Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp667418ybz; Fri, 1 May 2020 06:29:43 -0700 (PDT) X-Google-Smtp-Source: APiQypL0eyiifg8HgcEKFHSX3VCNxCJC7Y1fZ/r9eyA94yQA+ZmTgZ+tWsfyKKtHTp6C/ApeiRPz X-Received: by 2002:a17:906:558a:: with SMTP id y10mr3326007ejp.192.1588339783337; Fri, 01 May 2020 06:29:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588339783; cv=none; d=google.com; s=arc-20160816; b=Sxt43OEdSY4Dow8BKhggRfIQe5su/5DUUZKilw0jfUvgC2QuzrC+tdTrScQsmWcCib YVpoWywBq/gpTiwHEPgYpdj76xhUTtIDVD+mKnlc4lGVUEIU0sIwOjBwQcMWoOpMuybe M3L9jGMw9yqdwGf0ihAzgHeZ0myCgOT0sfJVS5cSQMsGoIYXD+a4ViG9XWOApr++G+gv 76u8AXlapK75l4rMQ1Cr/iBJyTiHS/J2qn4DyFRDuPKuzAWD2IvUAG/DzKnBP4KS4PcV jKSLIpQvMh7p9ob2vpcvLeL3WsGRGG8e1mCwTuRmtqWcBSbKLz/fYZNA/Ez2AhA5Dwz6 R00g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VdadYXt2l/lKSZ5MNo6YW3EdoEXF0d9mfUAcxoPvZCE=; b=KxyAnpL07loFTm7So0bEROdsLa3T60Mm8aWs+szC7CSRfVEZOpZpht2WlUt0e3Ob7q sbXOrdlj9eWo3PAOcdm6fuoRGPecvTsGZQ97TBKTmupTFoSioS7ZB3zHA7bmnlm8bjBC 16u5979Iy9g0MX/VQrq5BRnBazKQhOHu4JO96ck3z5JMtpQlM33wa/ZVk7QEf2DCv5Oj nOD/14c2dqaHeLtcIHcghMSRus4PNcvSwQ7QFGBbzm/2hKhiB1GSpIJTZ6oQWd/kCQKI a/t3ulpaBdJSowaK7II6+G5e7pSkcskn4XfFBVG9ZsAWpSZeayvFgtOaB54RgimAe/b9 +zWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hnemTW6d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ly8si1967886ejb.254.2020.05.01.06.29.20; Fri, 01 May 2020 06:29:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hnemTW6d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729411AbgEAN1J (ORCPT + 99 others); Fri, 1 May 2020 09:27:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:49188 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729392AbgEAN1G (ORCPT ); Fri, 1 May 2020 09:27:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2FD37208D6; Fri, 1 May 2020 13:27:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588339625; bh=6ztxaQqiGIA1m1sIcnvYH1NX9Mz0deoFS5BI/XcdXkY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hnemTW6dVImfZ+WDfFb+iZR264K/4CMfNpohGbUD5S6n0vJEPYn2oW0wTEj49Qm1O IKuZAtZewe4iU+bTmN8gYuPwddNG38LyxPtXnfThjvMSnrebgvBHNEicKWqdRefS0z 4Tk/08rvJNmuNkX0IU0XLNm876UePZR2z/hzRZCE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Erhard F." , Frank Rowand , Rob Herring , Sasha Levin Subject: [PATCH 4.4 65/70] of: unittest: kmemleak on changeset destroy Date: Fri, 1 May 2020 15:21:53 +0200 Message-Id: <20200501131532.508180734@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200501131513.302599262@linuxfoundation.org> References: <20200501131513.302599262@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand [ Upstream commit b3fb36ed694b05738d45218ea72cf7feb10ce2b1 ] kmemleak reports several memory leaks from devicetree unittest. This is the fix for problem 1 of 5. of_unittest_changeset() reaches deeply into the dynamic devicetree functions. Several nodes were left with an elevated reference count and thus were not properly cleaned up. Fix the reference counts so that the memory will be freed. Fixes: 201c910bd689 ("of: Transactional DT support.") Reported-by: Erhard F. Signed-off-by: Frank Rowand Signed-off-by: Rob Herring Signed-off-by: Sasha Levin --- drivers/of/unittest.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/of/unittest.c b/drivers/of/unittest.c index 91e6891b777b6..109497dbfba08 100644 --- a/drivers/of/unittest.c +++ b/drivers/of/unittest.c @@ -544,6 +544,10 @@ static void __init of_unittest_changeset(void) mutex_unlock(&of_mutex); of_changeset_destroy(&chgset); + + of_node_put(n1); + of_node_put(n2); + of_node_put(n21); #endif } -- 2.20.1