Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp623955ybt; Wed, 17 Jun 2020 09:38:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx6Cm3ugfmdpp3KqC+TtyGXQCGs6OGLYhLPXnILOq/knxV7koVDOpCCw1NZqcv12esQ30B4 X-Received: by 2002:a17:906:6453:: with SMTP id l19mr38584ejn.262.1592411928659; Wed, 17 Jun 2020 09:38:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592411928; cv=none; d=google.com; s=arc-20160816; b=z4RZHHUNLTw1Ncg+L2ue0GyeIW3tjMdcJsyEM25fJg6GaK1Lh7B28nBoE06ob2ZtvA 3xHnQgeSyGfIbLlau9GjxFUjbxgfo7bUFoyTZDoHu/mdSFsE80MAv4QRH0EnJJ6s0vIh MO5B3E5MeLgUQUXOcCr8mUtU8IzH9stO8K/SvXLgOGpS9DEiEkCxiY65X+0FU5sVv3V/ KYw9tzGVIURej+pbw9zNCfqCR93fvvBd4LHB+mC6cqRVl9Z2boIYBVaBZS5aFwemECRS 2M4jVKW9W/SG/bujwEqiucx8RwgK7V6zLHgvTpSRQrV8/Yeh3ODGlde+eh/TRswfcBo4 VjUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:subject:references:in-reply-to :cc:to:from:date:dkim-signature; bh=FRw6zlpqdVEaQg5O5KU4SF51apSP0/F9GF+SeU6drRs=; b=vkvnL9xnA61GAyOBNkdYgKSCpsOlYk/2ugGRu6wEdYEUrywyNMYDRf0QROmKFVd3P3 276kcELL4V6iaRxSWVNf9sy7LmgF043dO3bVJqC1TvVK8YSrjBH55WYN3LObxOzC8YFA EeI+v46zOXz0sCMA1lJZ2cD0NXf2wOUpCFRqly8F4v5tWTZBo9dTLVcJuULruc49LuYI OyP9ZYbs3f1OX/cCoXpfXoS6+jeaVTLvj8ap0ZBxl/fEDcDc+oX+s543zu+Hu+Of9rj4 1y7m9FJMkepuYFLFrjdl/gZZvEAq26rpwlNXu25a2olRLgcmEU4DylnqJ2a3Cx9d1BYA 2Nsw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YSuMA0oT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j24si193239ejy.277.2020.06.17.09.38.24; Wed, 17 Jun 2020 09:38:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YSuMA0oT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726815AbgFQQfs (ORCPT + 99 others); Wed, 17 Jun 2020 12:35:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:34486 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726540AbgFQQfp (ORCPT ); Wed, 17 Jun 2020 12:35:45 -0400 Received: from localhost (fw-tnat.cambridge.arm.com [217.140.96.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DCBCE21527; Wed, 17 Jun 2020 16:35:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592411745; bh=KsOzPr2BKHtev42Ot9U8rSfD+Tz9IgpBEpcHiLowtOY=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From; b=YSuMA0oTL7EC7wfSuOaYD8yJ+6mpmEwiRRDh1Rdz+c2tbGh2F/wk2+keg+gv0N+h2 kHehOrbhRtVM2BUEBbRAnuHFlgjJIh0AoYs0EQDGNXOI8B/7uI7Ctf/0hPvwVBG4ER BP3ywuIpx0AR41z80L0VVaZ/PnyPQCeeUfiXKMkw= Date: Wed, 17 Jun 2020 17:35:43 +0100 From: Mark Brown To: Charles Keepax Cc: patches@opensource.cirrus.com, linux-kernel@vger.kernel.org In-Reply-To: <20200617152129.19655-1-ckeepax@opensource.cirrus.com> References: <20200617152129.19655-1-ckeepax@opensource.cirrus.com> Subject: Re: [PATCH] regmap: Fix memory leak from regmap_register_patch Message-Id: <159241174305.13689.2474185985692181953.b4-ty@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 17 Jun 2020 16:21:29 +0100, Charles Keepax wrote: > When a register patch is registered the reg_sequence is copied but the > memory allocated is never freed. Add a kfree in regmap_exit to clean it > up. Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/regmap.git for-next Thanks! [1/1] regmap: Fix memory leak from regmap_register_patch commit: 95b2c3ec4cb1689db2389c251d39f64490ba641c All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus during the next merge window (or sooner if it is a bug fix), however if problems are discovered then the patch may be dropped or reverted. You may get further e-mails resulting from automated or manual testing and review of the tree, please engage with people reporting problems and send followup patches addressing any issues that are reported if needed. If any updates are required or you are submitting further changes they should be sent as incremental updates against current git, existing patches will not be replaced. Please add any relevant lists and maintainers to the CCs when replying to this mail. Thanks, Mark