misc: ocxl: fix possible name leak in ocxl_file_register_afu()
authorYang Yingliang <yangyingliang@huawei.com>
Fri, 11 Nov 2022 14:59:29 +0000 (22:59 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 31 Dec 2022 12:32:40 +0000 (13:32 +0100)
[ Upstream commit a4cb1004aeed2ab893a058fad00a5b41a12c4691 ]

If device_register() returns error in ocxl_file_register_afu(),
the name allocated by dev_set_name() need be freed. As comment
of device_register() says, it should use put_device() to give
up the reference in the error path. So fix this by calling
put_device(), then the name can be freed in kobject_cleanup(),
and info is freed in info_release().

Fixes: 75ca758adbaf ("ocxl: Create a clear delineation between ocxl backend & frontend")
Signed-off-by: Yang Yingliang <yangyingliang@huawei.com>
Acked-by: Andrew Donnellan <ajd@linux.ibm.com>
Acked-by: Frederic Barrat <fbarrat@linux.ibm.com>
Link: https://lore.kernel.org/r/20221111145929.2429271-1-yangyingliang@huawei.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/misc/ocxl/file.c

index d46dba2df5a10af576e1156516643e4423c66136..452d5777a0e4c75d1f82081b7dfdc41a525293df 100644 (file)
@@ -541,8 +541,11 @@ int ocxl_file_register_afu(struct ocxl_afu *afu)
                goto err_put;
 
        rc = device_register(&info->dev);
-       if (rc)
-               goto err_put;
+       if (rc) {
+               free_minor(info);
+               put_device(&info->dev);
+               return rc;
+       }
 
        rc = ocxl_sysfs_register_afu(info);
        if (rc)