Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4648168pxy; Tue, 27 Apr 2021 09:31:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxfsaJl36Styy7KeSLdTdUqxkXo08CCj9016Ow3fgLwch8PH3kKnmgwowm0YPZFMDH4jfOK X-Received: by 2002:aa7:cf06:: with SMTP id a6mr4401484edy.340.1619541070157; Tue, 27 Apr 2021 09:31:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619541070; cv=none; d=google.com; s=arc-20160816; b=sUJz0JaPOSFo68oIyhCsl/AAo7p97y0Xf6MkP4NM0C1kIX6BvpjizhSsSpcld+JlEt V81cZxbiA7++6m1Nzp7YNdv2yLa/6xj/EcLp1posQZl4H+aydWLbdYyQaSOtAVpeZCtP 6sgzvVCyck9WZ41UCG/Wnf6MZYVbCvdLwXwdfbeqCKbXI0A5088L9xS7K1boBRVx2/ZD NAEhmuP1YuJeL2b9AwVRc1hcq7DJN4wivDjdMXg7N9kvXzGXMPm6pqrjZk+mjU5p/EdT YqqA59hp/N2f4+28PkiRdtXyshogozOCQ7fzDd93nnJROC37pqDneyvJT8iKwfKDzzZM sTBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=H4poHYQx6V87nHTc+apJbIDUNg7WB0c4V/145OKeh+M=; b=gIMUI3xdIiP0MzI7oy96GI4fAZmUhJwhsb/YqLark0ySXIYdXCx9ividaU26hp8TK1 aSp5cQpF+APyN0mKGxLjODZ8zYCtmX2hLrKb6fXdG++UI9iiIioKNhVc3YHLGVzgWllX S7aVNEOP5ejEsJt9u+wZlS/JsFMGAMO2pnch1XJFTxHxxDxjJFEtyFP+0w/KnFxaDBuK T3Gwbu3P5r0p/UQlaQyQKr+ncxmMfloVBTbyuES4qjXfVe9UhpS2fabs3AP6otcwkgA2 U2mxu50V5eAAMpUIdSboMk7Bfw6if95AQovR/4r+NvRBisztf8itF9Y4dNeifwXGhwLJ 9UeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AhJCkWRF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j25si280192eja.247.2021.04.27.09.30.46; Tue, 27 Apr 2021 09:31:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AhJCkWRF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236581AbhD0Qaf (ORCPT + 99 others); Tue, 27 Apr 2021 12:30:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:56026 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236449AbhD0Qae (ORCPT ); Tue, 27 Apr 2021 12:30:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id D30F661164; Tue, 27 Apr 2021 16:29:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619540991; bh=eAWbwyuZVRSrNgRsA7ystpFYMZZBTdD7qW+SbId1/M4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=AhJCkWRFdUtl/kfmn5cL5RsC7fOiE7I6oAZYP8S2obw48iHbaEWEjOUfEGEv0SfpQ ViaGjD2IkCeZDtnSmv3Fm9iTp9WUxhhvj3OQAJ01WZqoupb2N/hxzadda4Itll6qSu FNpQ3pBh7D70vSUoNXKTcyx1UI5Y8iQhxlKaieNA= Date: Tue, 27 Apr 2021 18:29:49 +0200 From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Qiushi Wu , Mark Brown Subject: Re: [PATCH 042/190] Revert "ASoC: fix incomplete error-handling in img_i2s_in_probe." Message-ID: References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-43-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210421130105.1226686-43-gregkh@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 02:58:37PM +0200, Greg Kroah-Hartman wrote: > This reverts commit 25bf943e4e7b47282bd86ae7d39e039217ebb007. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Qiushi Wu > Cc: https > Cc: Mark Brown > Signed-off-by: Greg Kroah-Hartman > --- > sound/soc/img/img-i2s-in.c | 1 - > 1 file changed, 1 deletion(-) > > diff --git a/sound/soc/img/img-i2s-in.c b/sound/soc/img/img-i2s-in.c > index e30b66b94bf6..a495d1050d49 100644 > --- a/sound/soc/img/img-i2s-in.c > +++ b/sound/soc/img/img-i2s-in.c > @@ -482,7 +482,6 @@ static int img_i2s_in_probe(struct platform_device *pdev) > if (IS_ERR(rst)) { > if (PTR_ERR(rst) == -EPROBE_DEFER) { > ret = -EPROBE_DEFER; > - pm_runtime_put(&pdev->dev); > goto err_suspend; > } > > -- > 2.31.1 > Looks correct, dropping. greg k-h