[{"id":3673238,"web_url":"http://patchwork.ozlabs.org/comment/3673238/","msgid":"<ac/2CyhuZhWa8ctW@linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net>","list_archive_url":null,"date":"2026-04-03T17:16:59","subject":"Re: [PATCH] PCI: hv: Fix double ida_free in hv_pci_probe error path","submitter":{"id":85607,"url":"http://patchwork.ozlabs.org/api/people/85607/","name":"Saurabh Singh Sengar","email":"ssengar@linux.microsoft.com"},"content":"On Fri, Apr 03, 2026 at 05:09:29AM -0700, Sahil Chandna wrote:\n> If hv_pci_probe() fails after storing the domain number in\n> hbus->bridge->domain_nr, there is a call to free this domain_nr via\n> pci_bus_release_emul_domain_nr(), however, during cleanup, the bridge\n> release callback pci_release_host_bridge_dev() also frees the domain_nr\n> causing ida_free to be called on same ID twice and triggering following\n> warning:\n> \n>   ida_free called for id=28971 which is not allocated.\n>   WARNING: lib/idr.c:594 at ida_free+0xdf/0x160, CPU#0: kworker/0:2/198\n>   Call Trace:\n>    pci_bus_release_emul_domain_nr+0x17/0x20\n>    pci_release_host_bridge_dev+0x4b/0x60\n>    device_release+0x3b/0xa0\n>    kobject_put+0x8e/0x220\n>    devm_pci_alloc_host_bridge_release+0xe/0x20\n>    devres_release_all+0x9a/0xd0\n>    device_unbind_cleanup+0x12/0xa0\n>    really_probe+0x1c5/0x3f0\n>    vmbus_add_channel_work+0x135/0x1a0\n> \n> Fix this by letting pci core handle the free domain_nr and remove\n> the explicit free called in pci-hyperv driver.\n> \n> Fixes: bcce8c74f1ce (\"PCI: Enable host bridge emulation for PCI_DOMAINS_GENERIC platforms\")\n> Signed-off-by: Sahil Chandna <sahilchandna@linux.microsoft.com>\n> ---\n>  drivers/pci/controller/pci-hyperv.c | 4 +---\n>  1 file changed, 1 insertion(+), 3 deletions(-)\n> \n> diff --git a/drivers/pci/controller/pci-hyperv.c b/drivers/pci/controller/pci-hyperv.c\n> index 2c7a406b4ba8..5616ad5d2a8f 100644\n> --- a/drivers/pci/controller/pci-hyperv.c\n> +++ b/drivers/pci/controller/pci-hyperv.c\n> @@ -3778,7 +3778,7 @@ static int hv_pci_probe(struct hv_device *hdev,\n>  \t\t\t\t\t   hbus->bridge->domain_nr);\n>  \tif (!hbus->wq) {\n>  \t\tret = -ENOMEM;\n> -\t\tgoto free_dom;\n> +\t\tgoto free_bus;\n>  \t}\n> \n>  \thdev->channel->next_request_id_callback = vmbus_next_request_id;\n> @@ -3874,8 +3874,6 @@ static int hv_pci_probe(struct hv_device *hdev,\n>  \tvmbus_close(hdev->channel);\n>  destroy_wq:\n>  \tdestroy_workqueue(hbus->wq);\n> -free_dom:\n> -\tpci_bus_release_emul_domain_nr(hbus->bridge->domain_nr);\n>  free_bus:\n>  \tkfree(hbus);\n>  \treturn ret;\n> --\n> 2.53.0\n> \n\nLGTM,\nReviewed-by: Saurabh Sengar <ssengar@linux.microsoft.com>","headers":{"Return-Path":"\n <linux-pci+bounces-51828-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=linux.microsoft.com header.i=@linux.microsoft.com\n header.a=rsa-sha256 header.s=default header.b=KSHb6Glr;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-51828-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=linux.microsoft.com\n header.i=@linux.microsoft.com header.b=\"KSHb6Glr\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=13.77.154.182","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.microsoft.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=linux.microsoft.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fnQTn5j2vz1yCt\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 04:20:29 +1100 (AEDT)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 72ED4306B4EE\n\tfor <incoming@patchwork.ozlabs.org>; Fri,  3 Apr 2026 17:17:03 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id EBEA63D3CEE;\n\tFri,  3 Apr 2026 17:17:01 +0000 (UTC)","from linux.microsoft.com (linux.microsoft.com [13.77.154.182])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 36D0B313298;\n\tFri,  3 Apr 2026 17:17:00 +0000 (UTC)","by linux.microsoft.com (Postfix, from userid 1127)\n\tid C975720B6F01; Fri,  3 Apr 2026 10:16:59 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1775236621; cv=none;\n b=TLa4mECPw9232PahxM+CWOjZhVMBMbJa1cwVSztReuJoGytQwtlG7bakGuZElm57XvAEj11CyxKmozHpvgLe8rx4IZfO0kzyc6jpo2ZVwc6vN2hqmWZi5YGriMh2mfba7jtFFUMm7OmcIJI0zsIm67Rwzd75+DzOHvkmnp1prrk=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1775236621; c=relaxed/simple;\n\tbh=By9EQpNCDpp6s2NYHjtZqT1nhJ8CR8Y2CKPeiQPRZwI=;\n\th=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:\n\t Content-Type:Content-Disposition:In-Reply-To;\n b=YzwuI3YiQVx1LJZDwocccvUhzqFcd9siI/2iub2p63cqQvfi5Q/9Oe3xUWG9i8g7z570b1DmlGWXeiHPW8x/XBhQ7wOZuSWenTF2R2lJUGaGbrL9AtGve3LOfBLUpqlAwZKKxBdhdBcPXZn2VVsyoNCWtszYkrTDuy7t4JK2h+w=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.microsoft.com;\n spf=pass smtp.mailfrom=linux.microsoft.com;\n dkim=pass (1024-bit key) header.d=linux.microsoft.com\n header.i=@linux.microsoft.com header.b=KSHb6Glr;\n arc=none smtp.client-ip=13.77.154.182","DKIM-Filter":"OpenDKIM Filter v2.11.0 linux.microsoft.com C975720B6F01","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com;\n\ts=default; t=1775236619;\n\tbh=kh5ou9R6vorVFKGIjYV/L1uLTk5ZwMi2N5RzFqNbU74=;\n\th=Date:From:To:Cc:Subject:References:In-Reply-To:From;\n\tb=KSHb6GlrE+oMlnijn2yddWJvQl4JlPLJPvGgrzNN9VpDP8m8olNJC1Ze0Q2l7fMAL\n\t 2phDY5wnNto5r5I7PxwqYV2sRrc6nKhAeAhNclPw/n4fmIS6oDQ8Mex6D5j9WY29U/\n\t naca6YQjgLNdFhb+sC39IFbdc1TmOU3KQVoIfsWM=","Date":"Fri, 3 Apr 2026 10:16:59 -0700","From":"Saurabh Singh Sengar <ssengar@linux.microsoft.com>","To":"Sahil Chandna <sahilchandna@linux.microsoft.com>","Cc":"kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org,\n\tdecui@microsoft.com, longli@microsoft.com, lpieralisi@kernel.org,\n\tkwilczynski@kernel.org, mani@kernel.org, robh@kernel.org,\n\tbhelgaas@google.com, dan.j.williams@intel.com, mhklinux@outlook.com,\n\tlinux-hyperv@vger.kernel.org, linux-pci@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org","Subject":"Re: [PATCH] PCI: hv: Fix double ida_free in hv_pci_probe error path","Message-ID":"\n <ac/2CyhuZhWa8ctW@linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net>","References":"<20260403120933.466259-1-sahilchandna@linux.microsoft.com>","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","In-Reply-To":"<20260403120933.466259-1-sahilchandna@linux.microsoft.com>"}},{"id":3673368,"web_url":"http://patchwork.ozlabs.org/comment/3673368/","msgid":"<v7l3vghep7h52f3qyoxdbqzu6un5vhio3njy4u46wjrqzhrrvx@hl5imwzjwocf>","list_archive_url":null,"date":"2026-04-04T02:42:36","subject":"Re: [PATCH] PCI: hv: Fix double ida_free in hv_pci_probe error path","submitter":{"id":78905,"url":"http://patchwork.ozlabs.org/api/people/78905/","name":"Manivannan Sadhasivam","email":"mani@kernel.org"},"content":"On Fri, Apr 03, 2026 at 05:09:29AM -0700, Sahil Chandna wrote:\n> If hv_pci_probe() fails after storing the domain number in\n> hbus->bridge->domain_nr, there is a call to free this domain_nr via\n> pci_bus_release_emul_domain_nr(), however, during cleanup, the bridge\n> release callback pci_release_host_bridge_dev() also frees the domain_nr\n> causing ida_free to be called on same ID twice and triggering following\n> warning:\n> \n>   ida_free called for id=28971 which is not allocated.\n>   WARNING: lib/idr.c:594 at ida_free+0xdf/0x160, CPU#0: kworker/0:2/198\n>   Call Trace:\n>    pci_bus_release_emul_domain_nr+0x17/0x20\n>    pci_release_host_bridge_dev+0x4b/0x60\n>    device_release+0x3b/0xa0\n>    kobject_put+0x8e/0x220\n>    devm_pci_alloc_host_bridge_release+0xe/0x20\n>    devres_release_all+0x9a/0xd0\n>    device_unbind_cleanup+0x12/0xa0\n>    really_probe+0x1c5/0x3f0\n>    vmbus_add_channel_work+0x135/0x1a0\n> \n> Fix this by letting pci core handle the free domain_nr and remove\n> the explicit free called in pci-hyperv driver.\n> \n> Fixes: bcce8c74f1ce (\"PCI: Enable host bridge emulation for PCI_DOMAINS_GENERIC platforms\")\n> Signed-off-by: Sahil Chandna <sahilchandna@linux.microsoft.com>\n\nReviewed-by: Manivannan Sadhasivam <mani@kernel.org>\n\nWei: I see that you've taken previous hyperv patches. So feel free to take this\none also.\n\nWe will be proactive from next release onwards ;)\n\n- Mani\n\n> ---\n>  drivers/pci/controller/pci-hyperv.c | 4 +---\n>  1 file changed, 1 insertion(+), 3 deletions(-)\n> \n> diff --git a/drivers/pci/controller/pci-hyperv.c b/drivers/pci/controller/pci-hyperv.c\n> index 2c7a406b4ba8..5616ad5d2a8f 100644\n> --- a/drivers/pci/controller/pci-hyperv.c\n> +++ b/drivers/pci/controller/pci-hyperv.c\n> @@ -3778,7 +3778,7 @@ static int hv_pci_probe(struct hv_device *hdev,\n>  \t\t\t\t\t   hbus->bridge->domain_nr);\n>  \tif (!hbus->wq) {\n>  \t\tret = -ENOMEM;\n> -\t\tgoto free_dom;\n> +\t\tgoto free_bus;\n>  \t}\n> \n>  \thdev->channel->next_request_id_callback = vmbus_next_request_id;\n> @@ -3874,8 +3874,6 @@ static int hv_pci_probe(struct hv_device *hdev,\n>  \tvmbus_close(hdev->channel);\n>  destroy_wq:\n>  \tdestroy_workqueue(hbus->wq);\n> -free_dom:\n> -\tpci_bus_release_emul_domain_nr(hbus->bridge->domain_nr);\n>  free_bus:\n>  \tkfree(hbus);\n>  \treturn ret;\n> --\n> 2.53.0\n>","headers":{"Return-Path":"\n <linux-pci+bounces-51860-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=lKrjXe2R;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-51860-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"lKrjXe2R\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fnfyk6c6Hz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 13:42:54 +1100 (AEDT)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 7418C30210CC\n\tfor <incoming@patchwork.ozlabs.org>; Sat,  4 Apr 2026 02:42:51 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 0C9DF1E520A;\n\tSat,  4 Apr 2026 02:42:50 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id D4C3750276;\n\tSat,  4 Apr 2026 02:42:49 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 1300DC4CEF7;\n\tSat,  4 Apr 2026 02:42:44 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1775270569; cv=none;\n b=gTXYuPiYvstZuoPK87LggbL2ZquzWEQLQb41uzJgtr+vyOlc1bwG97bBCZQlXOXznOSu+VMnEqRKm2k8dx/82CaYFEhaL0Z4P/vbm5mymrKImpC8ltUPpAd7wQubayVKjgnv8jqHG1k+OQxXP6MbjxGUhNGiIlcCi3NhzE11fvI=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1775270569; c=relaxed/simple;\n\tbh=QqB5bvrRBlRYHAkjrmkAS8KiUZry2YuTWlK/boc4+l0=;\n\th=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:\n\t Content-Type:Content-Disposition:In-Reply-To;\n b=B70pJppxEDiN8oIUcyQsrVICQW4m6ZPNNhw/kjQkY4CcRrcy6ndB60RKsc+mJ0zqPZfPQmeduRQ7F1lD0e9tH5R0WjiHQwgyHJ7axM4JPJW48k2A0/YlwlKy14PZ5D6Qky+VZeNzZlIRCu+R9NKSR8g0gUocmKAsQvElMZsD6f8=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=lKrjXe2R; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1775270569;\n\tbh=QqB5bvrRBlRYHAkjrmkAS8KiUZry2YuTWlK/boc4+l0=;\n\th=Date:From:To:Cc:Subject:References:In-Reply-To:From;\n\tb=lKrjXe2RhKmkPs+6ix9VLYcP9aXOzxv+/fX2WnlKuROyMr9KYeBKpu89wU6d09LHh\n\t 18rRiLv+q4akjmJFxXcYQgp8gv9PeQ2pCkKxOTIBMkeQxUskmyBjRdtbuy45wW+ON1\n\t VRSdKIX+KSDPF+bgE2/TWfTMVnmfL+6O0LxCbtrY+W9KE6hM4Jmri5QWhucr7R4d7f\n\t FSHeTgKBLOSxM5ELXotudZdN2dY2ph58/9IuxVyhGuoXLk4QYdZTmuipyvfLVR19wx\n\t IfJd0AVXgiocylxxZUqiaK+iygFh28KxPz7aBsJtxGMTKZRxNTVZGcHI2DnyDbrW9+\n\t 1DJVYe79aSOnA==","Date":"Sat, 4 Apr 2026 08:12:36 +0530","From":"Manivannan Sadhasivam <mani@kernel.org>","To":"Sahil Chandna <sahilchandna@linux.microsoft.com>","Cc":"kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org,\n\tdecui@microsoft.com, longli@microsoft.com, lpieralisi@kernel.org,\n\tkwilczynski@kernel.org, robh@kernel.org, bhelgaas@google.com,\n dan.j.williams@intel.com,\n\tmhklinux@outlook.com, linux-hyperv@vger.kernel.org,\n linux-pci@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org","Subject":"Re: [PATCH] PCI: hv: Fix double ida_free in hv_pci_probe error path","Message-ID":"<v7l3vghep7h52f3qyoxdbqzu6un5vhio3njy4u46wjrqzhrrvx@hl5imwzjwocf>","References":"<20260403120933.466259-1-sahilchandna@linux.microsoft.com>","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=utf-8","Content-Disposition":"inline","Content-Transfer-Encoding":"8bit","In-Reply-To":"<20260403120933.466259-1-sahilchandna@linux.microsoft.com>"}},{"id":3673385,"web_url":"http://patchwork.ozlabs.org/comment/3673385/","msgid":"<20260404051918.GA60588@liuwe-devbox-debian-v2.local>","list_archive_url":null,"date":"2026-04-04T05:19:18","subject":"Re: [PATCH] PCI: hv: Fix double ida_free in hv_pci_probe error path","submitter":{"id":77234,"url":"http://patchwork.ozlabs.org/api/people/77234/","name":"Wei Liu","email":"wei.liu@kernel.org"},"content":"On Sat, Apr 04, 2026 at 08:12:36AM +0530, Manivannan Sadhasivam wrote:\n> On Fri, Apr 03, 2026 at 05:09:29AM -0700, Sahil Chandna wrote:\n> > If hv_pci_probe() fails after storing the domain number in\n> > hbus->bridge->domain_nr, there is a call to free this domain_nr via\n> > pci_bus_release_emul_domain_nr(), however, during cleanup, the bridge\n> > release callback pci_release_host_bridge_dev() also frees the domain_nr\n> > causing ida_free to be called on same ID twice and triggering following\n> > warning:\n> > \n> >   ida_free called for id=28971 which is not allocated.\n> >   WARNING: lib/idr.c:594 at ida_free+0xdf/0x160, CPU#0: kworker/0:2/198\n> >   Call Trace:\n> >    pci_bus_release_emul_domain_nr+0x17/0x20\n> >    pci_release_host_bridge_dev+0x4b/0x60\n> >    device_release+0x3b/0xa0\n> >    kobject_put+0x8e/0x220\n> >    devm_pci_alloc_host_bridge_release+0xe/0x20\n> >    devres_release_all+0x9a/0xd0\n> >    device_unbind_cleanup+0x12/0xa0\n> >    really_probe+0x1c5/0x3f0\n> >    vmbus_add_channel_work+0x135/0x1a0\n> > \n> > Fix this by letting pci core handle the free domain_nr and remove\n> > the explicit free called in pci-hyperv driver.\n> > \n> > Fixes: bcce8c74f1ce (\"PCI: Enable host bridge emulation for PCI_DOMAINS_GENERIC platforms\")\n> > Signed-off-by: Sahil Chandna <sahilchandna@linux.microsoft.com>\n> \n> Reviewed-by: Manivannan Sadhasivam <mani@kernel.org>\n> \n> Wei: I see that you've taken previous hyperv patches. So feel free to take this\n> one also.\n\nSure. I will pick this up.\n\nWei","headers":{"Return-Path":"\n <linux-pci+bounces-51863-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=ejcCGfKO;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-51863-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"ejcCGfKO\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fnkRN0Sbtz1yCs\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 16:19:27 +1100 (AEDT)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 00FEB302BE2B\n\tfor <incoming@patchwork.ozlabs.org>; Sat,  4 Apr 2026 05:19:23 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id C5A15275AE4;\n\tSat,  4 Apr 2026 05:19:20 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id A1BF61AAE17;\n\tSat,  4 Apr 2026 05:19:20 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id E7BF2C19423;\n\tSat,  4 Apr 2026 05:19:19 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1775279960; cv=none;\n b=IVYfsKyUf9POwOv/Uj1lP+NaBnGZ4FIUc3nYKpW7Ez1eQ3BkvIFf5ckveIuGzJTt3s7XRAjnUJcm54UCWlwIA8V7i8S/9HuwpPdf3VUlyB5IsUGMWmQRR1jroXjm5dMx/iQ1yBB4vRoyRFc1Gq7SNdhm616D/LncDGoV2MB5i0w=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1775279960; c=relaxed/simple;\n\tbh=9SlzOaOIuzawtKONvOgwkbzTlgoXVR5XMlVH/UJnXDI=;\n\th=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:\n\t Content-Type:Content-Disposition:In-Reply-To;\n b=VN/0/vGo5+wpEnlCaMv2CY3NmDl1qoNdnr41PKcmAqr1S0clM3PTs1WlEMkA9lepSrfg7hesu7VzOlFMIRNy3jxCsiP9PPxEYYTElzBYmj/6gNB40h5XsXOsiHCzdY+g8IGbcHOuoI2s2qcw9W2056qlEcgV2Zr+xS0wJ6DyQVM=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=ejcCGfKO; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1775279960;\n\tbh=9SlzOaOIuzawtKONvOgwkbzTlgoXVR5XMlVH/UJnXDI=;\n\th=Date:From:To:Cc:Subject:References:In-Reply-To:From;\n\tb=ejcCGfKO6vS/q7d6zdf5ihWo3GdmeBVK7g2Jlw1ZXdIdcbK5FLIEg7bG68VaFE3+G\n\t ioA8EMeaXCl1bnuXuUkN43VPY3vr9jG9lN3TWXTZiVslmwnOIT7qP6qp/sKIjqUA8V\n\t gL5777zY7o5l5xFCnsouksMKn/yu5bKebN6DF+NwY9uwRWj4kvEp7UCnS1QZCg3rRZ\n\t rL37oyQ9xdV5MVWXnRrXHAVrD79i7elZjQWOV5M1LuakH1+ylkTkrs8aadcw2WFZhT\n\t DZbPIsU/CKrg1xBdTZtqloVgc927DxeHgEqdEfivTlj0qlQzzPg0We6uvAOmCGlh/L\n\t 9te8zRYTJWGJg==","Date":"Sat, 4 Apr 2026 05:19:18 +0000","From":"Wei Liu <wei.liu@kernel.org>","To":"Manivannan Sadhasivam <mani@kernel.org>","Cc":"Sahil Chandna <sahilchandna@linux.microsoft.com>, kys@microsoft.com,\n\thaiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com,\n\tlongli@microsoft.com, lpieralisi@kernel.org, kwilczynski@kernel.org,\n\trobh@kernel.org, bhelgaas@google.com, dan.j.williams@intel.com,\n\tmhklinux@outlook.com, linux-hyperv@vger.kernel.org,\n\tlinux-pci@vger.kernel.org, linux-kernel@vger.kernel.org","Subject":"Re: [PATCH] PCI: hv: Fix double ida_free in hv_pci_probe error path","Message-ID":"<20260404051918.GA60588@liuwe-devbox-debian-v2.local>","References":"<20260403120933.466259-1-sahilchandna@linux.microsoft.com>\n <v7l3vghep7h52f3qyoxdbqzu6un5vhio3njy4u46wjrqzhrrvx@hl5imwzjwocf>","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","In-Reply-To":"<v7l3vghep7h52f3qyoxdbqzu6un5vhio3njy4u46wjrqzhrrvx@hl5imwzjwocf>"}}]