Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp345327ybm; Fri, 29 May 2020 01:25:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwGRfI6BNWp4RnW6d5irrMUaSt+u66whfnEOMH6tXR7HncKqbB0BSU0mVLcuMXzncdewuF6 X-Received: by 2002:a50:fd01:: with SMTP id i1mr7472062eds.32.1590740722309; Fri, 29 May 2020 01:25:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590740722; cv=none; d=google.com; s=arc-20160816; b=x9x2Tsoh49cAu1IAYpD9lit0lFiysGS/pyqQDlvnmoybTEZ2P82gN8hYM9Z55TPV+e dxdaCjs2IOZnL7SBuk1Mw8jexFAhHxEKJYKQheLPo5Yu2nhjyqmby/CqKoB0hiqB1UdZ RRpNbhBnRBgwTRjmhPysFHpaiQXy7W+IrWLARKkbQz8VrwBXrk61ura/MQqEKKP4hvNp GjAntWSCQ6xQdoHupVBEUx4re3wG0ydDfUP8XdoHXLgA/4sRZXapcpxfhbTEruukzp3o ML4OPSTYANP99NdByIUELjSLoL+ph8huroK6aOSIQmbYHBI36q29KzkU8pSC1wM53PT3 Kcbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=D054xDJauq6NByomkNCypjqaJnojrqc95CUZyHTQjNk=; b=BbPY6GbVIlNQ1nxUxmlCJwnrYofEWWzo1U87qvlDrVeDecGV5fuL1m60k6e5H0LGWJ Jtwuw23mae8goH5bpeXa85fvX3BXivWat4A9fS6it4Osf1rQVBNBe0DYWbkcHNrkwdVI jLvZhPOuw3jc8B8M/5xBTdhUyMZ9b//pYLl7Dc8lZvQK2bcQ9mmLpzyiJn/HI1q+BQCt QfMgO4+it2CdCUrNzW7sG2fwqw1xUtnJYniJZ9ZRQdaBke3KQZ6v3Ogcx4UZ36Mw9rhq LleBj1VojwmFHZjb1shVrq4xNiqm3BQ7ah7/idcZMQeNxg91/50scbPwPsfBouZjo5pW iFYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ICjfZOph; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g9si5256906edk.449.2020.05.29.01.24.58; Fri, 29 May 2020 01:25:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ICjfZOph; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726616AbgE2IWf (ORCPT + 99 others); Fri, 29 May 2020 04:22:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:43504 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725775AbgE2IWe (ORCPT ); Fri, 29 May 2020 04:22:34 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 32CBE2075A; Fri, 29 May 2020 08:22:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590740553; bh=bF+LDFKKjlpS21JygvHXpMb9WnNnBV/JsdAJKAMxjZs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ICjfZOphbFZLG5btT32Hp4tn9NGWybHZBgnR3m2vcuI6BJJr4xsqSbGpskfnXhahr Sux2cUhuyBFdlhJ1kX1rXWLGUCS/ZRrNVUzPCWZzCkHnNn8cjsz/4etAhb/A6Zenbh lXFsI8hB0AUoZDIo4CEPmuymr7KPrHwkZDH8UXrE= Date: Fri, 29 May 2020 10:22:31 +0200 From: Greg Kroah-Hartman To: wu000273@umn.edu Cc: kjlu@umn.edu, Bartlomiej Zolnierkiewicz , Thomas Gleixner , Enrico Weigelt , Allison Randal , Alexios Zavras , Tomi Valkeinen , Rob Clark , Dave Airlie , linux-omap@vger.kernel.org, linux-fbdev@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] omapfb: Fix reference count leak in display_init_sysfs. Message-ID: <20200529082231.GA847132@kroah.com> References: <20200528194424.11596-1-wu000273@umn.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200528194424.11596-1-wu000273@umn.edu> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 28, 2020 at 02:44:23PM -0500, wu000273@umn.edu wrote: > From: Qiushi Wu > > kobject_init_and_add() takes reference even when it fails. > If this function returns an error, kobject_put() must be called to > properly clean up the memory associated with the object. > Because function omap_dss_put_device() doesn't handle dssdev->kobj, > thus we need insert kobject_put() to clean up the kobject, > when kobject_init_and_add() fails. > > Fixes: f76ee892a99e ("omapfb: copy omapdss & displays for omapfb") > Signed-off-by: Qiushi Wu > --- > drivers/video/fbdev/omap2/omapfb/dss/display-sysfs.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/drivers/video/fbdev/omap2/omapfb/dss/display-sysfs.c b/drivers/video/fbdev/omap2/omapfb/dss/display-sysfs.c > index 6dbe265b312d..51322ac7df07 100644 > --- a/drivers/video/fbdev/omap2/omapfb/dss/display-sysfs.c > +++ b/drivers/video/fbdev/omap2/omapfb/dss/display-sysfs.c > @@ -316,6 +316,7 @@ int display_init_sysfs(struct platform_device *pdev) > &pdev->dev.kobj, "%s", dssdev->alias); > if (r) { > DSSERR("failed to create sysfs files\n"); > + kobject_put(&dssdev->kobj); > omap_dss_put_device(dssdev); > goto err; > } Why is a driver creating "raw" kobjects and the like at all? /me goes off to look... Ick, no, that's not ok, this just needs to be an attribute group attached to the device, no need for a kobject at all. Having a kobject means that the files will be ignored totally by userspace tools that monitor sysfs changes. So these files are probably not even being used... Please fix this up properly. thanks, greg k-h