* [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal
@ 2026-04-10 7:13 Aaradhana Sahu
2026-04-21 2:56 ` Baochen Qiang
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: Aaradhana Sahu @ 2026-04-10 7:13 UTC (permalink / raw)
To: ath12k; +Cc: linux-wireless, Aaradhana Sahu
ath12k_core_get_wsi_info() traverses the WSI (Wired Serial Interface)
device graph starting from dev->of_node. The current code uses
dev->of_node directly as the local traversal pointer and calls
of_node_put() on error.
Since the driver does not own a reference to dev->of_node, dropping it
during traversal results in the following OF refcount underflow:
OF: ERROR: of_node_release() detected bad of_node_put() on /soc@0/wifi@c000000
CPU: 1 UID: 0 PID: 210 Comm: insmod Not tainted 6.19.0-rc4-next-20260109-00023-g797dd36dc178 #26 PREEMPT
Hardware name: Qualcomm Technologies, Inc. IPQ5332 MI01.2 (DT)
Call trace:
show_stack+0x18/0x24 (C)
dump_stack_lvl+0x60/0x80
dump_stack+0x18/0x24
of_node_release+0x164/0x1a0
kobject_put+0xb4/0x278
of_node_put+0x18/0x28
ath12k_core_init+0x29c/0x5d4 [ath12k]
ath12k_ahb_probe+0x950/0xc14 [ath12k]
platform_probe+0x5c/0xa4
really_probe+0xc0/0x3ec
__driver_probe_device+0x80/0x170
driver_probe_device+0x3c/0x120
__driver_attach+0xc4/0x218
OF: ERROR: next of_node_put() on this node will result in a kobject warning 'refcount_t: underflow; use-after-free.'
Fix this by explicitly acquiring a reference to the starting node
using of_node_get() and attaching automatic cleanup via
__free(device_node).
Each discovered WSI node is stored in ag->wsi_node[] with its own
of_node_get() reference. These references are later released in
ath12k_core_free_wsi_info() during driver teardown.
Also remove unnecessary memset() of wsi_node array since cleanup now
explicitly sets pointers to NULL.
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.6-01243-QCAHKSWPL_SILICONZ-1
Tested-on: IPQ5332 hw1.0 AHB WLAN.WBE.1.6-01275-QCAHKSWPL_SILICONZ-1
Fixes: 908c10c860e0 ("wifi: ath12k: parse multiple device information from Device Tree")
Signed-off-by: Aaradhana Sahu <aaradhana.sahu@oss.qualcomm.com>
---
drivers/net/wireless/ath/ath12k/core.c | 77 ++++++++++++++++----------
1 file changed, 48 insertions(+), 29 deletions(-)
diff --git a/drivers/net/wireless/ath/ath12k/core.c b/drivers/net/wireless/ath/ath12k/core.c
index 2519e2400d58..980a12fb2c6e 100644
--- a/drivers/net/wireless/ath/ath12k/core.c
+++ b/drivers/net/wireless/ath/ath12k/core.c
@@ -1838,10 +1838,22 @@ static struct ath12k_hw_group *ath12k_core_hw_group_alloc(struct ath12k_base *ab
return ag;
}
+static void ath12k_core_free_wsi_info(struct ath12k_hw_group *ag)
+{
+ int i;
+
+ for (i = 0; i < ag->num_devices; i++) {
+ of_node_put(ag->wsi_node[i]);
+ ag->wsi_node[i] = NULL;
+ }
+ ag->num_devices = 0;
+}
+
static void ath12k_core_hw_group_free(struct ath12k_hw_group *ag)
{
mutex_lock(&ath12k_hw_group_mutex);
+ ath12k_core_free_wsi_info(ag);
list_del(&ag->list);
kfree(ag);
@@ -1867,52 +1879,59 @@ static struct ath12k_hw_group *ath12k_core_hw_group_find_by_dt(struct ath12k_bas
static int ath12k_core_get_wsi_info(struct ath12k_hw_group *ag,
struct ath12k_base *ab)
{
- struct device_node *wsi_dev = ab->dev->of_node, *next_wsi_dev;
- struct device_node *tx_endpoint, *next_rx_endpoint;
- int device_count = 0;
-
- next_wsi_dev = wsi_dev;
+ struct device_node *next_wsi_dev;
+ int device_count = 0, ret = 0;
+ struct device_node *wsi_dev;
- if (!next_wsi_dev)
+ wsi_dev = of_node_get(ab->dev->of_node);
+ if (!wsi_dev)
return -ENODEV;
do {
- ag->wsi_node[device_count] = next_wsi_dev;
+ if (device_count >= ATH12K_MAX_DEVICES) {
+ ath12k_warn(ab, "device count in DT %d is more than limit %d\n",
+ device_count, ATH12K_MAX_DEVICES);
+ ret = -EINVAL;
+ break;
+ }
+
+ ag->wsi_node[device_count++] = of_node_get(wsi_dev);
- tx_endpoint = of_graph_get_endpoint_by_regs(next_wsi_dev, 0, -1);
+ struct device_node *tx_endpoint __free(device_node) =
+ of_graph_get_endpoint_by_regs(wsi_dev, 0, -1);
if (!tx_endpoint) {
- of_node_put(next_wsi_dev);
- return -ENODEV;
+ ret = -ENODEV;
+ break;
}
- next_rx_endpoint = of_graph_get_remote_endpoint(tx_endpoint);
+ struct device_node *next_rx_endpoint __free(device_node) =
+ of_graph_get_remote_endpoint(tx_endpoint);
if (!next_rx_endpoint) {
- of_node_put(next_wsi_dev);
- of_node_put(tx_endpoint);
- return -ENODEV;
+ ret = -ENODEV;
+ break;
}
- of_node_put(tx_endpoint);
- of_node_put(next_wsi_dev);
-
next_wsi_dev = of_graph_get_port_parent(next_rx_endpoint);
if (!next_wsi_dev) {
- of_node_put(next_rx_endpoint);
- return -ENODEV;
+ ret = -ENODEV;
+ break;
}
- of_node_put(next_rx_endpoint);
+ of_node_put(wsi_dev);
+ wsi_dev = next_wsi_dev;
+ } while (ab->dev->of_node != wsi_dev);
- device_count++;
- if (device_count > ATH12K_MAX_DEVICES) {
- ath12k_warn(ab, "device count in DT %d is more than limit %d\n",
- device_count, ATH12K_MAX_DEVICES);
- of_node_put(next_wsi_dev);
- return -EINVAL;
+ if (ret) {
+ while (--device_count >= 0) {
+ of_node_put(ag->wsi_node[device_count]);
+ ag->wsi_node[device_count] = NULL;
}
- } while (wsi_dev != next_wsi_dev);
- of_node_put(next_wsi_dev);
+ of_node_put(wsi_dev);
+ return ret;
+ }
+
+ of_node_put(wsi_dev);
ag->num_devices = device_count;
return 0;
@@ -1983,9 +2002,9 @@ static struct ath12k_hw_group *ath12k_core_hw_group_assign(struct ath12k_base *a
ath12k_core_get_wsi_index(ag, ab)) {
ath12k_dbg(ab, ATH12K_DBG_BOOT,
"unable to get wsi info from dt, grouping single device");
+ ath12k_core_free_wsi_info(ag);
ag->id = ATH12K_INVALID_GROUP_ID;
ag->num_devices = 1;
- memset(ag->wsi_node, 0, sizeof(ag->wsi_node));
wsi->index = 0;
}
base-commit: ae530e0b135102c5fc08e64c39e7a18564a52b3e
--
2.34.1
^ permalink raw reply related [flat|nested] 4+ messages in thread* Re: [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal
2026-04-10 7:13 [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal Aaradhana Sahu
@ 2026-04-21 2:56 ` Baochen Qiang
2026-04-21 5:30 ` Rameshkumar Sundaram
2026-04-23 18:00 ` Jeff Johnson
2 siblings, 0 replies; 4+ messages in thread
From: Baochen Qiang @ 2026-04-21 2:56 UTC (permalink / raw)
To: Aaradhana Sahu, ath12k; +Cc: linux-wireless
On 4/10/2026 3:13 PM, Aaradhana Sahu wrote:
> ath12k_core_get_wsi_info() traverses the WSI (Wired Serial Interface)
> device graph starting from dev->of_node. The current code uses
> dev->of_node directly as the local traversal pointer and calls
> of_node_put() on error.
>
> Since the driver does not own a reference to dev->of_node, dropping it
> during traversal results in the following OF refcount underflow:
>
> OF: ERROR: of_node_release() detected bad of_node_put() on /soc@0/wifi@c000000
> CPU: 1 UID: 0 PID: 210 Comm: insmod Not tainted 6.19.0-rc4-next-20260109-00023-g797dd36dc178 #26 PREEMPT
> Hardware name: Qualcomm Technologies, Inc. IPQ5332 MI01.2 (DT)
> Call trace:
> show_stack+0x18/0x24 (C)
> dump_stack_lvl+0x60/0x80
> dump_stack+0x18/0x24
> of_node_release+0x164/0x1a0
> kobject_put+0xb4/0x278
> of_node_put+0x18/0x28
> ath12k_core_init+0x29c/0x5d4 [ath12k]
> ath12k_ahb_probe+0x950/0xc14 [ath12k]
> platform_probe+0x5c/0xa4
> really_probe+0xc0/0x3ec
> __driver_probe_device+0x80/0x170
> driver_probe_device+0x3c/0x120
> __driver_attach+0xc4/0x218
> OF: ERROR: next of_node_put() on this node will result in a kobject warning 'refcount_t: underflow; use-after-free.'
>
> Fix this by explicitly acquiring a reference to the starting node
> using of_node_get() and attaching automatic cleanup via
> __free(device_node).
>
> Each discovered WSI node is stored in ag->wsi_node[] with its own
> of_node_get() reference. These references are later released in
> ath12k_core_free_wsi_info() during driver teardown.
>
> Also remove unnecessary memset() of wsi_node array since cleanup now
> explicitly sets pointers to NULL.
>
> Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.6-01243-QCAHKSWPL_SILICONZ-1
> Tested-on: IPQ5332 hw1.0 AHB WLAN.WBE.1.6-01275-QCAHKSWPL_SILICONZ-1
>
> Fixes: 908c10c860e0 ("wifi: ath12k: parse multiple device information from Device Tree")
> Signed-off-by: Aaradhana Sahu <aaradhana.sahu@oss.qualcomm.com>
> ---
> drivers/net/wireless/ath/ath12k/core.c | 77 ++++++++++++++++----------
> 1 file changed, 48 insertions(+), 29 deletions(-)
>
> diff --git a/drivers/net/wireless/ath/ath12k/core.c b/drivers/net/wireless/ath/ath12k/core.c
> index 2519e2400d58..980a12fb2c6e 100644
> --- a/drivers/net/wireless/ath/ath12k/core.c
> +++ b/drivers/net/wireless/ath/ath12k/core.c
> @@ -1838,10 +1838,22 @@ static struct ath12k_hw_group *ath12k_core_hw_group_alloc(struct ath12k_base *ab
> return ag;
> }
>
> +static void ath12k_core_free_wsi_info(struct ath12k_hw_group *ag)
> +{
> + int i;
> +
> + for (i = 0; i < ag->num_devices; i++) {
> + of_node_put(ag->wsi_node[i]);
> + ag->wsi_node[i] = NULL;
> + }
> + ag->num_devices = 0;
> +}
> +
> static void ath12k_core_hw_group_free(struct ath12k_hw_group *ag)
> {
> mutex_lock(&ath12k_hw_group_mutex);
>
> + ath12k_core_free_wsi_info(ag);
> list_del(&ag->list);
> kfree(ag);
>
> @@ -1867,52 +1879,59 @@ static struct ath12k_hw_group *ath12k_core_hw_group_find_by_dt(struct ath12k_bas
> static int ath12k_core_get_wsi_info(struct ath12k_hw_group *ag,
> struct ath12k_base *ab)
> {
> - struct device_node *wsi_dev = ab->dev->of_node, *next_wsi_dev;
> - struct device_node *tx_endpoint, *next_rx_endpoint;
> - int device_count = 0;
> -
> - next_wsi_dev = wsi_dev;
> + struct device_node *next_wsi_dev;
> + int device_count = 0, ret = 0;
> + struct device_node *wsi_dev;
>
> - if (!next_wsi_dev)
> + wsi_dev = of_node_get(ab->dev->of_node);
> + if (!wsi_dev)
> return -ENODEV;
>
> do {
> - ag->wsi_node[device_count] = next_wsi_dev;
> + if (device_count >= ATH12K_MAX_DEVICES) {
> + ath12k_warn(ab, "device count in DT %d is more than limit %d\n",
> + device_count, ATH12K_MAX_DEVICES);
> + ret = -EINVAL;
> + break;
> + }
> +
> + ag->wsi_node[device_count++] = of_node_get(wsi_dev);
>
> - tx_endpoint = of_graph_get_endpoint_by_regs(next_wsi_dev, 0, -1);
> + struct device_node *tx_endpoint __free(device_node) =
> + of_graph_get_endpoint_by_regs(wsi_dev, 0, -1);
> if (!tx_endpoint) {
> - of_node_put(next_wsi_dev);
> - return -ENODEV;
> + ret = -ENODEV;
> + break;
> }
>
> - next_rx_endpoint = of_graph_get_remote_endpoint(tx_endpoint);
> + struct device_node *next_rx_endpoint __free(device_node) =
> + of_graph_get_remote_endpoint(tx_endpoint);
> if (!next_rx_endpoint) {
> - of_node_put(next_wsi_dev);
> - of_node_put(tx_endpoint);
> - return -ENODEV;
> + ret = -ENODEV;
> + break;
> }
>
> - of_node_put(tx_endpoint);
> - of_node_put(next_wsi_dev);
> -
> next_wsi_dev = of_graph_get_port_parent(next_rx_endpoint);
> if (!next_wsi_dev) {
> - of_node_put(next_rx_endpoint);
> - return -ENODEV;
> + ret = -ENODEV;
> + break;
> }
>
> - of_node_put(next_rx_endpoint);
> + of_node_put(wsi_dev);
> + wsi_dev = next_wsi_dev;
> + } while (ab->dev->of_node != wsi_dev);
>
> - device_count++;
> - if (device_count > ATH12K_MAX_DEVICES) {
> - ath12k_warn(ab, "device count in DT %d is more than limit %d\n",
> - device_count, ATH12K_MAX_DEVICES);
> - of_node_put(next_wsi_dev);
> - return -EINVAL;
> + if (ret) {
> + while (--device_count >= 0) {
> + of_node_put(ag->wsi_node[device_count]);
> + ag->wsi_node[device_count] = NULL;
> }
> - } while (wsi_dev != next_wsi_dev);
>
> - of_node_put(next_wsi_dev);
> + of_node_put(wsi_dev);
> + return ret;
> + }
> +
> + of_node_put(wsi_dev);
> ag->num_devices = device_count;
>
> return 0;
> @@ -1983,9 +2002,9 @@ static struct ath12k_hw_group *ath12k_core_hw_group_assign(struct ath12k_base *a
> ath12k_core_get_wsi_index(ag, ab)) {
> ath12k_dbg(ab, ATH12K_DBG_BOOT,
> "unable to get wsi info from dt, grouping single device");
> + ath12k_core_free_wsi_info(ag);
> ag->id = ATH12K_INVALID_GROUP_ID;
> ag->num_devices = 1;
> - memset(ag->wsi_node, 0, sizeof(ag->wsi_node));
> wsi->index = 0;
> }
>
>
> base-commit: ae530e0b135102c5fc08e64c39e7a18564a52b3e
Reviewed-by: Baochen Qiang <baochen.qiang@oss.qualcomm.com>
^ permalink raw reply [flat|nested] 4+ messages in thread* Re: [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal
2026-04-10 7:13 [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal Aaradhana Sahu
2026-04-21 2:56 ` Baochen Qiang
@ 2026-04-21 5:30 ` Rameshkumar Sundaram
2026-04-23 18:00 ` Jeff Johnson
2 siblings, 0 replies; 4+ messages in thread
From: Rameshkumar Sundaram @ 2026-04-21 5:30 UTC (permalink / raw)
To: Aaradhana Sahu, ath12k; +Cc: linux-wireless
On 4/10/2026 12:43 PM, Aaradhana Sahu wrote:
> ath12k_core_get_wsi_info() traverses the WSI (Wired Serial Interface)
> device graph starting from dev->of_node. The current code uses
> dev->of_node directly as the local traversal pointer and calls
> of_node_put() on error.
>
> Since the driver does not own a reference to dev->of_node, dropping it
> during traversal results in the following OF refcount underflow:
>
> OF: ERROR: of_node_release() detected bad of_node_put() on /soc@0/wifi@c000000
> CPU: 1 UID: 0 PID: 210 Comm: insmod Not tainted 6.19.0-rc4-next-20260109-00023-g797dd36dc178 #26 PREEMPT
> Hardware name: Qualcomm Technologies, Inc. IPQ5332 MI01.2 (DT)
> Call trace:
> show_stack+0x18/0x24 (C)
> dump_stack_lvl+0x60/0x80
> dump_stack+0x18/0x24
> of_node_release+0x164/0x1a0
> kobject_put+0xb4/0x278
> of_node_put+0x18/0x28
> ath12k_core_init+0x29c/0x5d4 [ath12k]
> ath12k_ahb_probe+0x950/0xc14 [ath12k]
> platform_probe+0x5c/0xa4
> really_probe+0xc0/0x3ec
> __driver_probe_device+0x80/0x170
> driver_probe_device+0x3c/0x120
> __driver_attach+0xc4/0x218
> OF: ERROR: next of_node_put() on this node will result in a kobject warning 'refcount_t: underflow; use-after-free.'
>
> Fix this by explicitly acquiring a reference to the starting node
> using of_node_get() and attaching automatic cleanup via
> __free(device_node).
>
> Each discovered WSI node is stored in ag->wsi_node[] with its own
> of_node_get() reference. These references are later released in
> ath12k_core_free_wsi_info() during driver teardown.
>
> Also remove unnecessary memset() of wsi_node array since cleanup now
> explicitly sets pointers to NULL.
>
> Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.6-01243-QCAHKSWPL_SILICONZ-1
> Tested-on: IPQ5332 hw1.0 AHB WLAN.WBE.1.6-01275-QCAHKSWPL_SILICONZ-1
>
> Fixes: 908c10c860e0 ("wifi: ath12k: parse multiple device information from Device Tree")
> Signed-off-by: Aaradhana Sahu <aaradhana.sahu@oss.qualcomm.com>
Reviewed-by: Rameshkumar Sundaram <rameshkumar.sundaram@oss.qualcomm.com>
^ permalink raw reply [flat|nested] 4+ messages in thread* Re: [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal
2026-04-10 7:13 [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal Aaradhana Sahu
2026-04-21 2:56 ` Baochen Qiang
2026-04-21 5:30 ` Rameshkumar Sundaram
@ 2026-04-23 18:00 ` Jeff Johnson
2 siblings, 0 replies; 4+ messages in thread
From: Jeff Johnson @ 2026-04-23 18:00 UTC (permalink / raw)
To: ath12k, Aaradhana Sahu; +Cc: linux-wireless
On Fri, 10 Apr 2026 12:43:00 +0530, Aaradhana Sahu wrote:
> ath12k_core_get_wsi_info() traverses the WSI (Wired Serial Interface)
> device graph starting from dev->of_node. The current code uses
> dev->of_node directly as the local traversal pointer and calls
> of_node_put() on error.
>
> Since the driver does not own a reference to dev->of_node, dropping it
> during traversal results in the following OF refcount underflow:
>
> [...]
Applied, thanks!
[1/1] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal
commit: f3ba9e05cc7b65f41f58bb4808f6c3a8f7894bb1
Best regards,
--
Jeff Johnson <jeff.johnson@oss.qualcomm.com>
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2026-04-23 18:01 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-10 7:13 [PATCH ath-next] wifi: ath12k: fix OF node refcount imbalance in WSI graph traversal Aaradhana Sahu
2026-04-21 2:56 ` Baochen Qiang
2026-04-21 5:30 ` Rameshkumar Sundaram
2026-04-23 18:00 ` Jeff Johnson
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox