Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4291339yba; Mon, 29 Apr 2019 17:30:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqzl8NalW7oyMFF1UiVjOPxMlBdvCq5WjzQtgX/9fDvlbBa9vFvuRXvk8MpxNksGbmIcpzwU X-Received: by 2002:aa7:818a:: with SMTP id g10mr46880842pfi.178.1556584251055; Mon, 29 Apr 2019 17:30:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556584251; cv=none; d=google.com; s=arc-20160816; b=eLjaSjkXmubbngyROc7ecE62uD+jbvlPVwsroCkXLHq8x0zzVJrMf5mNVjbOJ4yUtX 7m9ZdKL7v6cD6iwpj19wo+uQX07KGzTQcI/mgS5PdFWMTwAix9jyAX9jrFyoHF0oxCqj RhwBdyFhqnlbABtvQyawtrhQPBsBcFUXaTmjLG4tB8dGt/NHBgooz5DyU2SwMlHBiK5Z TYPPc5zTWs77sLhGlLkwMI6hbgE23UvHtgRWRcfxfw1Q/ODk0b1YOM5Yx25wbFBsfypA +Relw6/VrTbkmCGe1dciXLreqRG8MZALPnOQpyJ6iXnbKv3QCWx0hTQQ3NDsrKjflaiS u9DA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=s7mszwv9bEcj1/j0Ken9h1TuXoSRYZGHb7Hqwq/CGpw=; b=QQ5vjiZMQ8UxRi4NfTKVdDFOFmVagIxJvN9QjgiXpr5CM8O0GCuC+IIP8i0dX2+AX6 m61KhKhqnCO+CHUHQ8cjy0BP42evFhTi/JF05B7VL/f4bauJ5ysPxsJuQZsmHBOnOyCg xbxa3DcmsLGfKxgzztrsE8wAe6lZGBSGkq4a5FcP6vjnNupwpUudImZzWFWBiVpjQPaY JHxoukNQANz9lJ83QW1nlbMOnSIWM1jzO72BAQCBFlUWToXd45snSC4bl75ye/0C8Bxn XAEVaMB2luV6yiTyG+eMUCjgA/t47XnX76gkZx3grWVPi0fVchk9wpJbsvfr9nHw3M5E BWzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=5MjxaFQb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j130si5518604pgc.168.2019.04.29.17.30.35; Mon, 29 Apr 2019 17:30:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=5MjxaFQb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729757AbfD3A3W (ORCPT + 99 others); Mon, 29 Apr 2019 20:29:22 -0400 Received: from new1-smtp.messagingengine.com ([66.111.4.221]:48353 "EHLO new1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729214AbfD3A3U (ORCPT ); Mon, 29 Apr 2019 20:29:20 -0400 Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailnew.nyi.internal (Postfix) with ESMTP id 78DE64113; Mon, 29 Apr 2019 20:29:19 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute3.internal (MEProxy); Mon, 29 Apr 2019 20:29:19 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:date:from :in-reply-to:message-id:mime-version:references:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; bh=s7mszwv9bEcj1/j0Ken9h1TuXoSRYZGHb7Hqwq/CGpw=; b=5MjxaFQb NJL49V0S3XUIlTTGODJFyfPtUwxqhsR9yOK94mwekQt9cLdlAvXTNuLbmfbikWdA iLtGUYeB/iME4dJIPPPmHzaJUwCabV7CJhJg7OHanNhk/uCBAP2gOfaEKxmJDMhx QOaARTRbKYPTDj05YxKDsulPbLc4715IvHdLVejfozCQl3+y7Ta6AXM7ci7N3jPj +XJXnHO3mKT1V3PPPsHhPLmNBQ4WXZ6p70vPyYUVjAUAuqgGqrUpT78xLonVXr1f qdnsnC6qNpEbbjMXGLrbNju1i5sej4kOHN9eyJWSrIU+I9w4tupR+foi6/TY/28F T8rNTvswE9jujA== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduuddrieefgdefhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefhvffufffkofgjfhgggfestdekredtredttdenucfhrhhomhepfdfvohgsihhn ucevrdcujfgrrhguihhnghdfuceothhosghinheskhgvrhhnvghlrdhorhhgqeenucfkph epuddvuddrgeegrddvfedtrddukeeknecurfgrrhgrmhepmhgrihhlfhhrohhmpehtohgs ihhnsehkvghrnhgvlhdrohhrghenucevlhhushhtvghrufhiiigvpedt X-ME-Proxy: Received: from eros.localdomain (ppp121-44-230-188.bras2.syd2.internode.on.net [121.44.230.188]) by mail.messagingengine.com (Postfix) with ESMTPA id A521D103CA; Mon, 29 Apr 2019 20:29:14 -0400 (EDT) From: "Tobin C. Harding" To: "David S. Miller" Cc: "Tobin C. Harding" , Greg Kroah-Hartman , Tyler Hicks , Andy Shevchenko , Ido Schimmel , Alexander Duyck , Florian Fainelli , Wang Hai , YueHaibing , Amritha Nambiar , Dmitry Torokhov , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 3/3] net-sysfs: Fix error path for kobject_init_and_add() Date: Tue, 30 Apr 2019 10:28:17 +1000 Message-Id: <20190430002817.10785-4-tobin@kernel.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190430002817.10785-1-tobin@kernel.org> References: <20190430002817.10785-1-tobin@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently error return from kobject_init_and_add() is not followed by a call to kobject_put(). This means there is a memory leak. Add call to kobject_put() in error path of kobject_init_and_add(). Signed-off-by: Tobin C. Harding --- net/core/net-sysfs.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c index 8f8b7b6c2945..9d4e3f47b789 100644 --- a/net/core/net-sysfs.c +++ b/net/core/net-sysfs.c @@ -925,8 +925,10 @@ static int rx_queue_add_kobject(struct net_device *dev, int index) kobj->kset = dev->queues_kset; error = kobject_init_and_add(kobj, &rx_queue_ktype, NULL, "rx-%u", index); - if (error) + if (error) { + kobject_put(kobj); return error; + } dev_hold(queue->dev); @@ -1462,8 +1464,10 @@ static int netdev_queue_add_kobject(struct net_device *dev, int index) kobj->kset = dev->queues_kset; error = kobject_init_and_add(kobj, &netdev_queue_ktype, NULL, "tx-%u", index); - if (error) + if (error) { + kobject_put(kobj); return error; + } dev_hold(queue->dev); -- 2.21.0