Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp1906367rwi; Thu, 20 Oct 2022 19:41:58 -0700 (PDT) X-Google-Smtp-Source: AMsMyM54U+Hx87BtsHCvSS+zqECd3CRUO5TL3iyv49vxixkJpQIBoEHQbvogY+5D+ztks9MZTRHL X-Received: by 2002:aa7:9152:0:b0:565:895b:e524 with SMTP id 18-20020aa79152000000b00565895be524mr16980274pfi.85.1666320118710; Thu, 20 Oct 2022 19:41:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666320118; cv=none; d=google.com; s=arc-20160816; b=ocPSfrjSENym2dQCXnddBAB/vKGwSK/WZkc82Nc684PJ+M0YGsq39cA3aIMFLJ2Nsd vC5d6hai2wHWQS+f9ew8hl4k32hnQ/91z38ksTsDtCfpSVVMKwkIJBwdDNFrqLS9PUVx Mct3Vmz03yhh+yLCAe4rgziyH81mL4WZjEa4Ovxn/TlOnbJQQCVlrYAx3iHc0a3DPLSH FAKdD+qWU2qHHMnNbDZays94MWE/ylNmFk8tqSSMhF0pW7I7SUghWL4IjRiT5Tj4yCV+ zAdpaSTqSdP01ddvnCjGeZEvxaYHANfelgLr2YVO8u761SNoslN7QWScjEkrD/PkkIOk owrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=K8n3hu8gsmNnf0snz6xQchFocXq9/Kk9WeHFAHivz+U=; b=ttVXAOM8LG5Rseyln5N40033eyWf0WvosRf+sF+VQDUJsZwTBYdJH/qH0B1sOqtpG6 nVvBU/Iz1nRJJGWm1WnH5SWVF6pCoM9PHBg9xYcEs6X/yP7aT+yWa3HQRrIjhMd8Kw7T w7Bb7BSomV/CbU5hTcNf75uqi6lSiNYclzkCj4p57oifCIZ+lY9EZRnNDID8myQsy0LQ gvNoA0kaHsDhg7TibPvwNqo83p1zXMi3Ai+s2SqdBCPhXzImSrmvkdMKy0KHeszXbchU gyJ3DrwnNN1FycH9rK8sxVZzN7ycip65o3WOpHiPOSlwzRHcFss87WhB0b8xJEEHvn/Y JvSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x11-20020aa79acb000000b0054875fd979bsi21060830pfp.216.2022.10.20.19.41.46; Thu, 20 Oct 2022 19:41:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229841AbiJUCWl (ORCPT + 99 others); Thu, 20 Oct 2022 22:22:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37358 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229519AbiJUCWk (ORCPT ); Thu, 20 Oct 2022 22:22:40 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 11F171F810F for ; Thu, 20 Oct 2022 19:22:39 -0700 (PDT) Received: from dggpemm500024.china.huawei.com (unknown [172.30.72.57]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4MtpC82VSGzHvDB; Fri, 21 Oct 2022 10:22:28 +0800 (CST) Received: from dggpemm500007.china.huawei.com (7.185.36.183) by dggpemm500024.china.huawei.com (7.185.36.203) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Fri, 21 Oct 2022 10:22:36 +0800 Received: from huawei.com (10.175.103.91) by dggpemm500007.china.huawei.com (7.185.36.183) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Fri, 21 Oct 2022 10:22:35 +0800 From: Yang Yingliang To: , , , , , , CC: , , , , , , , , , , , , , , , Subject: [PATCH 00/11] fix memory leak while kset_register() fails Date: Fri, 21 Oct 2022 10:20:51 +0800 Message-ID: <20221021022102.2231464-1-yangyingliang@huawei.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.103.91] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpemm500007.china.huawei.com (7.185.36.183) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The previous discussion link: https://lore.kernel.org/lkml/0db486eb-6927-927e-3629-958f8f211194@huawei.com/T/ kset_register() is currently used in some places without calling kset_put() in error path, because the callers think it should be kset internal thing to do, but the driver core can not know what caller doing with that memory at times. The memory could be freed both in kset_put() and error path of caller, if it is called in kset_register(). So make the function documentation more explicit about calling kset_put() in the error path of caller first, so that people have a chance to know what to do here, then fixes this leaks by calling kset_put() from callers. Liu Shixin (1): ubifs: Fix memory leak in ubifs_sysfs_init() Yang Yingliang (10): kset: fix documentation for kset_register() kset: add null pointer check in kset_put() bus: fix possible memory leak in bus_register() kobject: fix possible memory leak in kset_create_and_add() class: fix possible memory leak in __class_register() firmware: qemu_fw_cfg: fix possible memory leak in fw_cfg_build_symlink() f2fs: fix possible memory leak in f2fs_init_sysfs() erofs: fix possible memory leak in erofs_init_sysfs() ocfs2: possible memory leak in mlog_sys_init() drm/amdgpu/discovery: fix possible memory leak drivers/base/bus.c | 4 +++- drivers/base/class.c | 6 ++++++ drivers/firmware/qemu_fw_cfg.c | 2 +- drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c | 5 +++-- fs/erofs/sysfs.c | 4 +++- fs/f2fs/sysfs.c | 4 +++- fs/ocfs2/cluster/masklog.c | 7 ++++++- fs/ubifs/sysfs.c | 2 ++ include/linux/kobject.h | 3 ++- lib/kobject.c | 5 ++++- 10 files changed, 33 insertions(+), 9 deletions(-) -- 2.25.1