Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp498718pxy; Wed, 21 Apr 2021 08:00:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwV9++92siVjrIZEURCRiDpO7IQhpO99gwDMp9Rww5HvuronZHH2qPN0R4iB2gJLpfFLFgq X-Received: by 2002:a17:906:4e93:: with SMTP id v19mr32603427eju.215.1619017238350; Wed, 21 Apr 2021 08:00:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619017238; cv=none; d=google.com; s=arc-20160816; b=Jh8yPTVJhiQYYd43kVbZd0cYu0Bb4/lgIacsiEGGEba9cSKBfgrwXKxiUZmbBIaJXc V3BjmhksdmDDYtbjCsvqD0WoNi2ox31DKxV/eSeyu3dNT+GxaoUlEk+aqy0PoTQNk3nv PdU8Zyihsgp8EEAvJGGjzThLy/Q20RoQc7/QRDLPpaQXIphq7pIlt5ekh36kjWC8zbWe XfjcT+4WbfMU6LW/r/9DQnvDdCGxuo4DyCWgpQc4jHjYofPGIpXKr2m6EAmt969OALmE Oo9WRB9PmOWZH+ilnejCrgEao3JCnXUZcKtHTlxv9KgGWOAVLwnNDz+LbalXMAdMgh9Y ykYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=udSmVBoeosd3c/5vgMmYVDtlo21MTzjaVe1AKx31xZA=; b=BbGcsHYxxJj+tNAhcEEPfvcU3i2S5xta7tsRoM0oDfnpIJrEIHguCJN1vBT6Mj+LjK RjFEQ+c5Vw7DgWHrky/B6MsmNAPmn+t0YkB8UpJtJ6ZhwJ6qFDOYbmhvNkrvCGQ6HPvw GNIxM2lbD5pVhT5TKwVGvnen+XbqjPxZi7aMgaANLks5EYq4K4gF9inXdnG5kWiFWcW9 Z/PxsEHMLuX5siw+BrXR3+Y7iB9o6/DWr2b8W8aAW31dz8ol6IzuXJ20CeA0QdKUFVW/ bQm+PQiuPV0BlFXsGO9F2VuaPsQFRw6yDMQmj4ft4HxqX19GaRPOQFegZZusBfwUT2BE wwzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=mqS9HnFq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hg20si1990829ejc.465.2021.04.21.08.00.11; Wed, 21 Apr 2021 08:00:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=mqS9HnFq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240387AbhDUNDY (ORCPT + 99 others); Wed, 21 Apr 2021 09:03:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:42374 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240278AbhDUNDM (ORCPT ); Wed, 21 Apr 2021 09:03:12 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 971EC61452; Wed, 21 Apr 2021 13:02:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010159; bh=JISSNLCRsICD+PQqMZc3EJeL6gvIu5lIH+NViGkjM4E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mqS9HnFq1Jo4JPZWqHu5SYKRNXgdyAqtAZH9ioGXuSx+9hnL4ZMWjFUvtuIvONDlW R9OGLcycbm0GrivqGtv/tdrEjka537L+NYfeL5xRI4rOP5Gol1Ok4tI4Y5KD54w6Qn hDlpYM/Fuc0ac5ye/06vX9SESNC8PS9zyt8TlE3U= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Qiushi Wu , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 009/190] Revert "media: s5p-mfc: Fix a reference count leak" Date: Wed, 21 Apr 2021 14:58:04 +0200 Message-Id: <20210421130105.1226686-10-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 78741ce98c2e36188e2343434406b0e0bc50b0e7. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Qiushi Wu Cc: Hans Verkuil Cc: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/platform/s5p-mfc/s5p_mfc_pm.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/media/platform/s5p-mfc/s5p_mfc_pm.c b/drivers/media/platform/s5p-mfc/s5p_mfc_pm.c index 62d2320a7218..7d52431c2c83 100644 --- a/drivers/media/platform/s5p-mfc/s5p_mfc_pm.c +++ b/drivers/media/platform/s5p-mfc/s5p_mfc_pm.c @@ -79,10 +79,8 @@ int s5p_mfc_power_on(void) int i, ret = 0; ret = pm_runtime_get_sync(pm->device); - if (ret < 0) { - pm_runtime_put_noidle(pm->device); + if (ret < 0) return ret; - } /* clock control */ for (i = 0; i < pm->num_clocks; i++) { -- 2.31.1