From patchwork Thu Feb 27 16:52:05 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jens Wiklander X-Patchwork-Id: 11408935 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id E6F391580 for ; Thu, 27 Feb 2020 16:52:11 +0000 (UTC) Received: from web01.groups.io (unknown [66.175.222.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 9FB3A246A2 for ; Thu, 27 Feb 2020 16:52:11 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=linux.kernel.org header.i=@linux.kernel.org header.b="UtV16kcc" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 9FB3A246A2 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=bounce+26986+1470+1554929+3438807@linux.kernel.org X-Received: by 127.0.0.2 with SMTP id EEkLYY1556264xOX2lvb7pLI; Thu, 27 Feb 2020 08:52:11 -0800 X-Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by mx.groups.io with SMTP id smtpd.web09.7076.1582822330905505390 for ; Thu, 27 Feb 2020 08:52:11 -0800 X-Received: by mail.kernel.org (Postfix) id 79EDB246A1; Thu, 27 Feb 2020 16:52:10 +0000 (UTC) X-Received: from mail-lf1-f67.google.com (mail-lf1-f67.google.com [209.85.167.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 1A99A2469F for ; Thu, 27 Feb 2020 16:52:10 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 1A99A2469F X-Received: by mail-lf1-f67.google.com with SMTP id f24so2618474lfh.3 for ; Thu, 27 Feb 2020 08:52:09 -0800 (PST) X-Gm-Message-State: agILf0nuZFVl4c75OPrKtiGux1554929AA= X-Google-Smtp-Source: ADFU+vsgBkVQD0dLBecTfEbF03CrLYtLtKVzW7GOc6eWIzGL7RcvC5sthhgOlU9YtJ3O57BeRs1mGw== X-Received: by 2002:a05:6512:692:: with SMTP id t18mr170820lfe.212.1582822328230; Thu, 27 Feb 2020 08:52:08 -0800 (PST) X-Received: from jade (h-249-223.A175.priv.bahnhof.se. [98.128.249.223]) by smtp.gmail.com with ESMTPSA id m14sm3129755lfk.7.2020.02.27.08.52.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Feb 2020 08:52:07 -0800 (PST) Date: Thu, 27 Feb 2020 17:52:05 +0100 From: Jens Wiklander To: Linuxkernel+Patchwork-Soc via Email Integration Cc: Linux Kernel Mailing List , Linux ARM , tee-dev@lists.linaro.org, Rijo Thomas Subject: [GIT PULL] amdtee driver fix for v5.6 Message-ID: <20200227165205.GA7926@jade> MIME-Version: 1.0 User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: Bulk List-Unsubscribe: Sender: patchwork-soc@linux.kernel.org List-Id: Mailing-List: list patchwork-soc@linux.kernel.org; contact patchwork-soc+owner@linux.kernel.org Delivered-To: mailing list patchwork-soc@linux.kernel.org Reply-To: patchwork-soc+owner@linux.kernel.org Content-Disposition: inline DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux.kernel.org; q=dns/txt; s=20140610; t=1582822331; bh=poVpDwCG/bfAW2v+Q0Q00W99paZV6Wfq7wYMg2o+Xfg=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=UtV16kccSWP0EV8l7/kgV6HKY8pzaFJxdMJrcmA+KLLxjzv7ZvE6w+K0HLJZNXonqqY uiP7d6wpl8EdxU2flMi9+dMbIxQ/9v2dKlkuUiK+U/xGxyT/9qW5WK/OiEvBIPce2mNIe p+H+GpCgNmUbpeXh4qabuUK9fhb8p3Z3rDY= Hello arm-soc maintainers, Please pull this AMDTEE driver fix for a memory leak in one of the error paths of amdtee_open_session() Thanks, Jens The following changes since commit 11a48a5a18c63fd7621bb050228cebf13566e4d8: Linux 5.6-rc2 (2020-02-16 13:16:59 -0800) are available in the Git repository at: https://git.linaro.org/people/jens.wiklander/linux-tee.git tags/tee-amdtee-fix-for-5.6 for you to fetch changes up to b83685bceedbeed33a6adc2d0579a011708d2b18: tee: amdtee: fix memory leak in amdtee_open_session() (2020-02-27 16:22:05 +0100) ---------------------------------------------------------------- Fix AMDTEE memory leak in amdtee_open_session() ---------------------------------------------------------------- Dan Carpenter (1): tee: amdtee: fix memory leak in amdtee_open_session() drivers/tee/amdtee/core.c | 48 +++++++++++++++++++++++------------------------ 1 file changed, 24 insertions(+), 24 deletions(-) -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#1470): https://linux.kernel.org/g/patchwork-soc/message/1470 Mute This Topic: https://linux.kernel.org/mt/71590559/1554929 Group Owner: patchwork-soc+owner@linux.kernel.org Unsubscribe: https://linux.kernel.org/g/patchwork-soc/unsub [patchwork-linux-kernel-org@patchwork.kernel.org] -=-=-=-=-=-=-=-=-=-=-=-