Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp332334ybx; Wed, 6 Nov 2019 01:08:42 -0800 (PST) X-Google-Smtp-Source: APXvYqyNrM4HGVYaFpecEKfDg65DHZO3DkpUCMsdqdqd1UvOrV5KONsbuHVKK0Ul9DZn7kufeyVw X-Received: by 2002:a17:906:7257:: with SMTP id n23mr34066431ejk.132.1573031322642; Wed, 06 Nov 2019 01:08:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573031322; cv=none; d=google.com; s=arc-20160816; b=Oib8k4uIqVXvIunxH8YI+KfmlAcyX9J6mGrBS3KrR1eHert/wcqaCX/CsNmMFzbQV/ ws0jEsP7lADj3rt3NNdMUhz4l6zPsbWxJNGiD7cLNboj3jKQgsgmAQvBRgsbZnp/owH7 elGVNWay77Jyqp+I6aDwWdr5riEG+r6LnIfRevH/ByVw+Nc6aR8wbBkwHFBmvVbwxGO6 TDKgeHTdOL2Yg8ta6WcSyKs5nZJsAR88U2BGlYRxS4KOQ2AffhQFuqL8gk5Hd7WMrPvI CSiMTF1NPtNHl+Mp7v1yQLLQsAMeTT9ezoULefJSvZkcpQwXLE9nJTLfrrPCKAMv6gQ0 p7Jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=LVOhHMs/wr+gxdr2tMxhn+0iWdAPGiV6nTZS+hhholI=; b=p8Qzagzi6q1qOFhfPf9qVY96jEXbi7EtUesasj6NC9DfvkddMN6+QUTlmcIlstu48a PwLN0mpiEEWJUNr4WHvN0KqP/g+/1wjDUhjNML4dtqvm5cVVAGnfS1H9IXhxw2+Nj8YG eLZRYq71cO7hk3IbjR7otOL3OvVHxKLN+S5gwqgp857YxzpYN09DyxFpoQ9MN/2GMemf EGn/3Qbu4vJpeS91GWARaCJm9CX84vHp1CqXQxWJAee4vQuvBTcwJjdooT0XrYFnvqRd gYxvJV8+EPhi5Vuy6srcib02iRP3VnBFiCTHo0zcW/p+xzjZzmncWFExPyHZ6S5vlu9A IkBQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i24si14888674ejh.35.2019.11.06.01.08.19; Wed, 06 Nov 2019 01:08:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727735AbfKFJGr (ORCPT + 99 others); Wed, 6 Nov 2019 04:06:47 -0500 Received: from metis.ext.pengutronix.de ([85.220.165.71]:49111 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726843AbfKFJGr (ORCPT ); Wed, 6 Nov 2019 04:06:47 -0500 Received: from lupine.hi.pengutronix.de ([2001:67c:670:100:3ad5:47ff:feaf:1a17] helo=lupine) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1iSHH4-0001ZZ-4g; Wed, 06 Nov 2019 10:06:46 +0100 Message-ID: <412b74046c51be6d1228758624b8577453806758.camel@pengutronix.de> Subject: Re: [PATCH] reset: Free struct reset_control_array in reset_control_array_put() From: Philipp Zabel To: Jyri Sarha , linux-kernel@vger.kernel.org Cc: tomi.valkeinen@ti.com, colin.king@canonical.com, treding@nvidia.com Date: Wed, 06 Nov 2019 10:06:45 +0100 In-Reply-To: <7280f9d5-1048-f130-37fd-9a3068f54df7@ti.com> References: <9c8c5c337a9351a561a4bf18f2faa1e9a01b50e6.1572884515.git.jsarha@ti.com> <3a970f3f3518485f58e86f2523e5085f47ec4b15.camel@pengutronix.de> <7280f9d5-1048-f130-37fd-9a3068f54df7@ti.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5-1.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 2001:67c:670:100:3ad5:47ff:feaf:1a17 X-SA-Exim-Mail-From: p.zabel@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2019-11-04 at 21:03 +0200, Jyri Sarha wrote: > On 04/11/2019 18:30, Philipp Zabel wrote: > > Hi Jyri, > > > > On Mon, 2019-11-04 at 18:24 +0200, Jyri Sarha wrote: > > > Fix memory leak in devm_reset_control_array_get(). Free also the > > > struct reset_control_array pointer in reset_control_array_put() not > > > only the reset-controls stored in it. > > > > > > Reported-by: Tomi Valkeinen > > > Signed-off-by: Jyri Sarha > > > --- > > > drivers/reset/core.c | 2 ++ > > > 1 file changed, 2 insertions(+) > > > > > > diff --git a/drivers/reset/core.c b/drivers/reset/core.c > > > index 213ff40dda11..85d9676ee969 100644 > > > --- a/drivers/reset/core.c > > > +++ b/drivers/reset/core.c > > > @@ -748,6 +748,8 @@ static void reset_control_array_put(struct reset_control_array *resets) > > > for (i = 0; i < resets->num_rstcs; i++) > > > __reset_control_put_internal(resets->rstc[i]); > > > mutex_unlock(&reset_list_mutex); > > > + > > > + kfree(resets); > > > } > > > > > > /** > > > > Thank you, this just got fixed in 532f9cd6ee99 ("reset: Fix memory leak > > in reset_control_array_put()"). > > > > Ok, sorry. I just checked the mainline, not the mailing lists etc. No worries, that's perfectly fine. Just letting you know why this patch isn't picked up. regards Philipp