From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ua1-f41.google.com (mail-ua1-f41.google.com [209.85.222.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9CEA043E4B5 for ; Tue, 28 Apr 2026 14:10:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.222.41 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777385427; cv=none; b=LTOJj2UUFuyeSyikzY14XVStmocO9BujBTMUNMTYTLmOzGiSzIG7tKxn5u0pXrQTxVnfnB6w2joXE+OA8MnDm7Rs1GVmSvAyh8cPWKaZQZ+TvYM3gnOOlezEJXaPRLiYSyZ1jAjwwtfUEnYhFWksE294QtNjskyUJ35AE7RUqsg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777385427; c=relaxed/simple; bh=VVaBU0wqcGR7DB0/rzF91LQLvMxBcV3vG/TP2ffoPuo=; h=Mime-Version:Content-Type:Date:Message-Id:Subject:From:To: References:In-Reply-To; b=MG4ATBmbokW3kZe0ttn+q6Aypdi7Tm/7cyU4shHVcg0L1YRQNDeFkunpiHLYs45OgVle60Cp7I0yZtGPGvT9nxarZ4AaNY9O9LIPoq00k9vxmTR1ySva4OWIvdXpPebrOJHjzVmMPjDN8cT09iUIOGKj37rAsbWcJRGJKkXf6xc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=mNam56X3; arc=none smtp.client-ip=209.85.222.41 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="mNam56X3" Received: by mail-ua1-f41.google.com with SMTP id a1e0cc1a2514c-94dd01deb53so2443127241.0 for ; Tue, 28 Apr 2026 07:10:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1777385424; x=1777990224; darn=vger.kernel.org; h=in-reply-to:references:to:from:subject:message-id:date :content-transfer-encoding:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=TZUgbXBy5wBU0wEHjVuwR+E12s+n3IKckzY0lsaTI+s=; b=mNam56X3FSG++AMyjh3P9mL027rms4VH+rtKzO6o8CvbRO0y+gc44JrqUNzFezxbn1 VsxQHO85RqrB4lu712dI3zYydNi3gTdfdDDfvJpoQnaXc1fKGVrcro51OQhkiukz6L0P J2Yv8vy4adIuwRaslwOTyZ1v5/MpLFRI3t0CmGQlsU5lfBsCk+Le5V2ThfEiGkilMa89 ZlzjinpKNd1sIYOQYGm9Y/xxC/rvVEup1D0jHmcowG1oI798fZj2X70ul0J8BDQBimnH wgvohqTJNTMrzw7xbPTZyvy8hbTR/7KlosJ0yfKpqRLztc5lF9rqjIytmDZHnO/cwR+h AzKQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777385424; x=1777990224; h=in-reply-to:references:to:from:subject:message-id:date :content-transfer-encoding:mime-version:x-gm-gg:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=TZUgbXBy5wBU0wEHjVuwR+E12s+n3IKckzY0lsaTI+s=; b=bKYd+D5CmLGXFGU35Qsn+rWVj5ce1/L/sYWoqYROy2OP016TJk8Lda+2vbpJY5AUNT 21nOwjui6Yp5Uip4ro5rfqD+Suzl+cu8a+OEizrQ5LLL18EETGITqPesJYxtYfNIGLXo A4KeU4PqlPMbFYMtsR/AEBFRkjaAvVXwcI4XDoXStCLtSdwOsC24oK6DyOYdpVtE0SGD fcZxv36490fRmx1WFAYcZg/OIXaA0qTggy7G0WQIGHeVfyeb6+r8r1Q29Uh42eXdydsp rEUXRxBF21IJreKyWZ81GbYVZJ4gvjpnEX2/7fc7fuiYjqKk41Unv7zWyhJNxWvIPoZE HY7Q== X-Forwarded-Encrypted: i=1; AFNElJ9FWPmUYloxV3X2r+J2vb3SwkK6GLqdEZLpmkDycjVU5YnVi1Mtl6PZAPcHVLNXyqifPKheMUfiMbNtnXs=@vger.kernel.org X-Gm-Message-State: AOJu0YxtnInCoVLUMMphhnNFbKlbPD20ioE4BWqb1gK5rI/hxZYGiyde T0go45ax5viXaVoV+xcCsG2m9IWRAeJ1WY29bY5P4o5HIn1pLxVkcXeK X-Gm-Gg: AeBDiev2hHGteurxLD5AmjXYJ+6s3ulYjsX2sDYhxUHJLBm1spUdjLqcNPWG1viV5Kd mFGIET5yD+7hldFtx0cJVJc0DZm2k93Qc8BfYyedMbiTgc/8lPubFywhFTMIpskgZDURZk9Er0B HDyhGdk5gp1UOGNXZ36XH/cLZyW9xVlvZvY+IycRYL9RsInmnEbQC23WxPJ4FGN44ay8FA9Dv/S ri8PbB5gnDKzB6ByiD1K4/VU41wWFgbYLk9nADXLttJUB72TYp9SC4Q6x0c9cREYhIW5JdIt80j UROkK0tQKV1gsVQxvlhnniPkrJNsdqFDYPe21S9NNNOWB5jZdJmn6ZTZRPmaYxHax/YDFDxKw3q R01DObIzuwnqalkwgStxXAAMaK3BKCol/GTZUZH5PbQBU7unAmvyuWxAbRDjL6pyI7IkKU8cx3A MOsb1RKkPeGpOOm4CAbhWuVHsO X-Received: by 2002:a05:6102:6a85:b0:61d:8fd9:fb26 with SMTP id ada2fe7eead31-62808a5f7f4mr1265865137.7.1777385424336; Tue, 28 Apr 2026 07:10:24 -0700 (PDT) Received: from localhost ([2800:bf0:82:11a2:7ac4:1f2:947b:2b6]) by smtp.gmail.com with ESMTPSA id ada2fe7eead31-627f802d284sm1323462137.10.2026.04.28.07.10.23 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 28 Apr 2026 07:10:23 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Tue, 28 Apr 2026 09:10:17 -0500 Message-Id: Subject: Re: [PATCH] platform/x86: think-lmi: fix possible memory leak in tlmi_sysfs_init() From: "Kurt Borja" To: "Guangshuo Li" , "Mark Pearson" , "Derek J. Clark" , "Hans de Goede" , =?utf-8?q?Ilpo_J=C3=A4rvinen?= , "Kurt Borja" , , X-Mailer: aerc 0.21.0-0-g5549850facc2 References: <20260428082207.357522-1-lgs201920130244@gmail.com> In-Reply-To: <20260428082207.357522-1-lgs201920130244@gmail.com> Hi Guangshuo, On Tue Apr 28, 2026 at 3:22 AM -05, Guangshuo Li wrote: > Once kobject_init_and_add() fails, kobject_put() should be called to > decrement the reference count for cleanup. Otherwise, the memory associat= ed > with the object may leak. > > tlmi_sysfs_init() jumps to fail_create_attr after kobject_init_and_add() > fails. The error path calls tlmi_release_attr(), which walks the kset > lists and puts the kobjects found there. However, when the add operation > fails, the kobject core removes the failed object from the kset list > before returning the error. Therefore tlmi_release_attr() cannot put the > kobject whose kobject_init_and_add() failed. > > Fix this by calling kobject_put() for the failed kobject before jumping t= o > the common error path. Since pwd_admin's saved signatures are released > outside of its kobject release callback, release them before putting a > failed pwd_admin object. > > This issue was found by a static analysis tool I am developing. Thanks! Just a comment bellow. > > Fixes: 9110056fe10b ("platform/x86: think-lmi: Fix kobject cleanup") > Signed-off-by: Guangshuo Li > --- > drivers/platform/x86/lenovo/think-lmi.c | 40 ++++++++++++++++++++----- > 1 file changed, 32 insertions(+), 8 deletions(-) > > diff --git a/drivers/platform/x86/lenovo/think-lmi.c b/drivers/platform/x= 86/lenovo/think-lmi.c > index e215e86e3db7..994475eb0b9c 100644 > --- a/drivers/platform/x86/lenovo/think-lmi.c > +++ b/drivers/platform/x86/lenovo/think-lmi.c ... > @@ -1548,33 +1553,52 @@ static int tlmi_sysfs_init(void) > tlmi_priv.pwd_admin->kobj.kset =3D tlmi_priv.authentication_kset; > ret =3D kobject_init_and_add(&tlmi_priv.pwd_admin->kobj, &tlmi_pwd_sett= ing_ktype, > NULL, "%s", "Admin"); > - if (ret) > + if (ret) { > + kfree(tlmi_priv.pwd_admin->signature); > + kfree(tlmi_priv.pwd_admin->save_signature); > + tlmi_priv.pwd_admin->signature =3D NULL; > + tlmi_priv.pwd_admin->save_signature =3D NULL; I think, up until now (in the probe path that leads to this), we have not yet allocated signature and save_signature. These are allocated and reallocated once the sysfs files are created. Other than that, this looks good. Reviewed-by: Kurt Borja --=20 Thanks, ~ Kurt