Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp715539ybm; Thu, 28 May 2020 13:16:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxotaeAuOg65SR7DrwAQwwtYax6Sia/VndFeAcycc4HO6u434jpNFQreN+Ax/Ed/VUmJdQy X-Received: by 2002:a50:ec83:: with SMTP id e3mr5186041edr.349.1590697002221; Thu, 28 May 2020 13:16:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590697002; cv=none; d=google.com; s=arc-20160816; b=CGucRHcrJD3hqlOFgnVt4h9K3EUHR/71CuUr1TqCwlziP6mrfI7ZVB5hn8uWTr1DmN F+hjWOvKVwNSzsQnb55k85vZRlf+rJAc2BWt1e88HokshBOq8p70ww8Er+oUAs+8yTCB 7YavKZ6rKPf8BcYezf+M5MavBJCELTHjI4XzQNk2lg2IKOGmwtyk7SAqLhK+DDol8UkF Iq/H8qBSnpHVhRKf8Xf/gdlTyrcxNyqwPFbK/+fKELC1u55CK930efEGuSVXxeSIFJ3Q g9/ASSHDvStH/84+NoxC8/Ou7Slp4zIgekGinWQr0mgRQYAy9V+hOzTFALEWHMsCrd65 Zmvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter:dmarc-filter; bh=U7D66rZ3bV/mdno+N6Y057Ta6Mf7fN3AGEm3ICQ61Jg=; b=hVs1jh95IIkLt3aXWgbE8Ej8v3iGcbE+MmtHjQ7zhQGaOn5Du3QenVpPN+2YILi+l9 e7jcUVf+DpO1b+OM7A5CFVAjWHvK81h7z7As244UWy0Buc7i2ZVS0KHGNjQsV/zXMGa7 O+mXDaj1dd7Gk55lWb24K2IMFG6jRqT7klN0KfQmb0bhWjXGMpa/XA/18hlElOG8pUS8 /rmA6ZZdwUx7KnTgT3hMCqumWVIShqUEhVK1BleKFhqm20nd3vYPXE0d6Xi1VwYSmAvn OPlFItinZcYSryR4cw161zAPXkzNdMyq+Jvq6OCbjfmh+XtcST2SMNfHEprVvHyTtdPC kZqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@umn.edu header.s=google header.b=EW9a3uYA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=umn.edu Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c17si4322306ejn.336.2020.05.28.13.16.17; Thu, 28 May 2020 13:16:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@umn.edu header.s=google header.b=EW9a3uYA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=umn.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2406966AbgE1UOE (ORCPT + 99 others); Thu, 28 May 2020 16:14:04 -0400 Received: from mta-p7.oit.umn.edu ([134.84.196.207]:59520 "EHLO mta-p7.oit.umn.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2406917AbgE1UOC (ORCPT ); Thu, 28 May 2020 16:14:02 -0400 Received: from localhost (unknown [127.0.0.1]) by mta-p7.oit.umn.edu (Postfix) with ESMTP id 49XzRs0ZS2z9vrWQ for ; Thu, 28 May 2020 20:14:01 +0000 (UTC) X-Virus-Scanned: amavisd-new at umn.edu Received: from mta-p7.oit.umn.edu ([127.0.0.1]) by localhost (mta-p7.oit.umn.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2ACcC0pG9TAH for ; Thu, 28 May 2020 15:14:00 -0500 (CDT) Received: from mail-il1-f197.google.com (mail-il1-f197.google.com [209.85.166.197]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mta-p7.oit.umn.edu (Postfix) with ESMTPS id 49XzRr62mSz9vrWG for ; Thu, 28 May 2020 15:14:00 -0500 (CDT) DMARC-Filter: OpenDMARC Filter v1.3.2 mta-p7.oit.umn.edu 49XzRr62mSz9vrWG DKIM-Filter: OpenDKIM Filter v2.11.0 mta-p7.oit.umn.edu 49XzRr62mSz9vrWG Received: by mail-il1-f197.google.com with SMTP id q24so274713ili.12 for ; Thu, 28 May 2020 13:14:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umn.edu; s=google; h=from:to:cc:subject:date:message-id; bh=U7D66rZ3bV/mdno+N6Y057Ta6Mf7fN3AGEm3ICQ61Jg=; b=EW9a3uYAYxVAoF/74DWigOh60vuyrSoIJXn/zN2njgaJY+rLuRnWb20OuhePu9eGzx x+biPSLnq17WzRzA3wiIIhVLLXsSfoPGbePDH/GgJGkqi3xCqp7mwyApibjbiF8CJOEw gqLZEjO0l9TEF1LPlW8L0GLN+M4RsxBCCRVCeECOz+b6VXA/LhuAex6ca1b5FPEwCo1q FJQ4cIVwIUalpS8dUxzFPJ/dACsFu+3DKkKqPBcbUvLGPkorZTdNo3ItLGTPVnd891n5 5zsDqKKeVcm6bZXFH7whDD+b3vAuIq5FU3XQ7lnE6dEl8giPm3tQNFGBw2p/yFLvN11u u33g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=U7D66rZ3bV/mdno+N6Y057Ta6Mf7fN3AGEm3ICQ61Jg=; b=nqqLnvMPA2bIRDdNKFLWQQ8A0XV9hlCulo85T4a0KeTtSVK/jYn6MwZmHeqWlZ1aQm msUuHUj75GhzOdf78/coex1J4dr/d+HIgqNb9SLLVtZudwxLZgu313aECrxsiSb/waQU FrFqv7iYeuTqBzvbE2sL5S4RHysetF2Jjh/VmpuPOL18CtZfrTHrPOjkIxMtNbMF8NQC 0oDK0GQbu0zHXMmGZmDi3K64r1YKoHv4Ve+8idqckxSYRxrztUYjVaUn840hV13qg6Uy meddvV5vrceW67orRGXCBpvnU6l2zEesxsTTOyUwFCtcHf1t2drP4li+hoVt+iGg4YWI Fsbg== X-Gm-Message-State: AOAM531OLGcMJ/VJ/waER+JTFCHz3DmJo3cQgXQ4Ikkvv1+PQAEcgvWE QiuKaQCcJ7nEHMAw2FPlVI8RG13FK5oonoo3el74ewIwVGA4fqwUxpRI3YDb5u9fgtCfgumykDI YgYwH9eiKr6oTavM5963tCeZOiLha X-Received: by 2002:a5e:9b10:: with SMTP id j16mr3809156iok.49.1590696840390; Thu, 28 May 2020 13:14:00 -0700 (PDT) X-Received: by 2002:a5e:9b10:: with SMTP id j16mr3809135iok.49.1590696840039; Thu, 28 May 2020 13:14:00 -0700 (PDT) Received: from qiushi.dtc.umn.edu (cs-kh5248-02-umh.cs.umn.edu. [128.101.106.4]) by smtp.gmail.com with ESMTPSA id h10sm3027690ioe.3.2020.05.28.13.13.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 May 2020 13:13:59 -0700 (PDT) From: wu000273@umn.edu To: kjlu@umn.edu Cc: wu000273@umn.edu, Lee Duncan , Chris Leech , "James E.J. Bottomley" , "Martin K. Petersen" , open-iscsi@googlegroups.com, linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] scsi: Fix reference count leak in iscsi_boot_create_kobj. Date: Thu, 28 May 2020 15:13:53 -0500 Message-Id: <20200528201353.14849-1-wu000273@umn.edu> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qiushi Wu kobject_init_and_add() should be handled when it return an error, because kobject_init_and_add() takes reference even when it fails. If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Previous commit "b8eb718348b8" fixed a similar problem. Thus replace calling kfree() by calling kobject_put(). Signed-off-by: Qiushi Wu --- drivers/scsi/iscsi_boot_sysfs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/scsi/iscsi_boot_sysfs.c b/drivers/scsi/iscsi_boot_sysfs.c index e4857b728033..a64abe38db2d 100644 --- a/drivers/scsi/iscsi_boot_sysfs.c +++ b/drivers/scsi/iscsi_boot_sysfs.c @@ -352,7 +352,7 @@ iscsi_boot_create_kobj(struct iscsi_boot_kset *boot_kset, boot_kobj->kobj.kset = boot_kset->kset; if (kobject_init_and_add(&boot_kobj->kobj, &iscsi_boot_ktype, NULL, name, index)) { - kfree(boot_kobj); + kobject_put(&boot_kobj->kobj); return NULL; } boot_kobj->data = data; -- 2.17.1