From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from a.ns.miles-group.at ([95.130.255.143] helo=radon.swed.at) by bombadil.infradead.org with esmtps (Exim 4.80.1 #2 (Red Hat Linux)) id 1Xxa76-0004kv-Co for linux-mtd@lists.infradead.org; Sun, 07 Dec 2014 11:34:57 +0000 Message-ID: <54843B48.6020701@nod.at> Date: Sun, 07 Dec 2014 12:34:32 +0100 From: Richard Weinberger MIME-Version: 1.0 To: Tanya Brokhman , dedekind1@gmail.com Subject: Re: [PATCH 1/6] UBI: Fastmap: Fix memory leaks while closing the WL sub-system References: <1417347340-6872-1-git-send-email-richard@nod.at> <1417347340-6872-2-git-send-email-richard@nod.at> <54840C44.4090406@codeaurora.org> <548423E3.8010106@nod.at> <54843AE2.6070608@codeaurora.org> In-Reply-To: <54843AE2.6070608@codeaurora.org> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Cc: linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org List-Id: Linux MTD discussion mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Am 07.12.2014 um 12:32 schrieb Tanya Brokhman: > On 12/7/2014 11:54 AM, Richard Weinberger wrote: >> Am 07.12.2014 um 09:13 schrieb Tanya Brokhman: >>> On 11/30/2014 1:35 PM, Richard Weinberger wrote: >>>> Add a ubi_fastmap_close() to free all resources used by fastmap >>>> at WL shutdown. >>>> >>>> Signed-off-by: Richard Weinberger >>>> --- >>>> drivers/mtd/ubi/wl.c | 21 ++++++++++++++++++--- >>>> 1 file changed, 18 insertions(+), 3 deletions(-) >>>> >>>> diff --git a/drivers/mtd/ubi/wl.c b/drivers/mtd/ubi/wl.c >>>> index c2822f7..47b215f 100644 >>>> --- a/drivers/mtd/ubi/wl.c >>>> +++ b/drivers/mtd/ubi/wl.c >>>> @@ -2064,6 +2064,23 @@ static void protection_queue_destroy(struct ubi_device *ubi) >>>> } >>>> } >>>> >>>> +static void ubi_fastmap_close(struct ubi_device *ubi) >>>> +{ >>>> +#ifdef CONFIG_MTD_UBI_FASTMAP >>>> + int i; >>>> + >>>> + flush_work(&ubi->fm_work); >>>> + return_unused_pool_pebs(ubi, &ubi->fm_pool); >>>> + return_unused_pool_pebs(ubi, &ubi->fm_wl_pool); >>>> + >>>> + if (ubi->fm) { >>>> + for (i = 0; i < ubi->fm->used_blocks; i++) >>>> + kfree(ubi->fm->e[i]); >>>> + } >>>> + kfree(ubi->fm); >>> >>> kfree(ubi->fm_buf)? >> >> No this is not a typo, I kfree() here ubi->fm by design. >> What am I missing? :) > > I think you missed freeing ubi->fm_buf, before (not instead) you free ubi->fm :) No. fm_buf is vfree()d upon detach time. Thanks, //richard