Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp35382056rwd; Mon, 10 Jul 2023 06:46:07 -0700 (PDT) X-Google-Smtp-Source: APBJJlEZbF5SHPHlTyjW1bHSh+d1P2fIuOnouI5g1YBe90GeiXogVs1qS+PYMoTjPHbW5jPfu94S X-Received: by 2002:a05:6870:5607:b0:1b0:5105:a62b with SMTP id m7-20020a056870560700b001b05105a62bmr15100109oao.2.1688996766729; Mon, 10 Jul 2023 06:46:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688996766; cv=none; d=google.com; s=arc-20160816; b=VcZDaXeLOntag8F4civ+sjIwWx1ru8xsfgANvFCJ0f1KicGP0rrDUd14vaXOd2HaoQ 7QaaBNzH8e/5bJlcfm9s3q3orgnOM3VeCV/ti+asfxlV3FUlnATbBejc1tH5N0wJiUMT dR7IE9L1eltMVDmY1AfslnI4Onx5J95SPttWAXh0z91by8Xg/hdl4HLAOGi5AjuJmM3Z +5/aZNzD/aye/za58bCJxH+O+OP4+1NYswKbEi62jg8b8wFI5AYoav0ly13ZLYhtIfDN WI63TP91kLJafWFE/gEH11gTGuNM+I6l/hbZQy7NdlilC6m3vIw/3GAKodbCA5aGSvo7 8V2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=rByFUaqLpRyxH8M6TMgnWC5i0bOPqVlCqhNX7Ky4oss=; fh=Fv7fF5vRYOF+bByRhxqamd5MFxKGzRTaQ8/d+X2GKUM=; b=jl+BTDLG3eSntALDTda+N6GvmvL6ySGm+Uc2IbSV9RzrGHzCY2i6K5sk8E0D18TdaQ FPzMuPn+jbUhRGrYDadoL5xWFw3KgvQ5N97io1G3iC2M5efBXbV8+gPbNxKTs1LDYRFx KcatmZaaznAMovH7gKAShCA7nS6FhhDzGCWv97LnU0OJacXDiaC56NK6OZKr8QKeV35G rdEp0OnohVMEo+Otds2JfgAGkZTjFzun9NwESAHghpQWLAHRpPCBxJIuq2C4qIm5dQOw 2HIaY7be+onFItpnZmJD/KdbFvd+MSxYWU2bRn6aS9mX0o9ofz8xpke0e5CfILu71Gjt csRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dAAJFvFQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p3-20020a17090a348300b002630cae4f47si7138272pjb.66.2023.07.10.06.45.55; Mon, 10 Jul 2023 06:46:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=dAAJFvFQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231990AbjGJNaT (ORCPT + 99 others); Mon, 10 Jul 2023 09:30:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40276 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229870AbjGJNaS (ORCPT ); Mon, 10 Jul 2023 09:30:18 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DEF26C4; Mon, 10 Jul 2023 06:30:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 7C5C760F55; Mon, 10 Jul 2023 13:30:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4AA40C433C8; Mon, 10 Jul 2023 13:30:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1688995816; bh=fPtGNhRYmqCZsKEXFsgJHykQ1nGWwBfMuEqwsNgrA84=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=dAAJFvFQF+uiP+FZRTMnYWv0aXjbbxP1TjpAEmH6i+JurN44KV2i2U2sfidXaqdQe dbkrQSlpg3JESpaUsgtxNhAXe3kBMeXCq4wzP4vqOYR4JvjEpGtPajfUrkVrTG8n+K JBTo+fAC7vGlUgL7/a5a2QQDTnYMllItKdKK7NQM= Date: Mon, 10 Jul 2023 15:30:13 +0200 From: Greg Kroah-Hartman To: Markus Elfring Cc: Chunyan Zhang , linux-serial@vger.kernel.org, kernel-janitors@vger.kernel.org, Baolin Wang , Jiri Slaby , LKML , Chunyan Zhang , Orson Zhai Subject: Re: [PATCH 2/2] serial: sprd: Fix DMA buffer leak issue Message-ID: <2023071047-dragster-shortly-981a@gregkh> References: <20230710080348.4137875-2-chunyan.zhang@unisoc.com> <69d56da8-9530-e729-d527-89879d2bab06@web.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <69d56da8-9530-e729-d527-89879d2bab06@web.de> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 10, 2023 at 01:36:07PM +0200, Markus Elfring wrote: > > Release DMA buffer when _probe() returns fail to avoid memory leak. > > I would appreciate if this change description can be improved another bit. Again, I would appreciate it if you do not provide reviews for any kernel subsystems in which I am a maintainer of. Please stop, it is not helpful at all. greg k-h