Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp644462ybz; Wed, 22 Apr 2020 05:23:05 -0700 (PDT) X-Google-Smtp-Source: APiQypKawKcZ/BfiO1Td9a9qGk/UGKWYriwAuGkamDuzqSbHJXSFdjlPRd8LDEeyk5rZaIDWWKor X-Received: by 2002:aa7:c2ce:: with SMTP id m14mr24297315edp.305.1587558185721; Wed, 22 Apr 2020 05:23:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587558185; cv=none; d=google.com; s=arc-20160816; b=UXCutjG8Rcz8i4T4bWLkbR8LDz668ZYbU63xA+R6veuuaFBHs0mDneqaiOYeTtP8Sg bjxb06qlpaPpsYxzhOLNcKc13QZM/LL8AB0F1uwEwwuQp0KB2P3qEt2gfRnneCzdopvW FlqCM87765Gj50qHKj+QlP9mPMmitmbyeKJ5EYx1VuDm7euXvVsPeiuy/BVam27T7MFr MKtsymbmxn6/Fv6B/6nEkR38kG8OYp3LUMSHQgX4lauJ1obD3c2CfuODcT0k+67KaJpY hIZblOEjqSkWdByJJLaC59pUovLuGO1nGWnmnEjjHY2pU0+WNtFfTmoqfBxINVhZ78OH X6AA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3d94TvLICoKrwC0eu5fGww32pcIj/NxwlsPde4cnLl8=; b=SYWLzr6GERsZ2eQ+WVMHmSPQG4KK75burMHN9LOrjJbT/+s2WeEbFhBNekFL3DeSGV KNJ9wG9Dsik8+1LNQQSL2IdmZoX1snDNRpXHz4Ut6CRDz5aXLQ2kwUJ/bfjoCQd7UETW 87oN40SkPqPPIRb/mRRs5WtLr306NNm+GdIpuEfHUdNEk2wfkXKHzEaQGuzi2wfCQtRE Cna2KSYaZdGvdvJtE3HaWKpSQJUMgKUKhiFIh7TBmYmxzoJy0OA/uotaQAyifnKQX6Kn dfiBAlUAf9mY/yU6pghf5oUisf0CogxCCTuhGXs4HXAsFWUHAz5La+MlHDSCfv6ToVHd BnxQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0SArciEd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a4si3576096eje.61.2020.04.22.05.22.42; Wed, 22 Apr 2020 05:23:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0SArciEd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731472AbgDVKi3 (ORCPT + 99 others); Wed, 22 Apr 2020 06:38:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:58434 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729922AbgDVKWG (ORCPT ); Wed, 22 Apr 2020 06:22:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9D3622084D; Wed, 22 Apr 2020 10:22:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587550921; bh=qf2dcxdlSyp8hF1Man+929JVoDmyuznROXXiamjfelU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0SArciEdBcH5Tjk59Uz/gxC12j+VRGXnwZ8p35x/bbPY9Uxge1Oxta5SwaZh1LVIE ILzmvtOK60/JQrjOEJ8n2tV1b2WVhNreOhi9KNrDJ37vSJDCN042QXh9fmDapJmLzq 4i31qH24ePutD9tYBB0TjPf8vnFmZ6+DOdfcmumQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Erhard F." , Frank Rowand , Rob Herring Subject: [PATCH 5.6 021/166] of: unittest: kmemleak on changeset destroy Date: Wed, 22 Apr 2020 11:55:48 +0200 Message-Id: <20200422095050.780723107@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095047.669225321@linuxfoundation.org> References: <20200422095047.669225321@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand commit b3fb36ed694b05738d45218ea72cf7feb10ce2b1 upstream. kmemleak reports several memory leaks from devicetree unittest. This is the fix for problem 1 of 5. of_unittest_changeset() reaches deeply into the dynamic devicetree functions. Several nodes were left with an elevated reference count and thus were not properly cleaned up. Fix the reference counts so that the memory will be freed. Fixes: 201c910bd689 ("of: Transactional DT support.") Reported-by: Erhard F. Signed-off-by: Frank Rowand Signed-off-by: Rob Herring Signed-off-by: Greg Kroah-Hartman --- drivers/of/unittest.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/drivers/of/unittest.c +++ b/drivers/of/unittest.c @@ -777,6 +777,10 @@ static void __init of_unittest_changeset unittest(!of_changeset_revert(&chgset), "revert failed\n"); of_changeset_destroy(&chgset); + + of_node_put(n1); + of_node_put(n2); + of_node_put(n21); #endif }