Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4290947yba; Mon, 29 Apr 2019 17:30:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqw2cG7xW43u6/ZzinXpiNl2lojgO7KrB6j/qfPnlvkBz8Oiab25IEnVfwcneA3e9Fimg0Qe X-Received: by 2002:a17:902:e086:: with SMTP id cb6mr4116430plb.237.1556584226113; Mon, 29 Apr 2019 17:30:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556584226; cv=none; d=google.com; s=arc-20160816; b=VHnN8gT3/CxuyZLVIlNFSTcE2S7urJoDFk0kbY4euNEQ3oOgI750kfTlk6BRd5yamW cGevh+MRKSRpIBXqb9xC8F3uK5OIfCWfUxuw6NRzA18ua2NYVesmVDxmMcgM+iofr0qg j2edsbBCfeVpdN5Oneh0mmaXnmUKbXWDTz3XrSyFcGLfS4YybNPvek1HzLLQmSIY8vx5 4uknp7cc1oi8aftM9NlTAcVqk+OUsya42/I+TjHp2yH5I2SngrlwURTuaE7ij8bZurnA L4Xo4tu4ACgwyk86hejrA2WCvbs37Pq89m+qtFhWVJDkmPs7RnF3//cLQWVw2qNof7Lh PboQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6RglNrH0/a9U7I4Q6WAgYckH6cMAteemMXizx6xHHpY=; b=BFjSN6CAq8ptjah3bUhNFuowJp7HW4FiPHaCTvOzubEKcjZOahAvy7vtIy4IQjUof1 pcIs2S6VuZk250nVwpS/OQNhaHJyYj0xYsTEfiP2z4i69NH/dvVYAEIKEtmaMXMbB3Pm 29Gb0Z7TVLRovoLNrWZ/uIRgWnEHYGPtzijW2mcpE/+pLi07X3w5gNDrqxNHthAN9d5m SVVi9wadmouZvJV3q/J2wC9bGekNRJuEQKBkoCZBwlMuSjrcG1jsjwc5virs03SUQ3Un MFYtuF4AVgsXe4nwzBmknyiDiwo5AiQo1mpZ4q0VgbayS8OpJ/nYclxa73fXn2+Iikdm 8iLQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=SHroRKDH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w22si34183652pgj.174.2019.04.29.17.30.10; Mon, 29 Apr 2019 17:30:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=SHroRKDH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729722AbfD3A3L (ORCPT + 99 others); Mon, 29 Apr 2019 20:29:11 -0400 Received: from new1-smtp.messagingengine.com ([66.111.4.221]:43783 "EHLO new1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729214AbfD3A3K (ORCPT ); Mon, 29 Apr 2019 20:29:10 -0400 Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailnew.nyi.internal (Postfix) with ESMTP id 74E0313C4E; Mon, 29 Apr 2019 20:29:09 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute3.internal (MEProxy); Mon, 29 Apr 2019 20:29:09 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:date:from :in-reply-to:message-id:mime-version:references:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; bh=6RglNrH0/a9U7I4Q6WAgYckH6cMAteemMXizx6xHHpY=; b=SHroRKDH LZLn1RVZCpLrXRnKxIRmBLcHDJXmIAoogkdfoofa6F5x6sK+datdqXscsi3xlKLZ nU5xNa4XTXwlBFz6eJUEsRRtEouBNjILDcXcX6i3u0mvJkYGx2MvoANPR+8yhz1f S4zuqEFMBgJGM31MeIYXL42UvyrAMyhacsdpJFUOImbPkGkKAb9oRRkZsWN3UqaB aCPr8nwIjPxbyBRnqu/oRIJnAZnMOdHt3QjYLgyHc9HrBjZGYw3AWBJ4xJUqlcHV 0zHyKR2KIdgoP35g3TWZchBqTTvsiOTHkep0n4ST02Mut8n9TWfTslHFzgLiBTLz K5rl03w2KEWX9w== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduuddrieefgdefhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefhvffufffkofgjfhgggfestdekredtredttdenucfhrhhomhepfdfvohgsihhn ucevrdcujfgrrhguihhnghdfuceothhosghinheskhgvrhhnvghlrdhorhhgqeenucfkph epuddvuddrgeegrddvfedtrddukeeknecurfgrrhgrmhepmhgrihhlfhhrohhmpehtohgs ihhnsehkvghrnhgvlhdrohhrghenucevlhhushhtvghrufhiiigvpedt X-ME-Proxy: Received: from eros.localdomain (ppp121-44-230-188.bras2.syd2.internode.on.net [121.44.230.188]) by mail.messagingengine.com (Postfix) with ESMTPA id A6DE5103CC; Mon, 29 Apr 2019 20:29:04 -0400 (EDT) From: "Tobin C. Harding" To: "David S. Miller" Cc: "Tobin C. Harding" , Greg Kroah-Hartman , Tyler Hicks , Andy Shevchenko , Ido Schimmel , Alexander Duyck , Florian Fainelli , Wang Hai , YueHaibing , Amritha Nambiar , Dmitry Torokhov , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 1/3] bridge: Fix error path for kobject_init_and_add() Date: Tue, 30 Apr 2019 10:28:15 +1000 Message-Id: <20190430002817.10785-2-tobin@kernel.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190430002817.10785-1-tobin@kernel.org> References: <20190430002817.10785-1-tobin@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently error return from kobject_init_and_add() is not followed by a call to kobject_put(). This means there is a memory leak. Add call to kobject_put() in error path of kobject_init_and_add(). Signed-off-by: Tobin C. Harding --- net/bridge/br_if.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/net/bridge/br_if.c b/net/bridge/br_if.c index 41f0a696a65f..e5c8c9941c51 100644 --- a/net/bridge/br_if.c +++ b/net/bridge/br_if.c @@ -607,8 +607,10 @@ int br_add_if(struct net_bridge *br, struct net_device *dev, err = kobject_init_and_add(&p->kobj, &brport_ktype, &(dev->dev.kobj), SYSFS_BRIDGE_PORT_ATTR); - if (err) + if (err) { + kobject_put(&p->kobj); goto err1; + } err = br_sysfs_addif(p); if (err) -- 2.21.0