]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
of/irq: Fix device node refcount leakages in of_irq_init()
authorZijun Hu <quic_zijuhu@quicinc.com>
Sun, 9 Feb 2025 12:59:00 +0000 (20:59 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 2 May 2025 05:40:57 +0000 (07:40 +0200)
commit 708124d9e6e7ac5ebf927830760679136b23fdf0 upstream.

of_irq_init() will leak interrupt controller device node refcounts
in two places as explained below:

1) Leak refcounts of both @desc->dev and @desc->interrupt_parent when
   suffers @desc->irq_init_cb() failure.
2) Leak refcount of @desc->interrupt_parent when cleans up list
   @intc_desc_list in the end.

Refcounts of both @desc->dev and @desc->interrupt_parent were got in
the first loop, but of_irq_init() does not put them before kfree(@desc)
in places mentioned above, so causes refcount leakages.

Fix by putting refcounts involved before kfree(@desc).

Fixes: 8363ccb917c6 ("of/irq: add missing of_node_put")
Fixes: c71a54b08201 ("of/irq: introduce of_irq_init")
Cc: stable@vger.kernel.org
Signed-off-by: Zijun Hu <quic_zijuhu@quicinc.com>
Link: https://lore.kernel.org/r/20250209-of_irq_fix-v2-7-93e3a2659aa7@quicinc.com
Signed-off-by: Rob Herring (Arm) <robh@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/of/irq.c

index 93f096adfd1367007bafbab15598f1d742122c23..5c4254ab5d83a24ad9dd514098f3dddcba4eeedc 100644 (file)
@@ -555,6 +555,8 @@ void __init of_irq_init(const struct of_device_id *matches)
                                                desc->interrupt_parent);
                        if (ret) {
                                of_node_clear_flag(desc->dev, OF_POPULATED);
+                               of_node_put(desc->interrupt_parent);
+                               of_node_put(desc->dev);
                                kfree(desc);
                                continue;
                        }
@@ -585,6 +587,7 @@ void __init of_irq_init(const struct of_device_id *matches)
 err:
        list_for_each_entry_safe(desc, temp_desc, &intc_desc_list, list) {
                list_del(&desc->list);
+               of_node_put(desc->interrupt_parent);
                of_node_put(desc->dev);
                kfree(desc);
        }