Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp841576pxb; Tue, 3 Nov 2020 14:07:02 -0800 (PST) X-Google-Smtp-Source: ABdhPJx26Y1HUkIFOzlTtDDViXrap2/0XACrQdxDgmgjElLDdZqPQJfrYgpjYlg5A7pb0p3Dn8a/ X-Received: by 2002:a05:6402:1684:: with SMTP id a4mr24707695edv.319.1604441221780; Tue, 03 Nov 2020 14:07:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604441221; cv=none; d=google.com; s=arc-20160816; b=YxliSdFHZ54dYVT0+gLP3VHT+5LKgGmsoH+iRUmydqoz0PAsukUWF2BX/VOKqZsy+9 lfi+uqFrZK306OOuhaR0QUdu5UIuT+vq3iZ3DcllX/tS3h0tAZIPrp1sBWLg9EQUH1le Lmax7o5a6vtz1xb01/pNIQZv3Ykjaxl2Y6UE7LEFaCbidFCY3/vDeEst+Cx76OyjZ0gc +9wxjINxCS52BqW9hPQy8Rn+63ClokQZbJ2uK1uu/Fc+XkNbOrJjb6dDBQsU2dFfCuCR OFu4FL7HGN1FcJBXAungXw+TDhgHMkXKGx2TfokOY5xo78jPEW2rBExkzeAVc/488TR7 G9FA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=eCCNYZEPUSk5aFLaVXSL7568h9pZMEu6n8+G81fBKQE=; b=JZzxZ+sxQ3aShOuxfkXN2NQ+hwj9vZgZpMBsnkXYRrCF1PaVV2X96SuX23k0QR11Cd pfNZUOWhGB5ecoaEy0UQeXK65jPeLAcFnAB6RgwJWtTzRMmUYfQz/tx8QAac6ELrrf5L cZyEh4DcVQ59g3RGkPmYLleo2Js0snsi9yU1pd/rH0JG2i9nGBlUEpX4+X4KgDbrKKCE MUyEutsLJnYPK3oFuewLTkz/N1RKax/CTlej3CuVygyMqca6Z9MKEj55vouudV4exACA tr1+hJIOtlIDMbz5ttYv6TFTdLjDTIvP7yxJPZxcZeMGLIOcLIghI81O3nfsP1v3OBXN 2qfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n1Iukus4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r26si115671ejb.114.2020.11.03.14.06.38; Tue, 03 Nov 2020 14:07:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n1Iukus4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730232AbgKCWEm (ORCPT + 99 others); Tue, 3 Nov 2020 17:04:42 -0500 Received: from mail.kernel.org ([198.145.29.99]:56970 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729957AbgKCUnX (ORCPT ); Tue, 3 Nov 2020 15:43:23 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 740D0223AC; Tue, 3 Nov 2020 20:43:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604436202; bh=YhoGuxyaChjXmW6WNgO1uKqYXWUP9+s3XpmLtgoDT58=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=n1Iukus4p6spojJ8CoRn60FjgtwFkbjqi4G22x2b5x0jxPOQoY3A0spK/DtMYxIeM IipNEY2JSzMplsIj9N6VWKH/o/7dPVHhMTO7DloDXqOWNOdHMoH+gkyyAIx9Qjrbgx QXmEvQycBoC6AtI35XyX+SeIagMXFvKCBrC3IEss= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Murphy , Tero Kristo , Stephen Boyd , Sasha Levin Subject: [PATCH 5.9 148/391] clk: ti: clockdomain: fix static checker warning Date: Tue, 3 Nov 2020 21:33:19 +0100 Message-Id: <20201103203356.818168760@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203348.153465465@linuxfoundation.org> References: <20201103203348.153465465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tero Kristo [ Upstream commit b7a7943fe291b983b104bcbd2f16e8e896f56590 ] Fix a memory leak induced by not calling clk_put after doing of_clk_get. Reported-by: Dan Murphy Signed-off-by: Tero Kristo Link: https://lore.kernel.org/r/20200907082600.454-3-t-kristo@ti.com Signed-off-by: Stephen Boyd Signed-off-by: Sasha Levin --- drivers/clk/ti/clockdomain.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/clk/ti/clockdomain.c b/drivers/clk/ti/clockdomain.c index ee56306f79d5f..700b7f44f6716 100644 --- a/drivers/clk/ti/clockdomain.c +++ b/drivers/clk/ti/clockdomain.c @@ -148,10 +148,12 @@ static void __init of_ti_clockdomain_setup(struct device_node *node) if (!omap2_clk_is_hw_omap(clk_hw)) { pr_warn("can't setup clkdm for basic clk %s\n", __clk_get_name(clk)); + clk_put(clk); continue; } to_clk_hw_omap(clk_hw)->clkdm_name = clkdm_name; omap2_init_clk_clkdm(clk_hw); + clk_put(clk); } } -- 2.27.0