @@ -1518,10 +1518,10 @@ static int __init max310x_uart_init(void) return ret; #ifdef CONFIG_SPI_MASTER - ret = spi_register_driver(&max310x_spi_driver); + spi_register_driver(&max310x_spi_driver); #endif - return ret; + return 0; } module_init(max310x_uart_init); -- 2.31.1