Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp96696pxa; Tue, 11 Aug 2020 18:34:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxxYiGwAdNrMGe3ku23gp0XKpaRigb+9vpu6gM19u2O6YGZDv7aXmbb9D+zm/NApNuwUYth X-Received: by 2002:a17:906:2ed1:: with SMTP id s17mr29130024eji.52.1597196069650; Tue, 11 Aug 2020 18:34:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597196069; cv=none; d=google.com; s=arc-20160816; b=mAmPXwbDpl68N7qAXi3k5rTLsh2DbnXWG7TS3wS9gmtwWXb9sV8rXxOOGQ4x+j/Jfm tLvtAjSYwE8wFKjjKT3pJRHTGqmXFt4hSZx0Tr/D7hv8qjL6wE993mVkXDWENYUIQgD1 YWNuzGgVAPSLrsgkdHOBddZuYckqX0wuVApoQmZsUkx8XLVSLGoBd00aNK8Bo9UcJPir l6PFz1Qlsj5ra11cKyengoXe1g8O92kHwJ39jFLSUaNW8yI6vLiE3c0kXh8zsQ/za4me Jr9gS2PjuJoRyLv7fAc6/+pWUTyT9t2C8QAuJb0xSqFwXh8rddvMKemqzQYpzywsiIIf c6Yg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:content-transfer-encoding :mime-version:subject:from:references:in-reply-to:message-id:date :dkim-signature; bh=DDlzc748Mq3lXj56qZZUMI1H1Ti/+mSSgmfFERJC/EA=; b=qUeE/wHaVVqmEU3Sw0w/4ZYMqb2RF5g6lVZaoFwHw5JqWlPr7Rf349rV5/2RonQeiF Zf4gCzfzcQEM30kKoRJ6V5mQL/FD+ZaOvdxaz33BvpWFFkMiFXTQCvO0qoKGgvWuLDtp WWSgJPaDhhJO49lArJnrFcz1fj+DUdCvqc2rZClmhhgesMDFKUpiHyH2vaSBUK4zuEvd 18U/ZgPSxPueoOwMMnNqdyToSJgDjgmP3EVLGEOHleprgcAv7pdwYrgV+AbXjWVBnHYy ISvH6EmtWmunl8+hgNGwUddwhmUojspDvyJ9CdrajG5dXNcC+9sUJL7EvSw6jw5JiG9N 7b2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@rere.qmqm.pl header.s=1 header.b=LZbU9xZf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o24si226908eji.60.2020.08.11.18.34.06; Tue, 11 Aug 2020 18:34:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@rere.qmqm.pl header.s=1 header.b=LZbU9xZf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726676AbgHLBby (ORCPT + 99 others); Tue, 11 Aug 2020 21:31:54 -0400 Received: from rere.qmqm.pl ([91.227.64.183]:22774 "EHLO rere.qmqm.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726489AbgHLBbj (ORCPT ); Tue, 11 Aug 2020 21:31:39 -0400 Received: from remote.user (localhost [127.0.0.1]) by rere.qmqm.pl (Postfix) with ESMTPSA id 4BRBxh6yjWzfQ; Wed, 12 Aug 2020 03:31:36 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=rere.qmqm.pl; s=1; t=1597195897; bh=kiF0CpOycT2tZVHH9McmSsAvlWcdJUYf+gz4LPvBWxQ=; h=Date:In-Reply-To:References:From:Subject:To:Cc:From; b=LZbU9xZfq8x78Yo81hOtACa1JCH0ucPqPx5H5e/FegrMOhX8XvFJzJhUAoe/yJU27 lPap67ecI8Vigz0sFG2KYeDrZIinwEOBoWKkaLTF8GASTV9gjykEPGDpVUXRW+65N5 HEciKItKDv3+f4jC1povXq3HSFgOqzyePt+EcXPDFtX7P7CmwZNl7K/59DsJeui/Dy XWQ87SIw+KttezFbCeX6FEEdRPN3n6YWQo+/yIJ5HDI4VDBAzvho6DodlhiwWK/vof ACGBBN+gZXpgGkvRwGCKuF6BHdxZD+erWFdKWko6N05cdBrRHFcrCsRvDrzoLOmeys jATEklfTzu82Q== X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.102.4 at mail Date: Wed, 12 Aug 2020 03:31:36 +0200 Message-Id: In-Reply-To: References: From: =?UTF-8?q?Micha=C5=82=20Miros=C5=82aw?= Subject: [PATCH v2 5/7] regulator: plug of_node leak in regulator_register()'s error path MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit To: Vladimir Zapolskiy , Dmitry Osipenko , Liam Girdwood , Mark Brown Cc: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org By calling device_initialize() earlier and noting that kfree(NULL) is ok, we can save a bit of code in error handling and plug of_node leak. Fixed commit already did part of the work. Cc: stable@vger.kernel.org Fixes: 9177514ce349 ("regulator: fix memory leak on error path of regulator_register()") Signed-off-by: Michał Mirosław Acked-by: Vladimir Zapolskiy --- drivers/regulator/core.c | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/drivers/regulator/core.c b/drivers/regulator/core.c index 71749f48caee..448a267641df 100644 --- a/drivers/regulator/core.c +++ b/drivers/regulator/core.c @@ -5137,6 +5137,7 @@ regulator_register(const struct regulator_desc *regulator_desc, ret = -ENOMEM; goto rinse; } + device_initialize(&rdev->dev); /* * Duplicate the config so the driver could override it after @@ -5144,9 +5145,8 @@ regulator_register(const struct regulator_desc *regulator_desc, */ config = kmemdup(cfg, sizeof(*cfg), GFP_KERNEL); if (config == NULL) { - kfree(rdev); ret = -ENOMEM; - goto rinse; + goto clean; } init_data = regulator_of_get_init_data(dev, regulator_desc, config, @@ -5158,10 +5158,8 @@ regulator_register(const struct regulator_desc *regulator_desc, * from a gpio extender or something else. */ if (PTR_ERR(init_data) == -EPROBE_DEFER) { - kfree(config); - kfree(rdev); ret = -EPROBE_DEFER; - goto rinse; + goto clean; } /* @@ -5214,7 +5212,6 @@ regulator_register(const struct regulator_desc *regulator_desc, } /* register with sysfs */ - device_initialize(&rdev->dev); rdev->dev.class = ®ulator_class; rdev->dev.parent = dev; dev_set_name(&rdev->dev, "regulator.%lu", @@ -5292,13 +5289,11 @@ regulator_register(const struct regulator_desc *regulator_desc, mutex_lock(®ulator_list_mutex); regulator_ena_gpio_free(rdev); mutex_unlock(®ulator_list_mutex); - put_device(&rdev->dev); - rdev = NULL; clean: if (dangling_of_gpiod) gpiod_put(config->ena_gpiod); - kfree(rdev); kfree(config); + put_device(&rdev->dev); rinse: if (dangling_cfg_gpiod) gpiod_put(cfg->ena_gpiod); -- 2.20.1