Received: by 10.192.165.148 with SMTP id m20csp4850811imm; Tue, 24 Apr 2018 09:21:23 -0700 (PDT) X-Google-Smtp-Source: AIpwx48AwrbAc09TZWATf9LOvUzeFbDcZ0476YlVdA1/hBUBWV+kzJO2BT6Xxr2IVJqet95U/U5C X-Received: by 10.101.98.5 with SMTP id d5mr19065361pgv.416.1524586883269; Tue, 24 Apr 2018 09:21:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524586883; cv=none; d=google.com; s=arc-20160816; b=SyeqEhBo2X8tm/Tq9LST04Wg+bzSgTn+H6NUB4B7JHhlc9hkSvqvwkd/m82YcbybgG IVcBpY6Y10h9x5LMfDbw10L5K3FbWlNE9guvsWX9Zy41rNZkpRXC0g79Ler3W32CdyJs XAA5hAe2BYMgVlgVoC9WL7c/Aw0Wkfw6EgkGyL7th63h7UhWhVyNKwzrP53bTXNhdw2I H4n9emTJyvjnl3v6mttt3wCU8gjyuGVKU+skJdZU/e2PYMiy+eyiVD8x8V6YRt4bpKMl 8wGSg4FDWJBFw478tRJg4Pfi0blEh7TMlSeK+3Vt1bywdSTypZH+fTU8LxAVo4m/LSD2 3vMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:openpgp :subject:from:cc:to:arc-authentication-results; bh=R8xvdCNjh/7k0D8vEsyEZJTOmpW/ziOVDr49/Tmsak8=; b=JDMq2JfoU+63hIZjjyLMGtefQ+6sqDBMPDX9rKGxV4r5yylVJ+k+A3biFhkmc9tYf1 EP+tB//PSu/PyFN0CgmfwRuiPMPJQsy3/ARLaGBp/u5cr220fmNmraWrDXJdtsjaZhex ColbIcntPwwITNLJ+hrR9CM8Jvw9dmK7CdPoT1sljq6RqUGkCElfNjXvBuUlF2HmxWWC OZTZYQ8AVrblgp15kUjMI+LlWHFeH5/aYLmrK/7UhMCIClqnYlnGFRoz6k9V/Obnsbhm n3k0k+KC5u01dW3kNUGyuveQGJmsA5ArFQIaT+9W3tRmDOwsbnFZ1bZwAvvh8eHxJVyI Ph3Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1si11797924pga.70.2018.04.24.09.21.07; Tue, 24 Apr 2018 09:21:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752086AbeDXQUD (ORCPT + 99 others); Tue, 24 Apr 2018 12:20:03 -0400 Received: from thoth.sbs.de ([192.35.17.2]:57624 "EHLO thoth.sbs.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750814AbeDXQUB (ORCPT ); Tue, 24 Apr 2018 12:20:01 -0400 Received: from mail2.siemens.de (mail2.siemens.de [139.25.208.11]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id w3OGJuJn031513 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 24 Apr 2018 18:19:56 +0200 Received: from [139.25.68.37] (md1q0hnc.ad001.siemens.net [139.25.68.37] (may be forged)) by mail2.siemens.de (8.15.2/8.15.2) with ESMTP id w3OGJumr016436; Tue, 24 Apr 2018 18:19:56 +0200 X-Mozilla-News-Host: news://news.gmane.org:119 To: Pantelis Antoniou , Rob Herring , Frank Rowand , devicetree Cc: Linux Kernel Mailing List , Alan Tull From: Jan Kiszka Subject: [PATCH] of: overlay: Stop leaking resources on overlay removal Openpgp: preference=signencrypt Message-ID: <097f1b01-6cb4-8dcb-0498-7b4c59a7ea53@siemens.com> Date: Tue, 24 Apr 2018 18:19:55 +0200 User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); de; rv:1.8.1.12) Gecko/20080226 SUSE/2.0.0.12-1.1 Thunderbird/2.0.0.12 Mnenhy/0.7.5.666 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Only the overlay notifier callbacks have a chance to potentially get hold of references to those two resources, but they do not store them. So it is safe to stop the intentional leaking. See also https://lkml.org/lkml/2018/4/23/1063 and following. Signed-off-by: Jan Kiszka --- Ideally, we sort out any remaining worries during the 4.17-rc cycle. drivers/of/overlay.c | 13 ++----------- 1 file changed, 2 insertions(+), 11 deletions(-) diff --git a/drivers/of/overlay.c b/drivers/of/overlay.c index b35fe88f1851..3553f1f57a62 100644 --- a/drivers/of/overlay.c +++ b/drivers/of/overlay.c @@ -671,17 +671,8 @@ static void free_overlay_changeset(struct overlay_changeset *ovcs) of_node_put(ovcs->fragments[i].overlay); } kfree(ovcs->fragments); - - /* - * TODO - * - * would like to: kfree(ovcs->overlay_tree); - * but can not since drivers may have pointers into this data - * - * would like to: kfree(ovcs->fdt); - * but can not since drivers may have pointers into this data - */ - + kfree(ovcs->overlay_tree); + kfree(ovcs->fdt); kfree(ovcs); } -- 2.13.6