Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp642782ybz; Wed, 22 Apr 2020 05:21:18 -0700 (PDT) X-Google-Smtp-Source: APiQypLs/3VOOyOYyzQK0fALQ8Ed/EHrg7MIkxuYSz0aFB2ye3RNcZXWhSiwrWsHZfgD9yFAya4N X-Received: by 2002:a17:906:1ec3:: with SMTP id m3mr7251801ejj.88.1587558078532; Wed, 22 Apr 2020 05:21:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587558078; cv=none; d=google.com; s=arc-20160816; b=ITpK8PajVJHqlf1fHBj/39Spr8yVomGCw08jJLv4sBMgxvg6D9AeyR4Lt0HY/A5Mxy RgWYSn8c966ae1DIHiyIImKczCfSL2dzCHYXpPe3lZIDSSKw/kKHjHwxeMXJGIQ0uPEn Qv97qWJhz8qiy2KCp4JlKZcoJH4xgHFiYaCy8lI5F9ZOSlTkNBdAn0rn5Jqgc8K8nKAt U6UqfaOD8jxw1x4HQqOJ6XUw/br1KAT6gO95K63Qfgrh1LkZSXhBMneTYrEKieaO/V3Z AKdXEdV30EWr946aCL8sESgiU5O6leh5AfPhtTdMyofWsw6YcyTuo2Th9dvbmFUBaRne VOZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=egZU9R4CKbvLSgk+lONzzEy2LT6we3KjhSPgTY4i2V0=; b=mGhy0XZ15pskcqsZeg+P5jSDwsKKrx7T4p0b/PMSypkEVLGb1km9ffxnr/PrwLFLop 5g09EzV1eqMtK1hNm8vHfbJZfgxWsnQcds2bWoJoQpwbHH9gHmYVeeJuQuONvIzJd+D1 dfU4Mmiu2xEF4Fp8zSCfFseE+J4rhrwkPfjL/0ZG2AVkbVODOjalj+kPqOZezk4TFRwM iTg36yd4zKpMDKE/RIu2s6c/oU5mSgPPkvKnvzI4blwzU04Ln2Xv3hLbo6Sq7fKeg3zh COsR1k5Mnkbd4NysiEWwzsyrB5T2M45xtxrVWnshN/rgTzOzOA+oBr6dR7yjU6BT45dt PVaw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=c0RVi1CK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o30si3294821eda.0.2020.04.22.05.20.53; Wed, 22 Apr 2020 05:21:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=c0RVi1CK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729668AbgDVKQm (ORCPT + 99 others); Wed, 22 Apr 2020 06:16:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:51496 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729740AbgDVKPy (ORCPT ); Wed, 22 Apr 2020 06:15:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6D49620575; Wed, 22 Apr 2020 10:15:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587550553; bh=UIBcd+yZ43da0Fg8DCYkAQjetLwbCFsNSrD+YwNNLmg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=c0RVi1CK1HuZnYCzgUcTpxIJaTvNrhRTaymUqUZ4ZUHuVTlhj2snj4d0PWr/LbvkF C1BXajcxBYB8gPnnYBjnr7n6STqrx1EX8bjW3qXejCug/yuyxYF0SKVLnj/3vehels vNPYTcpYtdhKhRcJ5ERM5nD8oWizuu9BLaqBBZ6M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Erhard F." , Frank Rowand , Rob Herring Subject: [PATCH 4.19 11/64] of: unittest: kmemleak on changeset destroy Date: Wed, 22 Apr 2020 11:56:55 +0200 Message-Id: <20200422095014.643788327@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095008.799686511@linuxfoundation.org> References: <20200422095008.799686511@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand commit b3fb36ed694b05738d45218ea72cf7feb10ce2b1 upstream. kmemleak reports several memory leaks from devicetree unittest. This is the fix for problem 1 of 5. of_unittest_changeset() reaches deeply into the dynamic devicetree functions. Several nodes were left with an elevated reference count and thus were not properly cleaned up. Fix the reference counts so that the memory will be freed. Fixes: 201c910bd689 ("of: Transactional DT support.") Reported-by: Erhard F. Signed-off-by: Frank Rowand Signed-off-by: Rob Herring Signed-off-by: Greg Kroah-Hartman --- drivers/of/unittest.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/drivers/of/unittest.c +++ b/drivers/of/unittest.c @@ -772,6 +772,10 @@ static void __init of_unittest_changeset unittest(!of_changeset_revert(&chgset), "revert failed\n"); of_changeset_destroy(&chgset); + + of_node_put(n1); + of_node_put(n2); + of_node_put(n21); #endif }