Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp361209ybm; Thu, 28 May 2020 04:52:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyNbUeXFKwihXNVOdJX4o0nZn5LE3vDS5h4AtSetNU6fqsCQJKeesmM5W9kZAPVdMj2LwLF X-Received: by 2002:a17:906:1c94:: with SMTP id g20mr2530090ejh.319.1590666768376; Thu, 28 May 2020 04:52:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590666768; cv=none; d=google.com; s=arc-20160816; b=XcMf+kjxpad/zwnErJBU4w0GYBbaYvaZSX/6Fy270nWM+NQAJTniXcUpKc097tisdU wkJfZGBTtu8s0vzWul7VxQaj8osKuJD/a3jiDv1GYS0ZmLXPVX4v+lpZA2FTH3JV44FO nrvI24pGPYeCFWWdLSsGC1i/baOU1KOeIhI9foxZSk2AWMB2s678bEVdfjAIY4nOd0qg e0f72KftZWjLmJ7kC4YOAOY2cixtwb77fWUr7bsJKPmxoe2XFC9q9dWBWjQvepH3Nv4e kOmxbVQmkfbcSDylwMrLgXgDlgRYtW5D3PRh4Rc4d4z8ralHSyfHIa6hg3iiCgt8LHZ2 YNZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version; bh=XLJo2hS383AKVmW050P0lpuDCi+PHLJHoR9wahnQtWc=; b=OYs+msDYntcH2GcPIHrQvqWa+OMq4OE4dzz+DutRW6LtQ0ap5KY+fTv5qEwyJlVs4x iQbLNdkomnRx8jWgdLyU7GgZ3Kj3A2CkOQjfYSHRneIdaDfw/Y0mT4aZqK+C3CwPtpTY N05w7dJqP2y1UZFjeJhKBiP71tCtRJPGgyTYtNtJjjsK/oFLK52KxaINAZxQtbjov51a rk+Z/1myOQuIdr2FJYu39GqEh7Cw1wk8HLQ7ZJyb3cjsC5N6Msp0kT12WslDrMBSDQCm 5LXLtrphs3geggRHOiy8XKNtXN5ZwpOJoxHSpfSkwD5MwSy7tPcsOOvDtp0lmdedNDFx X2Ig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pw5si3640879ejb.354.2020.05.28.04.52.24; Thu, 28 May 2020 04:52:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388526AbgE1Lu0 (ORCPT + 99 others); Thu, 28 May 2020 07:50:26 -0400 Received: from mail-oo1-f67.google.com ([209.85.161.67]:44936 "EHLO mail-oo1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388480AbgE1LuZ (ORCPT ); Thu, 28 May 2020 07:50:25 -0400 Received: by mail-oo1-f67.google.com with SMTP id u40so2700353ooi.11; Thu, 28 May 2020 04:50:24 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XLJo2hS383AKVmW050P0lpuDCi+PHLJHoR9wahnQtWc=; b=dRdL4y045cp1ZR/cq/uemDDMCoGySk2ccmID2d/SmIiydSLjsl6Zm655+qdmxfYzjX 8znY7/8Bml5+kd1xP+DSWnCxMZE0FmhgLIXZO+N7wqnm+Sl3b/4hOQ8DMxsA8hOxzJY9 3hyVz2Ng+tA7hpIiKeh4D2YYWFNI244VgWR4OBsxFqihVrpl5fW6k00VjIwbAplxBi+L 6RmAZbJ+RsDK6Q36RCS30MNEpXJ1nU+de1JO/8uMxAchDqfPAwkP5YjMjA/7ytELyHaj 9hgGqu0LgIWtcFOzhbn3qGOqKE+hyuMUaS6sxV/W9FqiBd1w7tWLX70Dn1TY7fp1ASCu Y3ow== X-Gm-Message-State: AOAM531DAugSCzKZpdMOO5WRjePbdacVcK4OBfuYGC1G2/pJNnPkWOg+ Qwk8D5XUAHBwU0JSm62/cJMZG1/rpZFtfk5GX4w= X-Received: by 2002:a4a:e0d1:: with SMTP id e17mr2146272oot.1.1590666623991; Thu, 28 May 2020 04:50:23 -0700 (PDT) MIME-Version: 1.0 References: <20200527211717.14956-1-wu000273@umn.edu> In-Reply-To: <20200527211717.14956-1-wu000273@umn.edu> From: "Rafael J. Wysocki" Date: Thu, 28 May 2020 13:50:12 +0200 Message-ID: Subject: Re: [PATCH] ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile. To: wu000273@umn.edu Cc: Kangjie Lu , "Rafael J. Wysocki" , Len Brown , Toshi Kani , ACPI Devel Maling List , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 27, 2020 at 11:17 PM wrote: > > From: Qiushi Wu > > kobject_init_and_add() takes reference even when it fails. > Thus, when kobject_init_and_add() returns an error, > kobject_put() must be called to properly clean up the kobject. > > Fixes: 3f8055c35836 ("ACPI / hotplug: Introduce user space interface for hotplug profiles") > Signed-off-by: Qiushi Wu > --- > drivers/acpi/sysfs.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/drivers/acpi/sysfs.c b/drivers/acpi/sysfs.c > index c60d2c6d31d6..3a89909b50a6 100644 > --- a/drivers/acpi/sysfs.c > +++ b/drivers/acpi/sysfs.c > @@ -993,8 +993,10 @@ void acpi_sysfs_add_hotplug_profile(struct acpi_hotplug_profile *hotplug, > > error = kobject_init_and_add(&hotplug->kobj, > &acpi_hotplug_profile_ktype, hotplug_kobj, "%s", name); > - if (error) > + if (error) { > + kobject_put(&hotplug->kobj); > goto err_out; > + } > > kobject_uevent(&hotplug->kobj, KOBJ_ADD); > return; > -- Applied as 5.8 material, thanks!