Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp491310pxy; Wed, 21 Apr 2021 07:50:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZTNXnup+X9cfQKkHXl/piHFOQLExZTaYdWXhAva9yKzg8968PlzKDjpe+QF47oJ9HIL5N X-Received: by 2002:a63:3757:: with SMTP id g23mr22161149pgn.422.1619016647622; Wed, 21 Apr 2021 07:50:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619016647; cv=none; d=google.com; s=arc-20160816; b=HBABs3EQ+Z7drlrth+WLKDhAlhuiw6EXwXsxwS/De6IecuHlTXTD913ouA09DUNXW6 mk9Il6go3TJgIUPA78f8QNhgoU3V5ExMF9VrqbUZDzLUTfaCeD7E9Ky2BnVwk6woYm0A dLmdJ5CaGU6ZUbQKzvVGFu/Yvyt9BsSt9O/a7+MMbrt4NjtHklVx3Gd0Xzwo+1pA7L+X G8QkIBiB8EAl8+HN7etTh2XPQB+evx0zJ8QH1Kn/Ic5hal+MEg4C4jF/Kie12Uwt7dBr rqlXKSyeP2hbf4LWyC2GeeLzVHvBNLnwOIGbEkUlOZIC7C1qs++ZpiKe7wbDbyzu0M54 zXaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=KJDhclLdgEPfcQx6DGKPzrHtfa53tvqzrO2JL0Cw5cM=; b=n53BA8XMmwLkoo4FloXFGw/F42WNEjsCHE0tNfhzxxcs1pAFNTFyKZikDHzY6ae7L1 xOXTuT1wzwoMRco2geYXqCKIz13BoTWPQDI1VnU/EGydYh1iYDhGdm17HWltGTKjc4/z Q2GBpwPg+/59bP9lOAf0KjzEC9RdrwIXC3upvw6N9YQEiGm9ytPVPYKM5Pyk+hxA2WtD DnVBCO8hmNOWoq3l4YtaQhmg7XAeK5ebJCs2KIqztzK+biJnnwCOydXx11UntVMejr6F XsTubTjhgGIacB/OQmbXMiK5EMNDhOA0EIbP9jaJ63hDDCkkxKgP2Ivg5+RT+qoHVN24 xo7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pLiYifn4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j13si2788633pfa.196.2021.04.21.07.50.35; Wed, 21 Apr 2021 07:50:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pLiYifn4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240317AbhDUNDV (ORCPT + 99 others); Wed, 21 Apr 2021 09:03:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:42690 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240291AbhDUNDH (ORCPT ); Wed, 21 Apr 2021 09:03:07 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5FEFC6143B; Wed, 21 Apr 2021 13:02:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010153; bh=EiZTgyQl+ARn1iDx6aVXJw59rKl3I3f9REJGSfz5s14=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pLiYifn46JIvkvTJiVCShMmWpOQH0YcSZi7YVdlJ8mMFsZOTaMoPxdzRYwSOOFEo0 WbV+bZXh5ffgerIOfJeff/+uhFVlmKJfJoHU4lwxRqqAAZvzRhmuGbqeFCiDzBIPPc pvL9J37/h32itcvqODNW8NZnKNwo8J1qIgfOS84A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Qiushi Wu , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 007/190] Revert "media: ti-vpe: Fix a missing check and reference count leak" Date: Wed, 21 Apr 2021 14:58:02 +0200 Message-Id: <20210421130105.1226686-8-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 7dae2aaaf432767ca7aa11fa84643a7c2600dbdd. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Qiushi Wu Cc: Hans Verkuil Cc: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/platform/ti-vpe/vpe.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/media/platform/ti-vpe/vpe.c b/drivers/media/platform/ti-vpe/vpe.c index 10251b787674..c7a0a7c19ca6 100644 --- a/drivers/media/platform/ti-vpe/vpe.c +++ b/drivers/media/platform/ti-vpe/vpe.c @@ -2473,8 +2473,6 @@ static int vpe_runtime_get(struct platform_device *pdev) r = pm_runtime_get_sync(&pdev->dev); WARN_ON(r < 0); - if (r) - pm_runtime_put_noidle(&pdev->dev); return r < 0 ? r : 0; } -- 2.31.1