]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
PCI: hv: Fix double ida_free in hv_pci_probe error path
authorSahil Chandna <sahilchandna@linux.microsoft.com>
Fri, 3 Apr 2026 12:09:29 +0000 (05:09 -0700)
committerWei Liu <wei.liu@kernel.org>
Sat, 4 Apr 2026 05:18:49 +0000 (05:18 +0000)
If hv_pci_probe() fails after storing the domain number in
hbus->bridge->domain_nr, there is a call to free this domain_nr via
pci_bus_release_emul_domain_nr(), however, during cleanup, the bridge
release callback pci_release_host_bridge_dev() also frees the domain_nr
causing ida_free to be called on same ID twice and triggering following
warning:

  ida_free called for id=28971 which is not allocated.
  WARNING: lib/idr.c:594 at ida_free+0xdf/0x160, CPU#0: kworker/0:2/198
  Call Trace:
   pci_bus_release_emul_domain_nr+0x17/0x20
   pci_release_host_bridge_dev+0x4b/0x60
   device_release+0x3b/0xa0
   kobject_put+0x8e/0x220
   devm_pci_alloc_host_bridge_release+0xe/0x20
   devres_release_all+0x9a/0xd0
   device_unbind_cleanup+0x12/0xa0
   really_probe+0x1c5/0x3f0
   vmbus_add_channel_work+0x135/0x1a0

Fix this by letting pci core handle the free domain_nr and remove
the explicit free called in pci-hyperv driver.

Fixes: bcce8c74f1ce ("PCI: Enable host bridge emulation for PCI_DOMAINS_GENERIC platforms")
Signed-off-by: Sahil Chandna <sahilchandna@linux.microsoft.com>
Reviewed-by: Manivannan Sadhasivam <mani@kernel.org>
Reviewed-by: Saurabh Sengar <ssengar@linux.microsoft.com>
Signed-off-by: Wei Liu <wei.liu@kernel.org>
drivers/pci/controller/pci-hyperv.c

index 38a790f642a1ead89a56a24d4b14deb7660ffacc..49c0a2d51162a207b46e2ef3f73fecc973a91ff1 100644 (file)
@@ -3786,7 +3786,7 @@ static int hv_pci_probe(struct hv_device *hdev,
                                           hbus->bridge->domain_nr);
        if (!hbus->wq) {
                ret = -ENOMEM;
-               goto free_dom;
+               goto free_bus;
        }
 
        hdev->channel->next_request_id_callback = vmbus_next_request_id;
@@ -3882,8 +3882,6 @@ close:
        vmbus_close(hdev->channel);
 destroy_wq:
        destroy_workqueue(hbus->wq);
-free_dom:
-       pci_bus_release_emul_domain_nr(hbus->bridge->domain_nr);
 free_bus:
        kfree(hbus);
        return ret;