Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp4159929rwi; Mon, 17 Oct 2022 02:17:02 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7oeTCMElwzw9M7hxReczjviDUZpKJtU3QsF0Pe3ezDqN2ZutGwZQtAf7B44pYMnHMVVkSC X-Received: by 2002:a63:824a:0:b0:46b:272f:d75f with SMTP id w71-20020a63824a000000b0046b272fd75fmr9810299pgd.268.1665998222629; Mon, 17 Oct 2022 02:17:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665998222; cv=none; d=google.com; s=arc-20160816; b=SBit8jP/0FzdSPi7TM2rsJW0sulJmrORF4wJm4e0Erq98xvedoqln7jft2HgJBbhdF iLXf5r0SQ1XvR/8WZlSKvF3FEmy2lhffyifT6G0LNuhDavOJKfXjbfglefzQPTH92VAr 5k8ztU57jv29lNIkZZ0abYOpGjO2nTfaW9FgGm9CEPOu9RDmsN1Ky/+7cMNZLlnlmcYB WTO+6uZ+/Baf7OmuExi3XrvXAyQcUHK9mSZv0CVA8EFHXb8ZYnV14sBaqJIAX9frOv+b HkpTY+VZVsQrKKTJazxS8dkOhVNyJSh5ScZVsadQUO05c6YIjumgpCHVOz2XBXTJQa5S uNng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=PhS2A5VUlyMIbziL80Xz0KMSYlN5oOu0SgdIQtcJU8E=; b=zLjwhT2Mw+5bGXEfeZFIbOkwEJAhq81yBVEtwi+ek7O93z8PEC0kDiGd7BkCtIz5ol OaSmVLtg77cIu/w1tgENy5UAVQmZmBwTyc8eD/q4O4DCL7fzmcwq4PiDpoMHi6q4jkhL pBJZij7hgqm9rWzVjzQiNmbgpCV4rumTx/kCHxsil0dbHnXP07rkI4B1IRwrN9XLIiXp Jrot7zNjtrZpjJn0JoVyZc8vOn3bn0YX69qIHcFjYPsAPTacczppj3dNPFukEkU40e9J t0bsO9sZNIe08BxMGsOX6iqlfQpBXCjYn0hxdKuoeY/Z5vaUm8hjvTNlT3o0cZde3zLT hQlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="0CB/gNiH"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id oj8-20020a17090b4d8800b00202dd7a4d3csi13123489pjb.113.2022.10.17.02.16.50; Mon, 17 Oct 2022 02:17:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="0CB/gNiH"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230269AbiJQJIO (ORCPT + 99 others); Mon, 17 Oct 2022 05:08:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48638 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230258AbiJQJIN (ORCPT ); Mon, 17 Oct 2022 05:08:13 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64C86CC8 for ; Mon, 17 Oct 2022 02:08:12 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 03C7760FCB for ; Mon, 17 Oct 2022 09:08:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C0FB7C433C1; Mon, 17 Oct 2022 09:08:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1665997691; bh=P8rDQPB0B0EYZdFuOVZbhQj1paq2ppVlDGA61vBr3bk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=0CB/gNiHYI99L/tz4qQWrCiRV9NIQkadGniPOK6Ik8QSJYrRcvgZlYF14yn3A31uW sgsrl6cvV8eLDHiKKnMQtMw7/5jiejfXQ9xepu6KlMxW7Kl6/wpKKBi1OKSbQpvHbk +7vJV/19NikEUzWUPef3RUPFm5dUN+2L5k1bu9CA= Date: Mon, 17 Oct 2022 11:08:08 +0200 From: Greg KH To: Yang Yingliang Cc: linux-kernel@vger.kernel.org, rafael@kernel.org Subject: Re: [PATCH] kobject: fix possible memory leak in kset_create_and_add() Message-ID: References: <20221017023327.1793893-1-yangyingliang@huawei.com> <9c2e91e1-dd07-8a4b-999c-9a2d26ee5f07@huawei.com> <3a661911-fb26-3d36-a78b-0778c0fceec2@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3a661911-fb26-3d36-a78b-0778c0fceec2@huawei.com> X-Spam-Status: No, score=-7.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 17, 2022 at 05:01:04PM +0800, Yang Yingliang wrote: > > On 2022/10/17 16:49, Greg KH wrote: > > On Mon, Oct 17, 2022 at 04:13:03PM +0800, Yang Yingliang wrote: > > > Hi, > > > > > > On 2022/10/17 12:51, Greg KH wrote: > > > > On Mon, Oct 17, 2022 at 10:33:27AM +0800, Yang Yingliang wrote: > > > > > If kset_register() fails in kset_create_and_add(), the name allocated > > > > > in kset_create() will be leaked. > > > > How is kset_create_and_add() failing? Is this in a real kernel, or > > > > created with a fake fault injection? > > > Inject fault while probing module qemu_fw_cfg, kset_create_and_add() may > > > fail. > > Ah good, it's never being hit in a real situation. The next time you > > submit patches that are found like this, please include this type of > > information. > OK. Do I need to send a v2 with commit message update. That would be wonderful for you to do, thank you! Also do the same thing for the other patches you sent that fix up error paths like this. thanks, greg k-h