From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3AFF1C43462 for ; Fri, 9 Apr 2021 16:23:22 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1D5946108B for ; Fri, 9 Apr 2021 16:23:22 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234124AbhDIQXe (ORCPT ); Fri, 9 Apr 2021 12:23:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:59786 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233864AbhDIQXd (ORCPT ); Fri, 9 Apr 2021 12:23:33 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2C5836103E; Fri, 9 Apr 2021 16:23:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1617985400; bh=t/mPNhJnazVKhkpQ+lIGCQRQb6zXqF/fPgfGi1ncm2o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oQm/etGXAnEujvh+/dzXTiy768Bx/c//aOsGu0CqNBXC8shGA2NDOOObHV8uQoWjc a+PMXJjIFYxOMJGa2drU+uQdjnVbf1iOVi5bEsFHsfjr5N0Fmu68+vGahis9merDGH 79xZQD2hUHuMWspG9mbftkLD1AU4gUuHockEpDFtMHx55hLmts89PyvayxGcJz2yOu q8Q0Cyt5lPkE95vRBfSaTb65nL4GQoF6+O6WhAWTXvQFPnM9xoU+7u9LQWNNeA027S ez4/63MjjZ51NJ5CgFY3Lt7anhdBkpYkwmRaYd1q5+wWX5qnTHcqHzwqfC0+lyrpqr r3HaEx1m1nLng== From: Mark Brown To: Wei Yongjun Cc: Mark Brown , kernel-janitors@vger.kernel.org, Hulk Robot , linux-spi@vger.kernel.org Subject: Re: [PATCH -next] spi: omap-100k: Fix reference leak to master Date: Fri, 9 Apr 2021 17:22:40 +0100 Message-Id: <161798356987.48466.14490964027332718844.b4-ty@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210409082954.2906933-1-weiyongjun1@huawei.com> References: <20210409082954.2906933-1-weiyongjun1@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-spi@vger.kernel.org On Fri, 9 Apr 2021 08:29:54 +0000, Wei Yongjun wrote: > Call spi_master_get() holds the reference count to master device, thus > we need an additional spi_master_put() call to reduce the reference > count, otherwise we will leak a reference to master. > > This commit fix it by removing the unnecessary spi_master_get(). Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi.git for-next Thanks! [1/1] spi: omap-100k: Fix reference leak to master commit: a23faea76d4cf5f75decb574491e66f9ecd707e7 All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus during the next merge window (or sooner if it is a bug fix), however if problems are discovered then the patch may be dropped or reverted. You may get further e-mails resulting from automated or manual testing and review of the tree, please engage with people reporting problems and send followup patches addressing any issues that are reported if needed. If any updates are required or you are submitting further changes they should be sent as incremental updates against current git, existing patches will not be replaced. Please add any relevant lists and maintainers to the CCs when replying to this mail. Thanks, Mark