Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp576844ybz; Wed, 22 Apr 2020 04:04:11 -0700 (PDT) X-Google-Smtp-Source: APiQypJC8XoEKDnNOYtvukvcqs9IA8R5QtIuo4oKDPAUZrt1cVqY52nh1BkTGEjUlG69Ttkot8qK X-Received: by 2002:a17:906:4310:: with SMTP id j16mr12154327ejm.102.1587553450913; Wed, 22 Apr 2020 04:04:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587553450; cv=none; d=google.com; s=arc-20160816; b=BXHyjY7HNnEWhKI8TeRilWPaMNb8Ts7S63WMFkLAcegdnuGMhyw7wi5T4t6XygNmLu wMlhPXaXNLgZg40wXtFpJZIdcoYwbfSPyAiMv5hRvLL0L0M7s9LHZsf/0nCDcXSg3O1V nA7/bvm3BeCwi2IdOJMiR2jOV+TOCsRmcb6XGw7QjKSE9aSmALrKRKHyMM0oM0ciFXYm p8rtauF0yTc1AhMS9ipVJm+gQKasyTQu6txoA2LtgUcLmM9w5qgg+GNLA6oopK9e/wsM D/5ddP+xxE0+J8cykyJudhThc8WbJe5/8TM1gHdK17lLM24VtDmjEhOvlMUAvYLglmpO LK8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=MiiTWPnOUJW9cyKJRmVRRZrXQzMP35Wo/kA1hU4Jzp0=; b=VHRnqNROnzgo3t9YVxBgfvne/52V4gveg5UXrafi/MGwgXVbRn/DK6A5vFsUbAJVIT MCTTH1VMuhXLl3D7ziR6Nd8jjIpeinmi1LixtgCavj0PTH55MmezJJ7qY81yz0gQtAFh RRK3tNbKOj0WtQGeNOs2PjFwuaxwlpBhMACHrmAGdXHDnqnbqxUmceZIaQ8YYOYUgMDh b2w3yFOJU2hqxiAAg2mx6vZfsmBdt/C8QTo7CaGsSlbZ00lBfa/uH7b49LDyG6RF53l7 XhwxW40eSX45Wl6+OXyHsFYq0UvHtDCWCYcZhvdpXHVNR2R5AgQSPEQzgjMzP/Gw1yKd al2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vDwZ8Sqo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cw2si3263569ejb.322.2020.04.22.04.03.37; Wed, 22 Apr 2020 04:04:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vDwZ8Sqo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732227AbgDVLBB (ORCPT + 99 others); Wed, 22 Apr 2020 07:01:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:50362 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726841AbgDVKBo (ORCPT ); Wed, 22 Apr 2020 06:01:44 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4658720735; Wed, 22 Apr 2020 10:01:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587549703; bh=MlK/zlRV4Vbr+VBF6tClXVnQyWd7bATBm1JqPTpxmts=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vDwZ8Sqo6zZj5plH6QQKaJ4uvOOYgbYyvjPrkza9YB5jObopPxYQQrkiOwackRqr1 ISLuLbAF6z0DNvW11XxSmhSHT13kywLPTgkaQ/063Da98RNxf7Q2LUNkfcT6q9k5y3 mdsFdz78kYzTYG6q+wqSKZzaqLSRXkeeKQ9r9Fzs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Erhard F." , Frank Rowand , Rob Herring Subject: [PATCH 4.4 073/100] of: unittest: kmemleak on changeset destroy Date: Wed, 22 Apr 2020 11:56:43 +0200 Message-Id: <20200422095036.308047614@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095022.476101261@linuxfoundation.org> References: <20200422095022.476101261@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand commit b3fb36ed694b05738d45218ea72cf7feb10ce2b1 upstream. kmemleak reports several memory leaks from devicetree unittest. This is the fix for problem 1 of 5. of_unittest_changeset() reaches deeply into the dynamic devicetree functions. Several nodes were left with an elevated reference count and thus were not properly cleaned up. Fix the reference counts so that the memory will be freed. Fixes: 201c910bd689 ("of: Transactional DT support.") Reported-by: Erhard F. Signed-off-by: Frank Rowand Signed-off-by: Rob Herring Signed-off-by: Greg Kroah-Hartman --- drivers/of/unittest.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/drivers/of/unittest.c +++ b/drivers/of/unittest.c @@ -544,6 +544,10 @@ static void __init of_unittest_changeset mutex_unlock(&of_mutex); of_changeset_destroy(&chgset); + + of_node_put(n1); + of_node_put(n2); + of_node_put(n21); #endif }