Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp501083pxy; Wed, 21 Apr 2021 08:03:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxBMK80Wa4WX7+NNQUsfJFQgIB3EnNY4nHPXygHXgyPU7WVz1OgeJpYE4JsvzwpBa0hxkFg X-Received: by 2002:aa7:c2d4:: with SMTP id m20mr38566094edp.193.1619017384226; Wed, 21 Apr 2021 08:03:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619017384; cv=none; d=google.com; s=arc-20160816; b=qSC7u7S5OKWVCRN/V+oIBLJ/3GoE5o/j3SEgxd2uAxmvQh1JdZlovCjAfWccJeuGrC 4cpBpEY4d/CPkzE1s3gObAOWL52zqZgKri/rtnCnW1ieUQsmjCXXnt3ErJZJ7OOWcG/M ZJskzzkv9+A3siB4+2M8pksuO6sNGWZbrSOPr1XDby7Nh3+2mcBPuiS0bH1PkVwGLndA cysVBeMP8AmMX3a9DIM4Q6ACdK3ZYLKugVO9B6tXIEXt4u95NGK3Wo1OXtwoAPKnzXlL 2YXOUta0l6oXMtJUIrTZfihvWDwvVdcxk+z4vVVftSLpcta6+MbVtYqEvoDxjbwRyrju Gv/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=sH10adO1v8EhjrW83aECjgoVP7LGm3vPsKyBIfQ2lQg=; b=qmsaSCcqv/EeHZPUIkncmbF0iAAVD7ccWbufgi7GAwsnN5nO2+VFYkl2omC2Bj5A+5 BwYQO4I17b+mHXYy9dRCxWklHxxQJQKJ8qYWKqp6CkhCurnKuMJv98+qDCHNOy4Bt1sY zC7KBIt7pQmzIw7y9gMjAMGT4fP+RQ374HQMfmv8k4YEhN1O3kr2WcE4LKiiMyCjIhyy PlmCQhqee2AVXU9PeuXTNM3BTAe592MhS+OFfkILaMz5z9RaRs8hG9PZE0TZhAQb3zfz keqNKjfCoCld89khzFDZunpo5KyYUhOADjm0GYXndzTsseWJIgbW/VPAuF6ZEKi06z7r SpfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KzOS+wBI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i5si2162354edq.232.2021.04.21.08.02.40; Wed, 21 Apr 2021 08:03:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KzOS+wBI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240426AbhDUNDp (ORCPT + 99 others); Wed, 21 Apr 2021 09:03:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:42922 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240419AbhDUNDf (ORCPT ); Wed, 21 Apr 2021 09:03:35 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A64F76144B; Wed, 21 Apr 2021 13:03:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010181; bh=6KNhhR2mpSKu9WEJfspsrmutVxJbZI6kKM3yUMOLVcg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KzOS+wBIDFWoJe0Y69k0wsPHeKQBwJxFjBirCfYDdaokCF9ooch0hXPQSxezez3lJ LnRCSewP9u+aIDbPR7cih7H/s6xHontLaykDKD2XN1f0BjiszCNfcMcOwo8D2+kyFc dErf8lRrhQYOvASiBrttAnyQo97fducJ45+qDNLg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Qiushi Wu , Mark Brown Subject: [PATCH 042/190] Revert "ASoC: fix incomplete error-handling in img_i2s_in_probe." Date: Wed, 21 Apr 2021 14:58:37 +0200 Message-Id: <20210421130105.1226686-43-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 25bf943e4e7b47282bd86ae7d39e039217ebb007. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Qiushi Wu Cc: https Cc: Mark Brown Signed-off-by: Greg Kroah-Hartman --- sound/soc/img/img-i2s-in.c | 1 - 1 file changed, 1 deletion(-) diff --git a/sound/soc/img/img-i2s-in.c b/sound/soc/img/img-i2s-in.c index e30b66b94bf6..a495d1050d49 100644 --- a/sound/soc/img/img-i2s-in.c +++ b/sound/soc/img/img-i2s-in.c @@ -482,7 +482,6 @@ static int img_i2s_in_probe(struct platform_device *pdev) if (IS_ERR(rst)) { if (PTR_ERR(rst) == -EPROBE_DEFER) { ret = -EPROBE_DEFER; - pm_runtime_put(&pdev->dev); goto err_suspend; } -- 2.31.1