Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3316124pxj; Tue, 11 May 2021 01:28:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwld4Lrt9fcTopPaOY9ZI1g+G4NA9PiXyZ+S84tdmxevkJqiDyhTQEJ6kTmXAvecdgpMh7K X-Received: by 2002:a17:906:4ad0:: with SMTP id u16mr30280194ejt.19.1620721705381; Tue, 11 May 2021 01:28:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620721705; cv=none; d=google.com; s=arc-20160816; b=G8VFUohh4LN4gDS9zsHaMo2Vlp891T2n+sRZrTrrpBg2ZLT1/H3XvpW279StWzweC5 SczjJmMU6FYW3KhDv2s3OSL5jY98yUTYO5nocuMX2knaLIjOZu4tXt2aW2j6UBOu5PB5 CC5YMAgxVB9xciazlXDWwHLzZDXkwpVAq/OG9/AaxfvB6ynPCbohs81CyNINBKVCPsfY ma+wo1q/bHtp3K3nEj2deIs8Q8iI4uqMzlgY1RwLIDVdOp/YvPu6KtUwrgmAoPk6D1mt QmRZxiiOErKb3ORcG0ryes3aE9AEiQfaKBPEu7TlNDiFiyofXwxCkjBQbXkF73EG2qBw Xqnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=3fD4elQB21lZLIjXRsvmLitDHaufnDuU1J2JMR+GZAo=; b=LGVq5yMpDSEVPEQRcqJl78Lt+0piGctgg5MER/nz6hy0nrnm9G+KJaHY0//rM6EbBV rU1VwQNdsnarvzVK1GxQ3TLLVtkYhpozquMxVH1Bz9xm1uYqeHmrt5RsGseBEyxiDD66 DE3PuPDrwDrRg+jtv9cPh+h/rr4hjN0gVyqLSg+fvscVtPBZPJEZjb5iBQQD5+jhbcuf vGCAw6PAgxFPEPK1QOrpYZzzTtYdGR7s6sFxMMF/19rKGnSv66HNTOI4Tvs2xQteYlTr 7HwJuiLMw+iSaGTfNgvsmE3vhKwn8nlUNGR9oq+fmHvHiTrIpdpVlgzwzkW4QLG/rcNV wZwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XK1ZH7nH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f24si16367420ejz.234.2021.05.11.01.28.00; Tue, 11 May 2021 01:28:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XK1ZH7nH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230514AbhEKI2D (ORCPT + 99 others); Tue, 11 May 2021 04:28:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:36044 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230487AbhEKI1y (ORCPT ); Tue, 11 May 2021 04:27:54 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 99E5E613C3; Tue, 11 May 2021 08:26:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620721608; bh=8Txu08zUYVsrHITXx85x6pPmUEO9u+1xaOxDBIw9gGo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XK1ZH7nHQwcSS1LiSspQ/saHPYhvr78b1zFjgiq7SmT03lOonU/eds0Z4E7VOsmLC /WmO04Jhocl5YYt8iwWVmJj4eFXmB6T1SM0Z7u4Msd2hwKjRKVcvnA3vhKk402DETD /jLXajewIESKcqtBCBUKceUTHFxg8EQoJPVU3+c+GZR+KvdKSERsrBFVGaLNdcJDoi 6PQUXOXwemx8D/nQF18SXt42rtJmvttJnzSp6Da4yKJTC2ESmy5FOXpoPn/S/eFi6K 53x+sS7/qFChnpPpcKCrhvf3yRqfF9qujqAlDhCjLsGGDnTAjPQVOVqNEneZWFrfM3 RQ9nlwEcjLYAg== From: Mark Brown To: Christophe JAILLET , maitysanchayan@gmail.com, olteanv@gmail.com Cc: Mark Brown , linux-kernel@vger.kernel.org, linux-spi@vger.kernel.org, kernel-janitors@vger.kernel.org Subject: Re: [PATCH] spi: spi-fsl-dspi: Fix a resource leak in an error handling path Date: Tue, 11 May 2021 09:25:31 +0100 Message-Id: <162072071982.33404.3585996084879367200.b4-ty@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 9 May 2021 21:12:27 +0200, Christophe JAILLET wrote: > 'dspi_request_dma()' should be undone by a 'dspi_release_dma()' call in the > error handling path of the probe function, as already done in the remove > function Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi.git for-next Thanks! [1/1] spi: spi-fsl-dspi: Fix a resource leak in an error handling path commit: 680ec0549a055eb464dce6ffb4bfb736ef87236e All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus during the next merge window (or sooner if it is a bug fix), however if problems are discovered then the patch may be dropped or reverted. You may get further e-mails resulting from automated or manual testing and review of the tree, please engage with people reporting problems and send followup patches addressing any issues that are reported if needed. If any updates are required or you are submitting further changes they should be sent as incremental updates against current git, existing patches will not be replaced. Please add any relevant lists and maintainers to the CCs when replying to this mail. Thanks, Mark