Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2039867ybt; Mon, 15 Jun 2020 16:42:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz3j3PKIs+jgdNu5pmqdlmqpOv4T0ja+Ea9Zzr3vUjBLFO5MyNGqDxaOVQG8FBSHb8JhSkb X-Received: by 2002:a17:907:ab9:: with SMTP id bz25mr215305ejc.39.1592264555359; Mon, 15 Jun 2020 16:42:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592264555; cv=none; d=google.com; s=arc-20160816; b=Sa0LteVCuA4pvX85xtW26SMJj9v0t9WMjZ9qD0TKmwFkq9h5lZjfuB2q3/J2jXAGjW lqnrZ40hhfddQi3GP7d7TvBP+FaiwbrraA6ybmPKxkxhIIU4v8EoRsFZxVmtfJZ73KTi 0wJpUp3oeEiNI3H1U+HWQ4Zb+lNEliQwLPQxjRrmJ1fSaeESfFeZfgJ4GG3bCFu74sRE vrb/MN6o88ev4p05FqX5D29TOQGEQhvG+o39hVWkU2o8dM2zS3R11VfBGNPtslo5UoNX VacAOa1yxarOoyh51kdE4tOYIDwkfCGs0ZigZbPdVgSSIdz4g1dX4rUkvmWFKjaYPpYM hvng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:subject:references:in-reply-to :cc:to:from:date:dkim-signature; bh=8AEEjd1ILIwS2Zj4QfzPftRhRPxzFePY/MdM5uvMO4k=; b=dE9UWISLkn3Ior7Fd1Y8AWwSkPtaP4JFdSsKwJSvv5iY+H/+OvHSbWSVb7UFckk+rZ CYTCVXrUHivlkBNeew0/rJAiU5qEUzcj/xRbRbqxLkkO8BBhzKCt7W3uGMil7qAJlIAx wMBMwJTTl5mq87kZgTjGA075czCeI5pFz+BDSv5sEkCBp708HKws4XY2ueAMNNM6usba vpjhYkjaX6XDItSsFh9w7/MLOX/VZ0/xZlvLBGmr/716y+YNP9KBl0FR7sCSY2fpBJAW BZwLd7E450ITYDTGG0lETROEDlrnKTVhhsi4gvsgHEY+Qrm2p2g5StJH2p1He+FPCYSZ H+tA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FwFV+tA4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bi27si10355256edb.232.2020.06.15.16.42.12; Mon, 15 Jun 2020 16:42:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FwFV+tA4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726873AbgFOXkF (ORCPT + 99 others); Mon, 15 Jun 2020 19:40:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:51732 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726546AbgFOXkE (ORCPT ); Mon, 15 Jun 2020 19:40:04 -0400 Received: from localhost (fw-tnat.cambridge.arm.com [217.140.96.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C936C207D4; Mon, 15 Jun 2020 23:40:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592264404; bh=rX1DHAOnhPtnb7erlFKAIOqjfys/6ZA52aiWMCtZo7Y=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From; b=FwFV+tA4A7kJf7sdhkLV55rcuqeiXqHZVwcYmF4cAIhRt0Kfu+x2/saCCn3WB9xGU QyG8nOfMzur/WAPA7hSeOW0URwVB7SIuEb+PnGJgR4WnPNJqq3b+BAa5lrl/ew+H0z Uj4+X1can5ZZYawgQ1PAloxnAvFST4rNkCZSojQE= Date: Tue, 16 Jun 2020 00:40:01 +0100 From: Mark Brown To: kjlu@umn.edu, "wu000273@umn.edu" Cc: Kuninori Morimoto , Liam Girdwood , Takashi Iwai , alsa-devel@alsa-project.org, linux-kernel@vger.kernel.org In-Reply-To: <20200614033749.2975-1-wu000273@umn.edu> References: <20200614033749.2975-1-wu000273@umn.edu> Subject: Re: [PATCH] ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt Message-Id: <159226439190.27409.3717160114611875111.b4-ty@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 13 Jun 2020 22:37:48 -0500, wu000273@umn.edu wrote: > pm_runtime_get_sync() increments the runtime PM usage counter even > when it returns an error code, causing incorrect ref count if > pm_runtime_put_noidle() is not called in error handling paths. > Thus call pm_runtime_put_noidle() if pm_runtime_get_sync() fails. Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next Thanks! [1/1] ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt commit: c4c59b95b7f7d4cef5071b151be2dadb33f3287b All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus during the next merge window (or sooner if it is a bug fix), however if problems are discovered then the patch may be dropped or reverted. You may get further e-mails resulting from automated or manual testing and review of the tree, please engage with people reporting problems and send followup patches addressing any issues that are reported if needed. If any updates are required or you are submitting further changes they should be sent as incremental updates against current git, existing patches will not be replaced. Please add any relevant lists and maintainers to the CCs when replying to this mail. Thanks, Mark