Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1586219ybv; Thu, 20 Feb 2020 23:47:28 -0800 (PST) X-Google-Smtp-Source: APXvYqwCuCb5uDk32BWzjiZKdj5g9rEsn6VFnhNEkyblYB3bKZzGWzONa0+70s/qD6+XnoAuTL/k X-Received: by 2002:a05:6808:4d3:: with SMTP id a19mr847342oie.119.1582271248045; Thu, 20 Feb 2020 23:47:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582271248; cv=none; d=google.com; s=arc-20160816; b=DNL3RHo9xwo9WEVd/NaivJj57DMgRiuGEkUfU3gPFu3mm+H318E2ej4ejei7Erwd3N /SYyiwbPRaIInTrYsoOJBYCc0nE7P99Aj5VKpoj6hVcRokwd5LHfRd7wHuQHDTH2dpyo pjKKcJaNXoFUACiZWk/hXnY0y0R6B2Viv4YTXvccyHXiOdfpMMXHqul1yZKySLrhEoe9 +7uZ9DIrIou/ENjBbhPBOrHWIF5Oh/zu62OeMVCdZO/ZTRGVQtWHNLdY8cMKMxwjqEwr Kj+xTn4jVNyLXbVXggJVB6FnnEXIUNqJAS5RcqSoZt7E3nx7QeHMn7ZfpLy+PEMKntOI RLPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=miXmND4EtJqvaFCFvnEFD7Vi+RXWkW7cl8CMBUm4nls=; b=vM+XsX0MWEiIfj6qvwa6c7ZAcFlRpX0MIukS4wokbANg6RPnQkpveQS9yp2KIfy4uG 4j5wQX6PaVbUveV/flwYwhiWgBQ0+HT++Eb3N+snSW/BLivQVQI5cdm9cFP7wbJzxHg9 V7sfhXwF48McIr5i/+2HNcLzYaLbwaD5zcphIDe+On56QqHUvCyR8kJwSKDV4bvXWDPC waiYu3HDNg9ThPmIhEsc0VyuZ+vHWZMDxdjbom7y9xQH4laX+7BjgNDUz9AoAqMk/fLI +OvpyYlFMBYfjnHTwKbB0xwr7pqICGPPjGFzkbWoH75aHFUryWFNQ6sKd05a0sxSgfNJ fF1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wwDBjatH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a7si1029688otp.11.2020.02.20.23.47.15; Thu, 20 Feb 2020 23:47:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wwDBjatH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728455AbgBUHpl (ORCPT + 99 others); Fri, 21 Feb 2020 02:45:41 -0500 Received: from mail.kernel.org ([198.145.29.99]:40858 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728440AbgBUHph (ORCPT ); Fri, 21 Feb 2020 02:45:37 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D850A24656; Fri, 21 Feb 2020 07:45:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271137; bh=fPl5CA2wmeIK8jarfsPxfk2GQe02TOM2RTLnsYOCum4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wwDBjatH7rm8GTI4r7mOhnUhv4xcKxLuDHXq6i7cbZLoDCTtm0OoA7u0q/sl8K7VR VIk1gXjs+zooxGs6hbxW7uRB3//xHZsrNfRY0lso5i6Y/LPE04UEgqWlT277Gughl6 g3ZVcX7IfN1CRBlveWjwdTx7Cua6BWYEzESSQvbM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Miroslav Benes , YueHaibing , Jessica Yu , Sasha Levin Subject: [PATCH 5.5 053/399] kernel/module: Fix memleak in module_add_modinfo_attrs() Date: Fri, 21 Feb 2020 08:36:18 +0100 Message-Id: <20200221072407.509394798@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: YueHaibing [ Upstream commit f6d061d617124abbd55396a3bc37b9bf7d33233c ] In module_add_modinfo_attrs() if sysfs_create_file() fails on the first iteration of the loop (so i = 0), we forget to free the modinfo_attrs. Fixes: bc6f2a757d52 ("kernel/module: Fix mem leak in module_add_modinfo_attrs") Reviewed-by: Miroslav Benes Signed-off-by: YueHaibing Signed-off-by: Jessica Yu Signed-off-by: Sasha Levin --- kernel/module.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kernel/module.c b/kernel/module.c index b56f3224b161b..8785e31c2dd0f 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -1781,6 +1781,8 @@ static int module_add_modinfo_attrs(struct module *mod) error_out: if (i > 0) module_remove_modinfo_attrs(mod, --i); + else + kfree(mod->modinfo_attrs); return error; } -- 2.20.1