Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp45920pxa; Mon, 10 Aug 2020 18:10:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx11kkBV3cs60iEUI634kDgupmw435AAmweVyQeQ1gA28etZ8jkpMBaVuj+VK1kMZA66XNu X-Received: by 2002:aa7:da87:: with SMTP id q7mr23080891eds.166.1597108236663; Mon, 10 Aug 2020 18:10:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597108236; cv=none; d=google.com; s=arc-20160816; b=fl//MZqQEfW5DnRHpeE+BqZn/zKWXrBWETGftReWCd3VxonheJqfma6SnhqHm8Mrqb uSQjdGo7/0Uyv4HnuBj8rRMmrTnJJ+cznHo3Yd+7CEDTsH6RhtX7lrtO19q4QKE88xjY OY3DOp4OB1VdSYm/t6gzUpTLr7yHfFTpGJIlaZT6sm+hS2R7ofgu4BLpGjadCICqJHhI CNZP5WZ70u0rmOMqFF1ZhREOFhrc2cBz+uGnJJ0QOfkOjrmtw4GVgWsWdK4uD5k3YMEG 0KGDVPEgt+8XE9hD3APHy+SHeXooYUaJHPygJfTFAfTUXA1PRwX4HtrRDuDBcjTaPWGH tWHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:content-transfer-encoding :mime-version:subject:from:references:in-reply-to:message-id:date :dkim-signature; bh=4ptnKaJqt0hPb33Mtu5pdW/ZlXM3OYKTHVVLQmoDWnI=; b=kEgMmZjTbZY1Wmi+OYqr/W7X+i1rU8c5uTeOLeO7yt+IqM+9Yu1o9j/KzcgSgxyA6F JzFMe0B0ZAe29exsOLDd0+eGuFOXFoCjAGJf3r7MsvmVzmdsOAoT554OycxfShvv8iw5 4nhwdFm/XnbeybPZEH5lajN/+OeJ9Qa77zDgXeNfutARtQkWkQ3UlXuv/48L9IMUvKb4 5c4v5Snh+o47qmdEQPkuWmAaFApHD61WbyvqC+bXzTuULuUYP0YeJlx1zfWUay7fliQK uFc5CMZDKUvC0v9B3gWj2DgBdDKYXza0dMIiA9vdfJGXQp2LB5Hiu6QVntuBv2EVlLDu JDGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@rere.qmqm.pl header.s=1 header.b=B0D3oQSW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n27si11583773eji.463.2020.08.10.18.10.12; Mon, 10 Aug 2020 18:10:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@rere.qmqm.pl header.s=1 header.b=B0D3oQSW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728061AbgHKBHv (ORCPT + 99 others); Mon, 10 Aug 2020 21:07:51 -0400 Received: from rere.qmqm.pl ([91.227.64.183]:1488 "EHLO rere.qmqm.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727977AbgHKBHm (ORCPT ); Mon, 10 Aug 2020 21:07:42 -0400 Received: from remote.user (localhost [127.0.0.1]) by rere.qmqm.pl (Postfix) with ESMTPSA id 4BQZSX5HVlzfN; Tue, 11 Aug 2020 03:07:40 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=rere.qmqm.pl; s=1; t=1597108060; bh=eXLNbW9Ivy3pD8Py+AuHYcCa1pegGO6FO3h5Gange9c=; h=Date:In-Reply-To:References:From:Subject:To:Cc:From; b=B0D3oQSW2i2W3C4Sm3cKiGnrOlDbdUG0UOhmvSHn24mAGVRVpoxZGMuRycJMVXb6h +CfHqvSUTLhC4FTCUviOtCVMAa7zBMpjLFktUW0Fo3/+OPwk8/fkHQUHioVW/K5RkS EklCRWd7JfE/epefzu3/kl+oP1VZmXkkJckgPoKqXxvRRWhVl33/hk1LX2ejaGeq6B +63eXKJCVA5FQgZm310KTtSxwraxfXyA9sM67eNUI6s6DiwZhUu9m1IPSovfyFazHV rPD4mHq2jUxYWyY3pypeDhcUQKOIP3JDFFeDXDLiJk/U3yQGo0XF4sctA4WP2PTjrJ KmOyDWMOB26nA== X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.102.4 at mail Date: Tue, 11 Aug 2020 03:07:40 +0200 Message-Id: In-Reply-To: References: From: =?UTF-8?q?Micha=C5=82=20Miros=C5=82aw?= Subject: [PATCH 5/7] regulator: plug of_node leak in regulator_register()'s error path MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit To: Dmitry Osipenko , Liam Girdwood , Mark Brown Cc: Vladimir Zapolskiy , linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org By calling device_initialize() earlier and noting that kfree(NULL) is ok, we can save a bit of code in error handling and plug of_node leak. Fixed commit already did part of the work. Cc: stable@vger.kernel.org Fixes: 9177514ce349 ("regulator: fix memory leak on error path of regulator_register()") Signed-off-by: Michał Mirosław --- drivers/regulator/core.c | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/drivers/regulator/core.c b/drivers/regulator/core.c index 0408c4e1d9a8..a9ff2ad55ee7 100644 --- a/drivers/regulator/core.c +++ b/drivers/regulator/core.c @@ -5137,6 +5137,7 @@ regulator_register(const struct regulator_desc *regulator_desc, ret = -ENOMEM; goto rinse; } + device_initialize(&rdev->dev); /* * Duplicate the config so the driver could override it after @@ -5144,9 +5145,8 @@ regulator_register(const struct regulator_desc *regulator_desc, */ config = kmemdup(cfg, sizeof(*cfg), GFP_KERNEL); if (config == NULL) { - kfree(rdev); ret = -ENOMEM; - goto rinse; + goto clean; } init_data = regulator_of_get_init_data(dev, regulator_desc, config, @@ -5158,10 +5158,8 @@ regulator_register(const struct regulator_desc *regulator_desc, * from a gpio extender or something else. */ if (PTR_ERR(init_data) == -EPROBE_DEFER) { - kfree(config); - kfree(rdev); ret = -EPROBE_DEFER; - goto rinse; + goto clean; } /* @@ -5214,7 +5212,6 @@ regulator_register(const struct regulator_desc *regulator_desc, } /* register with sysfs */ - device_initialize(&rdev->dev); rdev->dev.class = ®ulator_class; rdev->dev.parent = dev; dev_set_name(&rdev->dev, "regulator.%lu", @@ -5292,13 +5289,11 @@ regulator_register(const struct regulator_desc *regulator_desc, mutex_lock(®ulator_list_mutex); regulator_ena_gpio_free(rdev); mutex_unlock(®ulator_list_mutex); - put_device(&rdev->dev); - rdev = NULL; clean: if (dangling_of_gpiod) gpiod_put(config->ena_gpiod); - kfree(rdev); kfree(config); + put_device(&rdev->dev); rinse: if (dangling_cfg_gpiod) gpiod_put(cfg->ena_gpiod); -- 2.20.1