Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp643125ybz; Wed, 22 Apr 2020 05:21:42 -0700 (PDT) X-Google-Smtp-Source: APiQypIPD8hjPQHaS4arnpF8xPOp2nuw+xGl0Ffdbaq6JU7TG4TMPrwlP71Ggt7T/wPCaGg+rXu5 X-Received: by 2002:a17:906:4dc8:: with SMTP id f8mr26263391ejw.23.1587558101837; Wed, 22 Apr 2020 05:21:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587558101; cv=none; d=google.com; s=arc-20160816; b=zNcj1xq369dUj2SX0e/srhFMxrfqcTbmCjPd+b1y4DW3JclAt9Bl/z/MLTYJIK5NUm NAowuQrQwuJ1DSMgATvTNSPOtV2IzbMXX6ZOAD6XBKBUZYrQMCAjaKruUuwbxWG9eU2F 4Fjwi26caMeW/WnwlI7fXJSgxd7IcBBJcXH+yiLuyH3tCWsy9wG3mgCAjMnLDgonmFA9 ZmpcZC+Lv0v9BBBluW43IUldNHvZp61ZMLvHu5T5QJLMdIWI6iZIwvtZrASJSjChCtyd cir0uvRPXlVZia+bVUXG626ehqfEnb2T56Mvf/hrtHl532ewIs7bhWlBsU0lLk4ArbNb Gw6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IDXNfqW7RjhKzR4bdma7rqtx/8ClqeyNwQfqmjFdL2k=; b=AXl240c4u8qDgvyIVLgE5pPCLHjYpQX46LO1ngz3Ni08WB+0IHQyJPGe2AMUkGjFrZ ZplFcjVDnuA5hFFy4zYP7sy13PhsxzpC+/S71KkkIY0k5n7i7gBzggP4wzqcF4PUvlh+ Om3+yFdaFluf2D4DZEwzAxLirhqEbvuWzf4euC9mHzfHuNW4Ig/PhBqaTW4zOR7FoDAR ZI80TD/fNbOSaSDP4oybb8KzYzDka6CuPOEiFR92fMpubxsuyADr6nDne8Jg6CBu7GvQ S/zgxLlvoa23NQRpMZu4FNnNbKBRE2G6YzlsqnUDfLFs7lMPlQFQZcb4enYiFCtT9V07 Bbsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zpM2kXlt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g88si3211295edd.505.2020.04.22.05.21.18; Wed, 22 Apr 2020 05:21:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zpM2kXlt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730376AbgDVKXn (ORCPT + 99 others); Wed, 22 Apr 2020 06:23:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:59828 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730327AbgDVKXW (ORCPT ); Wed, 22 Apr 2020 06:23:22 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F41342076B; Wed, 22 Apr 2020 10:23:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587551002; bh=iXMXhubN516VSHJjbodtOZrbU9W45/hHHrxQFuVpNxU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zpM2kXltrfRT2ZvWUaeUB+LtBhsZF9peA41BDUObe1ROVrSFMy1RqpLYkwsjQXghj A9mBHVk7zECrupVdQ+ALNxHrllj+dvggaYMu93P+RWv0+igO4KuItj2nhhDEtauVX+ C75ZAVlpKhHU4HNQj194Od6XBwGJB3KUa0t/Ydz4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Erhard F." , Frank Rowand , Rob Herring Subject: [PATCH 5.6 024/166] of: overlay: kmemleak in dup_and_fixup_symbol_prop() Date: Wed, 22 Apr 2020 11:55:51 +0200 Message-Id: <20200422095051.167628110@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095047.669225321@linuxfoundation.org> References: <20200422095047.669225321@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand commit 478ff649b1c8eb2409b1a54fb75eb46f7c29f140 upstream. kmemleak reports several memory leaks from devicetree unittest. This is the fix for problem 4 of 5. target_path was not freed in the non-error path. Fixes: e0a58f3e08d4 ("of: overlay: remove a dependency on device node full_name") Reported-by: Erhard F. Signed-off-by: Frank Rowand Signed-off-by: Rob Herring Signed-off-by: Greg Kroah-Hartman --- drivers/of/overlay.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/of/overlay.c +++ b/drivers/of/overlay.c @@ -261,6 +261,8 @@ static struct property *dup_and_fixup_sy of_property_set_flag(new_prop, OF_DYNAMIC); + kfree(target_path); + return new_prop; err_free_new_prop: