Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp288094yba; Mon, 20 May 2019 08:43:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqyXoYQPaNzNxFL5enp1B/6wQFhA+623lrszR0hVYsEqFxnRV2ZgYuSOQgogoYW1iPJjVoLP X-Received: by 2002:a65:620a:: with SMTP id d10mr22389062pgv.42.1558367029589; Mon, 20 May 2019 08:43:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558367029; cv=none; d=google.com; s=arc-20160816; b=T0OweSwPf8eN2oJjtUzeu2RMCnKJgc3Nywqro/Lv6u9PyCkWHb/JheYJpbqhevf1qz CmqWC0eqr3LS80GxVBqLKivv7NyPsY5a38eiVRrHY7vPqOaqcGzImQnPD2bs8KaoKh6N 9EfS3uaoARmDJoJsPjQL1us4txOTX9idnQLhwOXJF5bwg4SaPT6ncUD4CQUSW6WgfDww jM3ssfDxK3Z9x3YB/q/Ce4PFIjTxOvizraUKnm0D0/+ffJ2VYS54lK9CFK/63SYc5Ih7 DY3cDZQ9Stvo7wHjVKMZ8Au8bHTekrtoOslmBpaHzTTnjzqV4KS22FtAt4FR8IaJv74+ bOMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kRmIOYbGmNv74y6JhFKHCn447ewIieJxa2x4TtKrflI=; b=NcMRr1QoJKml6ESMmFkhzCllHMNWSGxf2niSQJPdje5uefGkZZAamjxatLQzLvlvhq HFZer+BiMBvQg3JQaPzTNX8JByWlGDaxknmGlW+9Bfn0OXZtQDKAiLXe8G0D5iHidlTa +O+VTFhrj73vjBE2+PisSitkGPB76lBadPz5Yd+3ZuGDBZ5g2oDAq4nc4jRWYBvDl3Wf Wjbh03begByI3D8X00kKTI06sylUHo7oXFnzfNjOnc5V4U9slYIIieN1QCxOlf+ZsWwF 3UMoJw3zaOfEMNoecp2koKV3wMZBAT2cTaYr0d+dCi6r2Jr0Rb8a+Bk+PdLUWXuRP2N4 U6qA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Dq3dT3+E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1si18460054pln.354.2019.05.20.08.43.33; Mon, 20 May 2019 08:43:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Dq3dT3+E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389197AbfETMZz (ORCPT + 99 others); Mon, 20 May 2019 08:25:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:41162 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389179AbfETMZw (ORCPT ); Mon, 20 May 2019 08:25:52 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DB358214AE; Mon, 20 May 2019 12:25:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558355151; bh=GGte2Vf7wiE+9+k9pkk8adb1T/XIjxDDA2GrzUEYLyo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Dq3dT3+EhXecu9vfsVG2XeAAu5NLLss8m74Zxr9llKz3jakPvwXR8J0KpxnxOGlR+ QAQj54WIZqFtEAF49VgTdbbs+3Yi1j6zXJbdnP912HDyLGCASg2+EVRaMykyDwoox8 peiV1FlESwCGQ0f8d39EwtR8TmNaw1KValqceDIc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wen Yang , Krzysztof Kozlowski Subject: [PATCH 5.0 011/123] ARM: exynos: Fix a leaked reference by adding missing of_node_put Date: Mon, 20 May 2019 14:13:11 +0200 Message-Id: <20190520115245.901703334@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190520115245.439864225@linuxfoundation.org> References: <20190520115245.439864225@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wen Yang commit 629266bf7229cd6a550075f5961f95607b823b59 upstream. The call to of_get_next_child returns a node pointer with refcount incremented thus it must be explicitly decremented after the last usage. Detected by coccinelle with warnings like: arch/arm/mach-exynos/firmware.c:201:2-8: ERROR: missing of_node_put; acquired a node pointer with refcount incremented on line 193, but without a corresponding object release within this function. Cc: stable@vger.kernel.org Signed-off-by: Wen Yang Signed-off-by: Krzysztof Kozlowski Signed-off-by: Greg Kroah-Hartman --- arch/arm/mach-exynos/firmware.c | 1 + arch/arm/mach-exynos/suspend.c | 2 ++ 2 files changed, 3 insertions(+) --- a/arch/arm/mach-exynos/firmware.c +++ b/arch/arm/mach-exynos/firmware.c @@ -196,6 +196,7 @@ bool __init exynos_secure_firmware_avail return false; addr = of_get_address(nd, 0, NULL, NULL); + of_node_put(nd); if (!addr) { pr_err("%s: No address specified.\n", __func__); return false; --- a/arch/arm/mach-exynos/suspend.c +++ b/arch/arm/mach-exynos/suspend.c @@ -639,8 +639,10 @@ void __init exynos_pm_init(void) if (WARN_ON(!of_find_property(np, "interrupt-controller", NULL))) { pr_warn("Outdated DT detected, suspend/resume will NOT work\n"); + of_node_put(np); return; } + of_node_put(np); pm_data = (const struct exynos_pm_data *) match->data;