Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1269760pxb; Fri, 21 Jan 2022 13:57:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJwyYHnsbKco4jSkjXNaxwtrz7kOAYI1cVl6HsMIifG2VyGcgjR6CA0n1nWDc1Zzq9JvXu6n X-Received: by 2002:a17:903:2448:b0:14b:1d14:8ddb with SMTP id l8-20020a170903244800b0014b1d148ddbmr4780344pls.147.1642802235210; Fri, 21 Jan 2022 13:57:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642802235; cv=none; d=google.com; s=arc-20160816; b=ottscncfQ4td7Ac1ROw3TB6+FlKJgjGajyc3cjJBKn2TCNOY4fdiXAEzQuuCHAGxVb 4tYYiIvCei0A5/js/QZxjW2dbtueKB902/cho1p9Axs94HGdzPnOCtqtQWkCTAttWMhR iA6No/yGHyQT11pnYyT6ZgQiELZAvp5+cfN+ylIJu8mdfpE3l0/1DjAVKUUWswkfqziZ 0RNkL9nSQ3wSLDoLPke+h37LM7pJOAVryxb2ZkvqWB7YdAsPg+aqbgYoD6Wf7pz7KSqu +jrS6e/I/sKE0ufG7cfhajlJiQuNQU+/UkuJiI4cgTcXXU6vSwnPOkIh/p5wBG3zf8cZ 8HKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=7Ik94/eld5uHGn3bZKP+GwLJe2ovChEc9eeEQCx97DA=; b=St0MBKGYAbd7BWPPtIdb3k9t8jue7AtnHpwl874REOOX0UyEXrRn82aXBKAcvwNme+ 8elaeouowcf39XZkU/b5iPNdaZ27Wgg4eSx0+UwgzqCvCX/EXFgRcgG23w0vWw7dVezZ N7XpDuvRMdbncZGjYXUR/xeLp4CC4YByXPfZeItPvtaxXikrEObC9X8tM/+aNWb2q157 pYQ68SQYDu4e+XgAwCPF/m4pcMsiLkPqsAANuEqo7DM7MP3zpbp/jC+nq5k39AwnibZ4 DH+EJyEFSCUzR1z0WiRCXmgRXXzAEIyW3Kskm+MdUWkBUl4BpcPV9fOS2OyO89WjCDAa y8JA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=fabB3iIS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r20si5557287pgu.89.2022.01.21.13.57.03; Fri, 21 Jan 2022 13:57:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=fabB3iIS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236141AbiATMST (ORCPT + 99 others); Thu, 20 Jan 2022 07:18:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58314 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232764AbiATMSS (ORCPT ); Thu, 20 Jan 2022 07:18:18 -0500 Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 26DB4C061574; Thu, 20 Jan 2022 04:18:18 -0800 (PST) Received: by mail-pf1-x42f.google.com with SMTP id x37so1413496pfh.8; Thu, 20 Jan 2022 04:18:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=7Ik94/eld5uHGn3bZKP+GwLJe2ovChEc9eeEQCx97DA=; b=fabB3iISSP9VCRA/ON+MRMlr44Tb3dhfBGhBTJXPfS/t1oeQHbga2DcV/kTfjLeNeY dz5Xi7Xz0s8G48vtK0IactR9wnjZjApjMFDVP9siMUXdqmOWVvWEPI5LEhU1RfENSVt7 YhiNxqsf75W8Z4iDxcNTPBXJVepgsWbYbHA3gKk8oY4DauCtbCODmH9zmyYfNRMqdAaJ bS6oARI9LCLMU/pCAJr+aEdqMlQ+uqvkWFJzF6MGT0ThHDEmPW6qv514SoN1VsF+n2NH mIjfENDEMA2TNdMfZWRjkTmIHcM3FH4VCtNowX/dNCBT44SoUCxYcgfaiZUDRI40oroK 3qog== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=7Ik94/eld5uHGn3bZKP+GwLJe2ovChEc9eeEQCx97DA=; b=cDefyIKpXK1GfeYM5x2txc671XEu5CqtNQSuHcT/lYH2b+9m1E+sUxxLbz5PSRFTig vVP1gY4UMA/Y8LbeYoqrgMxX+EAnCE2Bm4JU1SgOb50Ku1pAX7DKl9kEVEKs3vVerYwD tZxVl8SzbUtbWCfe1Z40GwKJKsb/1t13mSkoEAbdllSrJU7UW+uCE3dAafvikFewJVob BSeeSVHMB8S0f2Kvdp+iHhhuECFyj3hqUY3GEv51DI9l7KU5nuHFzyZAGlYWq0LZaV4R djlCVDZ8I/Ag5ixwsg+g0bAZfkkm45YYB9/IxyquEXeX4Sxeuhrqndq0a8/OpAUuHIga jY2w== X-Gm-Message-State: AOAM532K1u1Gpa/jno/eRDWBzXLSoCJ+n8ZMhGOn17v8/FjtauU5Mt8i CAiX/Vv71+xWEXgPO3KybdU= X-Received: by 2002:a63:2a0d:: with SMTP id q13mr9391353pgq.601.1642681097684; Thu, 20 Jan 2022 04:18:17 -0800 (PST) Received: from localhost.localdomain ([159.226.95.43]) by smtp.googlemail.com with ESMTPSA id n4sm2307360pjf.0.2022.01.20.04.18.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 20 Jan 2022 04:18:17 -0800 (PST) From: Miaoqian Lin To: "James E.J. Bottomley" , Helge Deller , Greg Kroah-Hartman , linux-parisc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: linmq006@gmail.com Subject: [PATCH] parisc: pdc_stable: Fix memory leak in pdcs_register_pathentries Date: Thu, 20 Jan 2022 12:18:12 +0000 Message-Id: <20220120121812.14943-1-linmq006@gmail.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kobject_init_and_add() takes reference even when it fails. According to the doc of kobject_init_and_add(): If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Fix memory leak by calling kobject_put(). Fixes: 73f368cf679b ("Kobject: change drivers/parisc/pdc_stable.c to use kobject_init_and_add") Signed-off-by: Miaoqian Lin --- drivers/parisc/pdc_stable.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/parisc/pdc_stable.c b/drivers/parisc/pdc_stable.c index 9513c39719d1..d9e51036a4fa 100644 --- a/drivers/parisc/pdc_stable.c +++ b/drivers/parisc/pdc_stable.c @@ -980,8 +980,10 @@ pdcs_register_pathentries(void) entry->kobj.kset = paths_kset; err = kobject_init_and_add(&entry->kobj, &ktype_pdcspath, NULL, "%s", entry->name); - if (err) + if (err) { + kobject_put(&entry->kobj); return err; + } /* kobject is now registered */ write_lock(&entry->rw_lock); -- 2.17.1