Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp1890044rwn; Fri, 9 Sep 2022 05:46:36 -0700 (PDT) X-Google-Smtp-Source: AA6agR4sHjrQqHgEpmTqM8RLythNAVZHI2UjRVCrZyiv2lC7hEMJ/FMaSci4W8CX5yHVBS5HYCYb X-Received: by 2002:a63:1444:0:b0:430:980f:e511 with SMTP id 4-20020a631444000000b00430980fe511mr11971866pgu.482.1662727595766; Fri, 09 Sep 2022 05:46:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662727595; cv=none; d=google.com; s=arc-20160816; b=tOjTBIdoLu+GcOEWrm510twOWMPfWnAOUHrAEV1PrY6qPHM1nS5av3H8nkhVJ9NYWG sF3CIU0wgG+Kpj3tbP1ofFrwjIPjHb3hWLmV9uAbGWmBJitHzjjPaK+WNsjbXc0I7xU1 D5xwm96tz8ijVXcfx60Th852Nw8/qaThfYW1BlltIzCi84gp+Ahia5Tt7LtCLYLRhAmc a86TEK97+b/XPudmjckl03w3Xowag5pr7H5Flb5yAAmz190tD0QzjYV7zJne+zO7DeAv UjSH3S7IW5+LCAp9StTyuipfQ16RaAiZ4mvDt6Mg2l92pVFgzQ3ez/pXwC6raK5p6hSS lQvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version:date :message-id:subject:references:in-reply-to:cc:to:from; bh=fCD96scYS/7+m1pWN7keDwcSkVBZFLmT2wcAoeJopdw=; b=0oiHeIo1/Z19MSz5CrAE2YWq5s0BvbKzk7z0CiGwdeYAnmLPXMyL2Y2V/aiHIrw0mf udlNTj8lP9BwoecBGPKKLXV4H1NwrTmTN0nw1N8wEQSscFQcK9bRgNMKnXtYvTIhaXko VgHbUjdzRL+kgBMx6wfu9pO406BI5Jf8VYZUjUa3rlobHeGkANIMsHGyf5Ou0Q5TdTAf JYxP1uzEQMXFkbjPEp5Kh0AHuVrw8X7uWgs9oQjaEa5cHhSV1qS9BNWas4bWmMqhfGYg dy4Tz9EeTSPbdoJxgV+icSEo0zFOyC5D40Q7X6tqFaDV9W7CVye6LSXL9t0dVopf9lMZ bIeQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m9-20020aa79009000000b0052adcf5e6dasi426534pfo.186.2022.09.09.05.46.22; Fri, 09 Sep 2022 05:46:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230471AbiIIMLx (ORCPT + 99 others); Fri, 9 Sep 2022 08:11:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52454 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230374AbiIIMKw (ORCPT ); Fri, 9 Sep 2022 08:10:52 -0400 Received: from gandalf.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9224C138648 for ; Fri, 9 Sep 2022 05:10:21 -0700 (PDT) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4MPFDp6ytRz4xcf; Fri, 9 Sep 2022 22:10:18 +1000 (AEST) From: Michael Ellerman To: paulus@samba.org, christophe.leroy@csgroup.eu, Liang He , atrajeev@linux.vnet.ibm.com, benh@kernel.crashing.org, mpe@ellerman.id.au Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org In-Reply-To: <20220618071353.4059000-1-windhl@126.com> References: <20220618071353.4059000-1-windhl@126.com> Subject: Re: [PATCH] powerpc: perf: Fix refcount leak bug in imc-pmu.c Message-Id: <166272522850.2076816.2773443283064674848.b4-ty@ellerman.id.au> Date: Fri, 09 Sep 2022 22:07:08 +1000 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 18 Jun 2022 15:13:53 +0800, Liang He wrote: > In update_events_in_group(), of_find_node_by_phandle() will return > a node pointer with refcount incremented. We should use of_node_put() > in fail path or when it is not used anymore. > > Applied to powerpc/next. [1/1] powerpc: perf: Fix refcount leak bug in imc-pmu.c https://git.kernel.org/powerpc/c/0dd8d2c8066e672244975c171816fdd9dae87721 cheers