Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp4349555ybg; Mon, 8 Jun 2020 05:48:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy3D2+pCXvXmVwgzclUQjirKWe9u6SWtBaXoz+4gSekHpM0cH07/NoHf59VukbJmO2PGa+n X-Received: by 2002:a17:906:1804:: with SMTP id v4mr20178369eje.104.1591620531108; Mon, 08 Jun 2020 05:48:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591620531; cv=none; d=google.com; s=arc-20160816; b=K0IFvlG84GlyWjNzowOhZrFdzFyNQZIWE7BkDQdt1e61p3hQthdJX8hHw2Wiqv0D8e KhN1q7SuLtQNHin9//B/Pjr6PkbdvoZUFocd26TfKSTXdDmfnktUnzi0tJ2hrrkGeO7r kzS3b7iWcxmpbNXbPhsmFxlka28drv68dXTnCcdzIKy76mAXJnevJVA9n9FT41q4FXJo FGQ8kBoNt2ci49dQ0LyRa6UaP3xo2OjJJQ7XBJHOnmR3+2ZAVdnZvN/erg9ZfU6i0Fe7 4doxsV3kT1RNspDf1Ih8RWPRFDD31rb4Z0FvAKQBksPaiwx0O8FaaAgaivRSkHsnybCh hvwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:subject:references:in-reply-to :cc:to:from:date:dkim-signature; bh=ruMJUIPHPS38F429X8hWWoUJlYzG6oT2/l9YdrE9JCI=; b=vS9CEGbJq01jWBKlkH2cSljfDvgHtC46JaoPsrpWmmQzuvHqmzwd4vtLdZeW0DYS6q QYj4M7xFZbFNAVcSEvL3E6cDbGiJKl7/tNN5RccOmdtxumsRhj44YijpTDoSFlt/cYw8 Z6kZ3ExY8azuGKI/fXXfCp7eZTDEZSmBJsNBV/fuc0ZttQwwm0ZQumAEp6MBakBTg8V2 l+J0s636cbyCmiLPv/b74rCqH6+FZELfmjwhfyAthNcaOmRmlasyvAWvFUHS8WmBhNOm qjG8DcbWTawEGv8x8zw7riXWmvkG0VpcNe5GnNRvSdNkbPh6gFVPYAlTzwjH3aCvPeLw Yv7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pvoyh0Wm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y5si8564486eju.687.2020.06.08.05.48.25; Mon, 08 Jun 2020 05:48:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pvoyh0Wm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729130AbgFHMqf (ORCPT + 99 others); Mon, 8 Jun 2020 08:46:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:53978 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728173AbgFHMqO (ORCPT ); Mon, 8 Jun 2020 08:46:14 -0400 Received: from localhost (fw-tnat.cambridge.arm.com [217.140.96.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 213622072F; Mon, 8 Jun 2020 12:46:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591620371; bh=FCAvqfmKFayKCxPdwRtAqVx7sG8HLE4jjh4Q6F84pqk=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From; b=pvoyh0Wmbo79Pc12rA2pIrsB8hDaGNNVxeCDJUrDxMXEg53yWzsj/jpoCMVRQ/D+k iS4q0ZxJQwdYgnH5S5bPje7+IJARN2szNwFq7POidTzoZLNpDR/H7bW51LWAzgk6YT GT/iYSpw5umoi75sI57tbGb1OzSZk8hx6Qd8TspE= Date: Mon, 08 Jun 2020 13:46:09 +0100 From: Mark Brown To: Jerome Brunet , Kevin Hilman , Colin King , linux-arm-kernel@lists.infradead.org, Jaroslav Kysela , Liam Girdwood , linux-amlogic@lists.infradead.org, alsa-devel@alsa-project.org, Takashi Iwai Cc: linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org In-Reply-To: <20200604171216.60043-1-colin.king@canonical.com> References: <20200604171216.60043-1-colin.king@canonical.com> Subject: Re: [PATCH] ASoC: meson: fix memory leak of links if allocation of ldata fails Message-Id: <159162036934.23368.2440967052610831030.b4-ty@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 4 Jun 2020 18:12:16 +0100, Colin King wrote: > Currently if the allocation of ldata fails the error return path > does not kfree the allocated links object. Fix this by adding > an error exit return path that performs the necessary kfree'ing. Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next Thanks! [1/1] ASoC: meson: fix memory leak of links if allocation of ldata fails commit: 6e801dc411329aff592fbd48fb116183d0acdb00 All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus during the next merge window (or sooner if it is a bug fix), however if problems are discovered then the patch may be dropped or reverted. You may get further e-mails resulting from automated or manual testing and review of the tree, please engage with people reporting problems and send followup patches addressing any issues that are reported if needed. If any updates are required or you are submitting further changes they should be sent as incremental updates against current git, existing patches will not be replaced. Please add any relevant lists and maintainers to the CCs when replying to this mail. Thanks, Mark