{"id":2234597,"url":"http://patchwork.ozlabs.org/api/1.2/covers/2234597/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-i2c/cover/20260507221145.62183-1-sauravsc@amazon.com/","project":{"id":35,"url":"http://patchwork.ozlabs.org/api/1.2/projects/35/?format=json","name":"Linux I2C development","link_name":"linux-i2c","list_id":"linux-i2c.vger.kernel.org","list_email":"linux-i2c@vger.kernel.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260507221145.62183-1-sauravsc@amazon.com>","list_archive_url":null,"date":"2026-05-07T22:11:43","name":"[v2,0/2] i2c: tegra: fix error handling in tegra_i2c_xfer()","submitter":{"id":93348,"url":"http://patchwork.ozlabs.org/api/1.2/people/93348/?format=json","name":"Saurav Sachidanand","email":"sauravsc@amazon.com"},"mbox":"http://patchwork.ozlabs.org/project/linux-i2c/cover/20260507221145.62183-1-sauravsc@amazon.com/mbox/","series":[{"id":503285,"url":"http://patchwork.ozlabs.org/api/1.2/series/503285/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-i2c/list/?series=503285","date":"2026-05-07T22:11:43","name":"i2c: tegra: fix error handling in tegra_i2c_xfer()","version":2,"mbox":"http://patchwork.ozlabs.org/series/503285/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2234597/comments/","headers":{"Return-Path":"\n <linux-i2c+bounces-17305-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-i2c@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=amazon.com header.i=@amazon.com header.a=rsa-sha256\n header.s=amazoncorp2 header.b=TSYvSS/O;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=linux-i2c+bounces-17305-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=amazon.com header.i=@amazon.com\n header.b=\"TSYvSS/O\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=52.13.214.179","smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=amazon.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=amazon.de"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gBRLw2xxfz1yJq\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 08 May 2026 08:12:24 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id A19163011C79\n\tfor <incoming@patchwork.ozlabs.org>; Thu,  7 May 2026 22:12:21 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id C7D9F3537E5;\n\tThu,  7 May 2026 22:12:20 +0000 (UTC)","from pdx-out-005.esa.us-west-2.outbound.mail-perimeter.amazon.com\n (pdx-out-005.esa.us-west-2.outbound.mail-perimeter.amazon.com\n [52.13.214.179])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 6BF151607A4;\n\tThu,  7 May 2026 22:12:19 +0000 (UTC)","from ip-10-5-9-48.us-west-2.compute.internal (HELO\n smtpout.naws.us-west-2.prod.farcaster.email.amazon.dev) ([10.5.9.48])\n  by internal-pdx-out-005.esa.us-west-2.outbound.mail-perimeter.amazon.com\n with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2026 22:12:15 +0000","from EX19MTAUWA001.ant.amazon.com [205.251.233.182:4691]\n by smtpin.naws.us-west-2.prod.farcaster.email.amazon.dev [10.0.41.42:2525]\n with esmtp (Farcaster)\n id 966878fe-4ee1-48c7-9c60-ac4acb547e0f; Thu, 7 May 2026 22:12:14 +0000 (UTC)","from EX19D001UWA001.ant.amazon.com (10.13.138.214) by\n EX19MTAUWA001.ant.amazon.com (10.250.64.218) with Microsoft SMTP Server\n (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.37;\n Thu, 7 May 2026 22:12:13 +0000","from dev-dsk-sauravsc-1a-8777b848.eu-west-1.amazon.com\n (172.19.118.34) by EX19D001UWA001.ant.amazon.com (10.13.138.214) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.2562.37; Thu, 7 May 2026\n 22:12:11 +0000"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1778191940; cv=none;\n b=QVcRadz1taL3qBImWS7EywPgF3gzacKZymr6Plumoj9c0WUm4cJ1Xa4WU1b+0sOlSX6W/5T1tCK66MUg6nDSJZ9B1FRqYYvEJsZ5kfknez3Uvieegsd5y9IIvuZAy44yzKFlPgxU9sPOlcHBKrYOxVUS9oAverugGc/QT3kceQQ=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1778191940; c=relaxed/simple;\n\tbh=5Iz1jW22WJF8MTTgi637YMsleySLpdqtcYdy2AI90bM=;\n\th=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=oT3Ekmm1RM228C3B8zzrt/DGVIJi+/K4czZBWXDcpmRemlBnJ9ekU6BMhDNMlHzm8ssFxOg6iPBbymbu8tyfL817K4hwxC1RCW43uLfBAJvmltYGm+pu4IPH0267KZLgiWg5zvDO0HL0iD3/MUsxLR9pEjASikvxGW24WvMkcFc=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=amazon.com;\n spf=pass smtp.mailfrom=amazon.de;\n dkim=pass (2048-bit key) header.d=amazon.com header.i=@amazon.com\n header.b=TSYvSS/O; arc=none smtp.client-ip=52.13.214.179","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n  d=amazon.com; i=@amazon.com; q=dns/txt; s=amazoncorp2;\n  t=1778191939; x=1809727939;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=Me6vW1zg1ICKmqO5GfPSrEQwd7B1POaq2QXbncQv7ds=;\n  b=TSYvSS/Or7Shu2z0cd0AEuPxQzTsIqVy4s5jx1n23PVlkQk5J+lodWNc\n   caMOsvXqHJBGCo3+uzJtgaNejg4uSrL54DRFtxE/Bwt0PstjO3/VRkEiW\n   Ut5p+bB4d0UvcKPF6Dhz4hiP2bp2x3SrKbEa3xB+MIcWgNDvMJFpjs6FV\n   P+q554BA+ulvsfglJ/NRp/+FxSWcDPfRu0UksNA49t6dCnXW2n+5EvOCl\n   pCt8S6+DV1UOfgdSgqP0Dwoa8ujLUKD7u8KkkQeeniXWUARZfry7EpcF7\n   tIhu8IH6npjEZoMbevKTsDkIAUCNLpnSky9nHqdGnZkIJSeM0rmC24jC0\n   A==;","X-CSE-ConnectionGUID":"DdjVrFrBQsKPNHwT5hJwmg==","X-CSE-MsgGUID":"TL3LNifsQIyQrsIuYv0ESQ==","X-IronPort-AV":"E=Sophos;i=\"6.23,222,1770595200\";\n   d=\"scan'208\";a=\"19124264\"","X-Farcaster-Flow-ID":"966878fe-4ee1-48c7-9c60-ac4acb547e0f","From":"Saurav Sachidanand <sauravsc@amazon.com>","To":"Wolfram Sang <wsa+renesas@sang-engineering.com>","CC":"Akhil R <akhilrajeev@nvidia.com>, Kartik Rajput <kkartik@nvidia.com>,\n\tThierry Reding <treding@nvidia.com>, Jon Hunter <jonathanh@nvidia.com>,\n\t<linux-i2c@vger.kernel.org>, <linux-tegra@vger.kernel.org>,\n\t<linux-kernel@vger.kernel.org>, Saurav Sachidanand <sauravsc@amazon.com>","Subject":"[PATCH v2 0/2] i2c: tegra: fix error handling in tegra_i2c_xfer()","Date":"Thu, 7 May 2026 22:11:43 +0000","Message-ID":"<20260507221145.62183-1-sauravsc@amazon.com>","X-Mailer":"git-send-email 2.47.3","In-Reply-To":"<20260506195319.44810-1-sauravsc@amazon.com>","References":"<20260506195319.44810-1-sauravsc@amazon.com>","Precedence":"bulk","X-Mailing-List":"linux-i2c@vger.kernel.org","List-Id":"<linux-i2c.vger.kernel.org>","List-Subscribe":"<mailto:linux-i2c+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-i2c+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"8bit","X-ClientProxiedBy":"EX19D036UWC004.ant.amazon.com (10.13.139.205) To\n EX19D001UWA001.ant.amazon.com (10.13.138.214)"},"content":"Fix two bugs in the SW mutex path introduced by commit 6077cfd716fb\n(\"i2c: tegra: Add support for SW mutex register\"):\n\n1/2: Fix pm_runtime reference leak when tegra_i2c_mutex_lock() fails.\n2/2: Make tegra_i2c_mutex_unlock() return void with WARN to avoid\n     silently losing transfer errors.\n\nChanges since v1:\n- Split into two patches (Jon)\n- Make tegra_i2c_mutex_unlock() return void with WARN instead of\n  propagating the error value (Jon)\n\nv1: https://lore.kernel.org/all/20260506195319.44810-1-sauravsc@amazon.com/\n\nSaurav Sachidanand (2):\n  i2c: tegra: fix pm_runtime leak on mutex_lock failure\n  i2c: tegra: make tegra_i2c_mutex_unlock() return void\n\n drivers/i2c/busses/i2c-tegra.c | 19 +++++++++----------\n 1 file changed, 9 insertions(+), 10 deletions(-)"}