Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp523614pxy; Wed, 21 Apr 2021 08:28:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw6BHPjpS5KxVlK9bZBx9ue5TyLwSY3OvrASDnUG44EW8DQ+1uk4XFEERqAEghZMyuR0hr9 X-Received: by 2002:a17:906:cc9b:: with SMTP id oq27mr33058445ejb.81.1619018896341; Wed, 21 Apr 2021 08:28:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619018896; cv=none; d=google.com; s=arc-20160816; b=Fa1olEt6IMjpj3NbhLqt9CWXjnX3x+C+3Q9g1g3vYKEBi5iZowkOMVqvvTJj6BQtqV mNmbNq6mSAfrcDx1OcVuLUKFK/BfkUU+OsbtbD4YO4j/kS5tQ3nSLrN5Z/pMmu1Lko5P TqMJrgnehXJrjoCRs4FCPG10hvDE+d2S/GiOT4jbJEvCFftYqULvfRThzU7Rs5ZJgwjU yJ0w2xFpe33cHxwSbjAO6ksZht5XQ2McKydGtR1F8++1Kxm0bY7Aumx2NEWoqDKFq8X3 G5meaxcTJQStH2OLBGnQNJTRX4e8r40zBGGNnt93YZkTLyY22R2ldI2td4giGLyObL8V wZLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=P4x8pjk5c4XPffQA/Nil6t18UF13Do1iCrZL137uEBY=; b=F9XV/Fae8tdai/Hvy2u5urONcJITyNGL9dnqYsOlgiX0FImaSFQOt7452aNIZI9xXe JLdIEZENCtet6RmW4zDHgQVs+abFdJjPIyc2j1FLCXqU2rvCovTMOZR5PPqf0mJFfJQJ cV1oLQWkRt68+aI3YmErqM8o+TYlYpyKC8xqiVekIO/M8UvwTi+wD9szoW7CqOZypFMZ fgondz6ucbbPUIocHj96wghZw9Us5ZfLGEyNw5f4ctCeN/0UlApNDrvzD8mWpoRhzCQg A+zvDFjEDnEd60WiiaTwUDr0KOy40mDm+RFgUyK0+Mj6qtlzUSIqIURgqmsdN6JIU4ZW rjjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JrRjzeJx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x22si2030583ejs.326.2021.04.21.08.27.52; Wed, 21 Apr 2021 08:28:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JrRjzeJx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240875AbhDUNF4 (ORCPT + 99 others); Wed, 21 Apr 2021 09:05:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:45348 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240737AbhDUNEr (ORCPT ); Wed, 21 Apr 2021 09:04:47 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A8EB861457; Wed, 21 Apr 2021 13:04:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010254; bh=6JK2ZvNg2y9/7AAfvM1HVUkKpJzy3wX25Nn0tJyAJ/A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JrRjzeJxe2ExtvomJnaMrGnHPU4KlIoQnj7VrERsdjH8m6mYzKdklgArdMk2iiEET /1GsI0U3J9fgGjRGfpiDizv8BdHN0QOepfjdmhFRZWLg+N62pyW9x1TPZWwxZ2aeVo 0T64gs/XkPLJBPN8d9ACFyzPmM4U7JW5YwQd9cYE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Qiushi Wu , Mark Brown Subject: [PATCH 033/190] Revert "ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt" Date: Wed, 21 Apr 2021 14:58:28 +0200 Message-Id: <20210421130105.1226686-34-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit c4c59b95b7f7d4cef5071b151be2dadb33f3287b. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Qiushi Wu Cc: https Cc: Mark Brown Signed-off-by: Greg Kroah-Hartman --- sound/soc/img/img-i2s-in.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/sound/soc/img/img-i2s-in.c b/sound/soc/img/img-i2s-in.c index 0843235d73c9..e30b66b94bf6 100644 --- a/sound/soc/img/img-i2s-in.c +++ b/sound/soc/img/img-i2s-in.c @@ -343,10 +343,8 @@ static int img_i2s_in_set_fmt(struct snd_soc_dai *dai, unsigned int fmt) chan_control_mask = IMG_I2S_IN_CH_CTL_CLK_TRANS_MASK; ret = pm_runtime_get_sync(i2s->dev); - if (ret < 0) { - pm_runtime_put_noidle(i2s->dev); + if (ret < 0) return ret; - } for (i = 0; i < i2s->active_channels; i++) img_i2s_in_ch_disable(i2s, i); -- 2.31.1