Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1419422pxy; Thu, 29 Apr 2021 06:48:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzLUD3D9mUE20jeSsduyq6hhQTCoAQDUzQolzLQ7g4AXdnsh8ejsn5JDdjdcXUDr+AOwnJr X-Received: by 2002:a05:6402:17b9:: with SMTP id j25mr1804255edy.378.1619704111322; Thu, 29 Apr 2021 06:48:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619704111; cv=none; d=google.com; s=arc-20160816; b=K4z9fRBOVOBnD9nZr0l/vg0wXEnthxVlMVElz70XqfocklvvYk3difMdG6PePxG6Eo bgON7ibBTaNuw4CMP9zACbxO2bKJ3ttPym4X+FqVBw8CwpISJ2Xv6vBbbkhQNQJcfEI5 CBN06K6kD1+Cgxt5gNsLciQN2DQQHzs0YBew9tBxlcpZSHNDbFyTvHKlMk2a4uBbPmPd 55gS/XuOHGyi+A+9ae5GKKL6thEy1vrak8zRedSI3GDkduCKoAgU6uBssG4RHyYNUAnl Cy68HKOBK9QzdHmTljbd5DbiZ0ToqYqtVWzPGXcjNXvm2tQRZH/5sKi81z7+H4EdGpXn Dz3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=3VlD8xmP5aKT1Ph5lVdbeXPZEkBK1eBb1xw+OWDu7UM=; b=ovK2B20k+mbTwIvWpuXeLMlmeEq7nawd+CWTzke51has/lwTMFX8KY2zH+WRhneA7j W3nCdVU3Bkq3UEGLRdjBHDcdL0lzEj2mF2ctd7mbPtMt3Ofk+EjzXjEucKi0u3qT7MUB LIhuJxbMIrUqVqr8ZLU0439DWdxsDNcCeOidT+rJahdO/L1ukxQJYAMdehr2XW7be2+e BVUQvw236H8m5wjDlRBqzkTSvCo2qrmpS98Bddmj+y0KXBQ0ofZOFmHsvzhtFuhZSOBr SGzWmj4Jw9dfcz4jaIZ/oYQ1OesPrf+DBlhNxFMq/xeNOBKBYY72SCO1dmSb1yGGh4+U Z82Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lMzeK9w3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w6si25379ejc.132.2021.04.29.06.48.03; Thu, 29 Apr 2021 06:48:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lMzeK9w3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234473AbhD2Nr4 (ORCPT + 99 others); Thu, 29 Apr 2021 09:47:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:42126 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232867AbhD2Nrz (ORCPT ); Thu, 29 Apr 2021 09:47:55 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5264D6143A; Thu, 29 Apr 2021 13:47:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619704027; bh=nEj5ApFsa05rNr3edqc+iuuZeqpPkKOq8myr5Uh93pI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=lMzeK9w35hZmAxzPn2Od8x3u6jOSa3X0AOjBnNPHhia2O/xtF4lsWufox79JtzPlZ k3wyGBpiKyb0ImfjYLsaKyMhezxWPtAf1+HcL1xDcfd8EEIJpun+stbebaqqanQB2p WX1gwRJCPCYuBYxVdIZl+WpKkZdoI7MmnBp/u4EQ= Date: Thu, 29 Apr 2021 15:47:05 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Kangjie Lu , Mark Brown Subject: Re: [PATCH 5/7] Revert "regulator: tps65910: fix a missing check of return value" Message-ID: References: <20210429130811.3353369-1-gregkh@linuxfoundation.org> <20210429130811.3353369-6-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210429130811.3353369-6-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 29, 2021 at 03:08:09PM +0200, Greg Kroah-Hartman wrote: > This reverts commit cd07e3701fa6a4c68f8493ee1d12caa18d46ec6a. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper submitted to the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota) but later > withdrawn. > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Kangjie Lu > Cc: Mark Brown > --- > drivers/regulator/tps65910-regulator.c | 4 +--- > 1 file changed, 1 insertion(+), 3 deletions(-) > > diff --git a/drivers/regulator/tps65910-regulator.c b/drivers/regulator/tps65910-regulator.c > index 1d5b0a1b86f7..8ad1ecc1559f 100644 > --- a/drivers/regulator/tps65910-regulator.c > +++ b/drivers/regulator/tps65910-regulator.c > @@ -1098,10 +1098,8 @@ static int tps65910_probe(struct platform_device *pdev) > platform_set_drvdata(pdev, pmic); > > /* Give control of all register to control port */ > - err = regmap_set_bits(pmic->mfd->regmap, TPS65910_DEVCTRL, > + regmap_set_bits(pmic->mfd->regmap, TPS65910_DEVCTRL, > DEVCTRL_SR_CTL_I2C_SEL_MASK); > - if (err < 0) > - return err; > > switch (tps65910_chip_id(tps65910)) { > case TPS65910: > -- > 2.31.1 > This looks correct to me, I'll drop the revert. thanks, greg k-h