Received: by 10.223.185.116 with SMTP id b49csp6126412wrg; Wed, 28 Feb 2018 04:33:23 -0800 (PST) X-Google-Smtp-Source: AH8x225Ucr8zQEd7pC34zhIHPoapEjFVyS9V85/b2tfidOalXtNl4m/GKQPYVrzWmi+XQqqnRI4k X-Received: by 2002:a17:902:5269:: with SMTP id z96-v6mr17881459plh.385.1519821203872; Wed, 28 Feb 2018 04:33:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519821203; cv=none; d=google.com; s=arc-20160816; b=EFJgJSZPVJ1U5UB3QWv8wj7FNemQsXDTS+mAwmRdgzIj5rFU5AYtqFeTUw7HhHlg24 VHkVVP8nwO6AoXvXmk6l5Q9yRCnX04vhiQ2UynJXzKpMzLJKi2tBtQM+mnbKT4n8Ttg+ XCp0EhZJrOW4wANRUHeBmlP4ERf4KWIXQXaLYQU5KYjaoqMKijWg28+3tsNxHTrmJDFM zG3Y8qlBAXF0TfuvQ8OAuSjTOiT2U2zh0jmEgHpIdGjT8Uctz8FNihA4pmsxGJCGNAlD WDtGEI6GZAGhRX3jujhusZfAVihvp1VPZwTMWbhUI1LzNcDQbCLouRLWjevkbY0LHik9 5exw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=g2/BBSFBKOYImLRKT3E7BIO6+FbmdQSEz6JvCcBBjUM=; b=dFpUmzDosNOkFUyDKrkLazs2tLiYUISh9pmzROUvNCGaJUBdEeODAoiGwHHq5qyy5V oKA1NAgFv4JOvpUDpLUL7eWvaW78guVhLjG1ZMqCZgZLlGH8MZwuSqAru+t1TTedZ8PZ BGbZtJ4f4OQvnsyHXso4yPq4w98tWsrJFu9JchMetFYjw9JQn8lRtPpmEI9yPrbzMTRp 5zp/wmJ4rmPQasSxayXb1mW8/E9R9aICcpZdEBsBzLRmEn78bS7jvrn1GZTTSHGE+0IG rFSg36BzC5qBXPCqzCr5zbWJYeksM2PBlEJ8fETBE7DRQddqP7AlppBm0lop3HStrxml iXwQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y86si1197388pfi.19.2018.02.28.04.33.08; Wed, 28 Feb 2018 04:33:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752561AbeB1Mbi (ORCPT + 99 others); Wed, 28 Feb 2018 07:31:38 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:53220 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752329AbeB1Mbg (ORCPT ); Wed, 28 Feb 2018 07:31:36 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id ED253402290A; Wed, 28 Feb 2018 12:31:35 +0000 (UTC) Received: from gondolin (ovpn-117-87.ams2.redhat.com [10.36.117.87]) by smtp.corp.redhat.com (Postfix) with ESMTP id BDE462026E04; Wed, 28 Feb 2018 12:31:34 +0000 (UTC) Date: Wed, 28 Feb 2018 13:31:31 +0100 From: Cornelia Huck To: Arvind Yadav Cc: jwi@linux.vnet.ibm.com, ubraun@linux.vnet.ibm.com, davem@davemloft.net, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, netdev@vger.kernel.org Subject: Re: [PATCH] net: iucv: Free memory obtained by kzalloc Message-ID: <20180228133131.0df907ff.cohuck@redhat.com> In-Reply-To: <78058d34-7cbb-a3e6-6471-e001b93a0523@gmail.com> References: <6fbfc0b8aa75852c4eed4d05e4c165a493304ced.1519811528.git.arvind.yadav.cs@gmail.com> <20180228113042.6a2f5177.cohuck@redhat.com> <20180228125629.3062ac1d.cohuck@redhat.com> <78058d34-7cbb-a3e6-6471-e001b93a0523@gmail.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 28 Feb 2018 12:31:36 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 28 Feb 2018 12:31:36 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'cohuck@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 28 Feb 2018 17:39:53 +0530 Arvind Yadav wrote: > On Wednesday 28 February 2018 05:26 PM, Cornelia Huck wrote: > > On Wed, 28 Feb 2018 17:14:55 +0530 > > Arvind Yadav wrote: > > > >> On Wednesday 28 February 2018 04:00 PM, Cornelia Huck wrote: > >>> On Wed, 28 Feb 2018 15:24:16 +0530 > >>> Arvind Yadav wrote: > >>> > >>>> Free memory, if afiucv_iucv_init is not successful and > >>>> removing a IUCV driver. > >>>> > >>>> Signed-off-by: Arvind Yadav > >>>> --- > >>>> net/iucv/af_iucv.c | 5 ++++- > >>>> 1 file changed, 4 insertions(+), 1 deletion(-) > >>>> > >>>> diff --git a/net/iucv/af_iucv.c b/net/iucv/af_iucv.c > >>>> index 1e8cc7b..eb0995a 100644 > >>>> --- a/net/iucv/af_iucv.c > >>>> +++ b/net/iucv/af_iucv.c > >>>> @@ -2433,9 +2433,11 @@ static int afiucv_iucv_init(void) > >>>> af_iucv_dev->driver = &af_iucv_driver; > >>>> err = device_register(af_iucv_dev); > >>>> if (err) > >>>> - goto out_driver; > >>>> + goto out_iucv_dev; > >>>> return 0; > >>>> > >>>> +out_iucv_dev: > >>>> + kfree(af_iucv_dev); > >>>> out_driver: > >>>> driver_unregister(&af_iucv_driver); > >>>> out_iucv: > >>>> @@ -2496,6 +2498,7 @@ static void __exit afiucv_exit(void) > >>>> { > >>>> if (pr_iucv) { > >>>> device_unregister(af_iucv_dev); > >>>> + kfree(af_iucv_dev); > >>>> driver_unregister(&af_iucv_driver); > >>>> pr_iucv->iucv_unregister(&af_iucv_handler, 0); > >>>> symbol_put(iucv_if); > >>> No, you must not use kfree() after you called device_register() (even > >>> if it was not successful!) -- see the comment for device_register(). > >> Yes, Your are right. First we need to call put_device() then kfree(). > >> I will send updated patch. > > No, that's not correct, either. device_register() will give up any > > reference it obtained, and the caller did not obtain any additional > > reference, so a put_device() would be wrong. A kfree() on a refcounted > > structure is wrong as well. > If you will see the comment for device_register() (drivers/base/core.c) > there is mentioned that > 'NOTE: _Never_ directly free @dev after calling this function, even > if it returned an error! Always use put_device() to give up the > reference initialized in this function instead.' > But as per you comment. we should not use. You don't need to do a put_device() after your device_unregister(), that's all managed by the driver core.