Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2990091pxb; Sat, 23 Oct 2021 12:59:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw/KKHJu1a2HiakOLFSqUHEj08RK/7V5Qm856+r5q07Q9oXSITl/Ljv9cgpVgLyNUIP7/A9 X-Received: by 2002:a63:af09:: with SMTP id w9mr5812931pge.323.1635019167380; Sat, 23 Oct 2021 12:59:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635019167; cv=none; d=google.com; s=arc-20160816; b=vQ5f0/UCtesPoBxhgIOb3pgj/VOX48tRIVdGCVZY5tdV/mLYunDPNtyb6Fn3LosuVs DlLqxc+pdsWiu0Z1Z49tZVTr5DcLNDM7kUZ6JcDGgZ5mqESBC+ZyBcj2qQTFu+0Jt0im y0rp67enf1/xN7/b9cNU9aQvKQjNAJ0KODaFTWq1L6ghnHXNinQk7G5y8K3rSH2t4Z70 YS9Ljq6rRRFAY+Yb0+zZqN6b3dBYzsPkphsx+ZsqOlPG6h36CiGzHUrusMnLrqWksRlS yboVze+b2LehrxOCNTVYvl0RUpdSvEDPHxJZKUvlIYUm6ZItupHDxJiPgUhTZ3Ua/MWB aibQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=HY/3+B+FChF8Nwa9h+abgtb3tAO9mRcWvvcNOVomq08=; b=rQC+BC4U68XTe9nCZeG5urE2E+3blMQ14Nl+5bixc7P5/USGoYbOB1P0ZsCMPmi53y n2ZtXkViq7U+MWDYalheznoW/S0cUIzSHdPy06SLW2Wa+zaF6PNIHApPdjH5PqBy29a5 hVQjY5bPfvNw1IWmVcRrNMJATQSfsaW0IqkbyJz/NuklSIMnH0ncKdJqDeG0n4Y1p/1h GOqddIGNjUFLLynH0eEH0G3cWwBWveWm8w9eLaH+OLmFl7SNQsFGScQOKVPa2dGVdv5b I9tBNxFZ9QTNb+b66rXNtUOWznnCcxHQ2+XlE7z/oxH5kHtG/w9DXR/Ed1rC4MNKwo4P n7uQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QyXTM5RL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id on9si23568728pjb.64.2021.10.23.12.59.14; Sat, 23 Oct 2021 12:59:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QyXTM5RL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230476AbhJWUAb (ORCPT + 99 others); Sat, 23 Oct 2021 16:00:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:34000 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230230AbhJWUAa (ORCPT ); Sat, 23 Oct 2021 16:00:30 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6D80B60F46; Sat, 23 Oct 2021 19:58:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1635019090; bh=COjl22/rY2BQ/OgeeXf9s3EB7nrpB6IfxOTmSZf301M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QyXTM5RLL/ZvlgR/gvrmchnEeG8NoGFEolfIWQYLMSGR6+qBJPLn4lUM5vv6MvbuH oK/RcoNYnh3aDf/KxcI5dERWgrdoWOlSscPUeInsFFHARpW9he4GFtaLr+1yxWOrit zlayhLnclawo7aVoeZPwsUlnirMWB7imxuYmJLUm76aTEfFQayWa9xCrVkmRlNsXuT qUPnYa0/lk7MaOS77HPy+vxUfuHCUzE1m5vCddxE9hfXSFPNdJFJVcOa5/ZVmce/ds 4NBZpL8MYLxjlzNmn3V6/Tg/so/kLDfMCqPkvFZD2kEQvay1Yt/21rTst9FEvU/qMG PINDK2vc12RHQ== From: Mark Brown To: linux-kernel@vger.kernel.org, linux-spi@vger.kernel.org, Yang Yingliang Cc: Mark Brown , bcm-kernel-feedback-list@broadcom.com, kdasu.kdev@gmail.com Subject: Re: [PATCH -next] spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() Date: Sat, 23 Oct 2021 20:58:01 +0100 Message-Id: <163501903283.919250.3449151714260187451.b4-ty@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20211018073413.2029081-1-yangyingliang@huawei.com> References: <20211018073413.2029081-1-yangyingliang@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 18 Oct 2021 15:34:13 +0800, Yang Yingliang wrote: > Fix the missing clk_disable_unprepare() before return > from bcm_qspi_probe() in the error handling case. > > Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi.git for-next Thanks! [1/1] spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() commit: 0204bdeb3df79a5c78d9e76119a7f04e3dcb1258 All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus during the next merge window (or sooner if it is a bug fix), however if problems are discovered then the patch may be dropped or reverted. You may get further e-mails resulting from automated or manual testing and review of the tree, please engage with people reporting problems and send followup patches addressing any issues that are reported if needed. If any updates are required or you are submitting further changes they should be sent as incremental updates against current git, existing patches will not be replaced. Please add any relevant lists and maintainers to the CCs when replying to this mail. Thanks, Mark