Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6678885rwb; Tue, 22 Nov 2022 17:25:54 -0800 (PST) X-Google-Smtp-Source: AA0mqf6TDINY4B2fCdys+uru0R/HsfXdbJ3zQg8RrzcLxoNOyVrMczOMmbbiSJCCLOgrZt0yB8qj X-Received: by 2002:a05:6402:68c:b0:461:b506:6b8a with SMTP id f12-20020a056402068c00b00461b5066b8amr23456536edy.208.1669166754112; Tue, 22 Nov 2022 17:25:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669166754; cv=none; d=google.com; s=arc-20160816; b=O8tPwlGvoZp+JKtoNrfhduyMT5Y3stNo9uSuPT2E1v/03GQ9y5Rb2PiWP2ufW9381G b5viFDTUgTicyJLaAQ8aUuz5NqPfkuLaQh9eaVy0dVRuvZKCLTk0w6JSy53QtiOC95rp d+NclkhIDZG1XyJjpkM933UhjPBBAL/4/tDtxPXZwKVmFHvzjs4xeRWwQTyMB4OjjCL6 X9UcuaEY6tku6YDal8UhuPg2F2OOepn7CDsXzqyd/bLMgKuRHV469DkvpjttiOWkenSs f0VmUZHm8yZlpaSHt2zb3Ioydyzovvvcx5eD7vEjoZUD6A61GhXzkyq+sLaIKU6XtT6S Rjrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=wnLBUcRg7u43cLJke6V9qfDzeqsMtBRtEzQFL74pcZ0=; b=P3HvCbM0OQwNR9ESP+bivqNfYKMNW/jQiw1G6OjyzeFRQIgGW/VTPJbPnce0rfNcS5 emYYbw+eBZybo5TBuV0kc/MsCt9INB4Bkmrtvb3OyEe/MgWrFLSY0P2VCew7L2ZAzGh3 em/JLEsKB+UZiev0st3mRTWYm5wnKsslXV+s05yO5reax5aOyoabLOf07D92QRG0qbln ji7rBZVjJMK57YpY3WCBrNRsfnkZnL+4wJeAnD5p25hzzmVyXrqG6ubEA8/6gv6Rnln4 GmIZhBwSPwZc/M2cyE+n/WnoHsJtT8eRcHVZrfVrGKL1R2GhWMqNo9N/n57kzjrVAYVV Muqw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nc16-20020a1709071c1000b007adfc1544c9si15847638ejc.37.2022.11.22.17.25.32; Tue, 22 Nov 2022 17:25:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235289AbiKWBPs (ORCPT + 90 others); Tue, 22 Nov 2022 20:15:48 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48644 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235209AbiKWBPN (ORCPT ); Tue, 22 Nov 2022 20:15:13 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 94BE0E2B53 for ; Tue, 22 Nov 2022 17:14:20 -0800 (PST) Received: from dggpeml500026.china.huawei.com (unknown [172.30.72.54]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4NH36g6vcYzmW6X; Wed, 23 Nov 2022 09:13:47 +0800 (CST) Received: from huawei.com (10.175.101.6) by dggpeml500026.china.huawei.com (7.185.36.106) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 23 Nov 2022 09:14:18 +0800 From: Zhengchao Shao To: CC: , , , , , Subject: [PATCH] driver core: fix resource leak in device_add() Date: Wed, 23 Nov 2022 09:20:42 +0800 Message-ID: <20221123012042.335252-1-shaozhengchao@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.175.101.6] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpeml500026.china.huawei.com (7.185.36.106) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When calling kobject_add() failed in device_add(), it will call cleanup_glue_dir() to free resource. But in kobject_add(), dev->kobj.parent has been set to NULL. This will cause resource leak. The process is as follows: device_add() get_device_parent() class_dir_create_and_add() kobject_add() //kobject_get() ... dev->kobj.parent = kobj; ... kobject_add() //failed, but set dev->kobj.parent = NULL ... glue_dir = get_glue_dir(dev) //glue_dir = NULL, and goto //"Error" label ... cleanup_glue_dir() //becaues glue_dir is NULL, not call //kobject_put() The preceding problem may cause insmod mac80211_hwsim.ko to failed. sysfs: cannot create duplicate filename '/devices/virtual/mac80211_hwsim' Call Trace: dump_stack_lvl+0x8e/0xd1 sysfs_warn_dup.cold+0x1c/0x29 sysfs_create_dir_ns+0x224/0x280 kobject_add_internal+0x2aa/0x880 kobject_add+0x135/0x1a0 get_device_parent+0x3d7/0x590 device_add+0x2aa/0x1cb0 device_create_groups_vargs+0x1eb/0x260 device_create+0xdc/0x110 mac80211_hwsim_new_radio+0x31e/0x4790 [mac80211_hwsim] init_mac80211_hwsim+0x48d/0x1000 [mac80211_hwsim] do_one_initcall+0x10f/0x630 do_init_module+0x19f/0x5e0 load_module+0x64b7/0x6eb0 __do_sys_finit_module+0x140/0x200 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 kobject_add_internal failed for mac80211_hwsim with -EEXIST, don't try to register things with the same name in the same directory. Fixes: cebf8fd16900 ("driver core: fix race between creating/querying glue dir and its cleanup") Signed-off-by: Zhengchao Shao --- drivers/base/core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/base/core.c b/drivers/base/core.c index d02501933467..1a7e74840dad 100644 --- a/drivers/base/core.c +++ b/drivers/base/core.c @@ -3451,7 +3451,7 @@ int device_add(struct device *dev) /* we require the name to be set before, and pass NULL */ error = kobject_add(&dev->kobj, dev->kobj.parent, NULL); if (error) { - glue_dir = get_glue_dir(dev); + glue_dir = kobj; goto Error; } -- 2.17.1