From patchwork Sun Dec 2 08:58:52 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vinod Koul X-Patchwork-Id: 10707915 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id F287617D4 for ; Sun, 2 Dec 2018 08:59:02 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D2E812AF1F for ; Sun, 2 Dec 2018 08:59:02 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id BEE5D2AF2B; Sun, 2 Dec 2018 08:59:02 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 3FE662AF1F for ; Sun, 2 Dec 2018 08:59:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725782AbeLBI7D (ORCPT ); Sun, 2 Dec 2018 03:59:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:46408 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725771AbeLBI7D (ORCPT ); Sun, 2 Dec 2018 03:59:03 -0500 Received: from localhost (unknown [122.182.223.109]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1E0032080A; Sun, 2 Dec 2018 08:58:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543741140; bh=gok0awTkCPJCGa99wg89/I4VcnB8tebRLdwnurYYL/c=; h=Date:From:To:Cc:Subject:From; b=vJ6h23QyI729chNcBF2QL+nWg6Y2yaikGdhlUapoM/HCfavfxONHu/K+hb7Qz/w6H cCm6/RdX1JNgk1k8uC5JmXg4sQvpvwU/3d5Qp/LFRpsMABF4PqxcBSt6j0A8dykjP0 Yc95OvF3wo1z6CIut44IDBnjwdcGMy8k7z+oZrr0= Date: Sun, 2 Dec 2018 14:28:52 +0530 From: Vinod Koul To: Linus Torvalds Cc: dma , LKML Subject: [PULL REQUEST] dmaengine fixes for v4.20-rc5 Message-ID: <20181202085852.GP3175@vkoul-mobl.Dlink> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.9.2 (2017-12-15) Sender: dmaengine-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: dmaengine@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Hi Linus, Here is the pull request for v4.20-rc5. It contains two fixes (cced stable) to fix serial dma memory leak on at_hdmac dma The following changes since commit 651022382c7f8da46cb4872a545ee1da6d097d2a: Linux 4.20-rc1 (2018-11-04 15:37:52 -0800) are available in the Git repository at: git://git.infradead.org/users/vkoul/slave-dma.git tags/dmaengine-fix-4.20-rc5 for you to fetch changes up to 77e75fda94d2ebb86aa9d35fb1860f6395bf95de: dmaengine: at_hdmac: fix module unloading (2018-11-29 19:49:41 +0530) ---------------------------------------------------------------- dmaengine-4.20-rc5 dmaengine fixes for v4.20-rc5 This contains two fixes to at_hdmac which fixes long standing bus reported recently on serial transfers causing memory leak. These fixes were done by Richard Genoud. ---------------------------------------------------------------- Richard Genoud (2): dmaengine: at_hdmac: fix memory leak in at_dma_xlate() dmaengine: at_hdmac: fix module unloading drivers/dma/at_hdmac.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) Thanks