From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754939AbcFPRra (ORCPT ); Thu, 16 Jun 2016 13:47:30 -0400 Received: from mail-pa0-f68.google.com ([209.85.220.68]:32822 "EHLO mail-pa0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751397AbcFPRr2 (ORCPT ); Thu, 16 Jun 2016 13:47:28 -0400 Subject: Re: [PATCH v2] of: fix memory leak related to safe_name() To: Mathieu Malaterre References: <5761BDAD.3060107@gmail.com> Cc: Rob Herring , "devicetree@vger.kernel.org" , linuxppc-dev , "linux-kernel@vger.kernel.org" From: Frank Rowand Message-ID: <5762E629.8060301@gmail.com> Date: Thu, 16 Jun 2016 10:47:21 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/16/16 00:51, Mathieu Malaterre wrote: > Sorry, symptoms not solved. According to kmemleak, I have now: > > [ 661.323100] kmemleak: 100 new suspected memory leaks (see > /sys/kernel/debug/kmemleak) > [ 1260.226120] kmemleak: 1 new suspected memory leaks (see > /sys/kernel/debug/kmemleak) > > # head -40 /sys/kernel/debug/kmemleak > unreferenced object 0xdf5326a0 (size 32): > comm "swapper", pid 1, jiffies 4294892300 (age 2564.708s) > hex dump (first 32 bytes): > 62 61 73 65 00 00 4c d8 c5 78 df dc cc 43 e4 bc base..L..x...C.. > c4 c8 ec 8c ee de ce cf e8 c9 8a ea dc cc c6 fd ................ > backtrace: > [] kstrdup+0x48/0x88 > [] __of_attach_node_sysfs+0xf0/0x100 > [] of_core_init+0x8c/0xf8 > [] kernel_init_freeable+0xd4/0x208 > [] kernel_init+0x24/0x11c > [] ret_from_kernel_thread+0x5c/0x64 < snip > Brown paper bag time. I left out the kfree() in the one place that your first patch added it. Version 3 on the way. -Frank