lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210429130811.3353369-1-gregkh@linuxfoundation.org>
Date:   Thu, 29 Apr 2021 15:08:04 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Aditya Pakki <pakki001@....edu>,
        Alexandre Belloni <alexandre.belloni@...tlin.com>,
        "David S . Miller" <davem@...emloft.net>,
        Jacek Anaszewski <jacek.anaszewski@...il.com>,
        Kalle Valo <kvalo@...eaurora.org>, Kangjie Lu <kjlu@....edu>,
        Mark Brown <broonie@...nel.org>, Qiushi Wu <wu000273@....edu>,
        Wenwen Wang <wang6495@....edu>
Subject: [PATCH 0/7] Second set of revertion of all of the umn.edu commits

Like the first set of 190 patches submitted here:
	https://lore.kernel.org/r/20210421130105.1226686-1-gregkh@linuxfoundation.org

I am working through all of the patches submitted by umn.edu email
addresses.  The remaining 79 set of patches that did not automatically
revert with git were looked at, and these are the remaining ones where a
revert was actually possible.  The other 72 commits did not need to be
listed at the moment as they fell into other categories (were already
fixed, applied to files not in the tree anymore, modified such that they
were no longer relevant, etc.)

The full report of all of this audit is currently being worked on by me
and other members of the LF Technical Advisarory Board, and will be
published when completed.

This remaining set of patches is to provide a public review of them, and
to determine if they are valid or not.  If the commit was valid, I'll
drop it from my list of reverts, if the commit was not correct, I'll
keep the revert and provide a "correct" fix for the issue as well.

The final set of "reverts of bad + correct patches" will be posted to
lkml and maintainers when all of this is completed.  Hopefully sometime
next week, but I'm not promising anything :)

Maintainers, if you could take a look at these and see if the original
was a valid commit or not, that would be most appreciated.  I'll be also
doing a review of them as well.

Thanks all for your help with this unexpected extra work...

greg k-h

Greg Kroah-Hartman (7):
  Revert "rocker: fix incorrect error handling in dma_rings_init"
  Revert "rtc: mc13xxx: fix a double-unlock issue"
  Revert "orinoco: avoid assertion in case of NULL pointer"
  Revert "ethtool: fix a potential missing-check bug"
  Revert "regulator: tps65910: fix a missing check of return value"
  Revert "leds: lp5523: fix a missing check of return value of
    lp55xx_read"
  Revert "serial: max310x: pass return value of spi_register_driver"

 drivers/leds/leds-lp5523.c                          | 4 +---
 drivers/net/ethernet/rocker/rocker_main.c           | 4 ++--
 drivers/net/wireless/intersil/orinoco/orinoco_usb.c | 3 +--
 drivers/regulator/tps65910-regulator.c              | 4 +---
 drivers/rtc/rtc-mc13xxx.c                           | 4 +---
 drivers/tty/serial/max310x.c                        | 4 ++--
 net/ethtool/ioctl.c                                 | 5 -----
 7 files changed, 8 insertions(+), 20 deletions(-)

-- 
2.31.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ