Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp135534ybc; Mon, 18 Nov 2019 21:57:11 -0800 (PST) X-Google-Smtp-Source: APXvYqzxJOY2swXECbpio1j9KG42pk5/I6tqZMT01GL9YBmU4cPsKpJIcwuP6uPJy9/VVx9crxJ7 X-Received: by 2002:a17:906:5502:: with SMTP id r2mr33409007ejp.3.1574143031488; Mon, 18 Nov 2019 21:57:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574143031; cv=none; d=google.com; s=arc-20160816; b=xjIxM5SmYWnCPMnAv5QmyEBXe0ZaUs8vQR8IzukCuNkLXq8xK0ephh0P7cMv0T7V7V gUxBnSEonhnAkcHfV62wtEupqYbkZNRS31kbPX52HKWj6Hw2tAe8W4REEZ0kxtQrBVaP 62VxV30KhXvjcgDPO2Aas8AqrbTsTQV5dk/d4984LizKj+AXweikJcHmHkLagF7MzuwW oxTld7LLOCxgDv9X4Jmx1rMDoJqVpeNRyu947DYtpYL0fCHu4EYgQS+1TDjAL7r263VK S+Jz6eOxdtq/izS9e4u5P7oNpPqJagM4yKo2nabnHuILmobuS6prJ+AAuNGw/J5mVm0G W8ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dWEl+ps111ZPornoGwrcGMlQPebM2TERH1A4Ceowbd4=; b=zn5qzsa9BJewxZF3XTnEg5/ppYyjLWsLO+BLoT3Wxak5pPoeGT/54j8AoanWuk35SY Ufzb2e5RouPvbjyfx0eAf87ZE+DkjC5nG/8hR+wR6BZk4ZHEzFQGDG2b0LwdA8sxvOMD GRcO26nHb/GOq1roDfOEgxtyt9qrb9i+7k1vSM9GUDuhnplYufj8HhBCG+dWAZu837Zg FngsupzB3aFv/w5g0bDavbUAke6etuVvKYSNfFCBlhKylUfBe/8b11ewSqjQemy+RoId 44BEwTd7nHpD2Xmgs/atUjjlJSa3cWKWiQ3mIUqTFeOfhIzZjXTTlenVBCTnNl/92LNQ u+/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0363rzaX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d2si13926249ejr.371.2019.11.18.21.56.46; Mon, 18 Nov 2019 21:57:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0363rzaX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729437AbfKSFyI (ORCPT + 99 others); Tue, 19 Nov 2019 00:54:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:52152 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732095AbfKSFyE (ORCPT ); Tue, 19 Nov 2019 00:54:04 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D53A920721; Tue, 19 Nov 2019 05:54:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574142844; bh=fg91nLDGVt3w607YoMYtnBvNOU3I7TSwxUy5GAjZX40=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0363rzaXbWMN4P+jOxXSazyZksRlFP7sp8SM9+r+9XJcXmbn1EiQJQhANDsNxKsqI BESaDELK4y0BJq0yDd1AhSmJnmIe3lrTPYnhViHaIACqv8vwFwVjUenQVLd4YsRzaQ FLgwmNtmTd1cLMTZFx+VdT56I9208W4NClTzC3+8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Balakrishna Godavarthi , Marcel Holtmann , Sasha Levin Subject: [PATCH 4.14 212/239] Bluetooth: hci_serdev: clear HCI_UART_PROTO_READY to avoid closing proto races Date: Tue, 19 Nov 2019 06:20:12 +0100 Message-Id: <20191119051338.451348099@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191119051255.850204959@linuxfoundation.org> References: <20191119051255.850204959@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Balakrishna Godavarthi [ Upstream commit 7cf7846d27bfc9731e449857db3eec5e0e9701ba ] Clearing HCI_UART_PROTO_READY will avoid usage of proto function pointers before running the proto close function pointer. There is chance of kernel crash, due to usage of non proto close function pointers after proto close. Signed-off-by: Balakrishna Godavarthi Signed-off-by: Marcel Holtmann Signed-off-by: Sasha Levin --- drivers/bluetooth/hci_serdev.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/bluetooth/hci_serdev.c b/drivers/bluetooth/hci_serdev.c index 52e6d4d1608e3..69c00a3db5382 100644 --- a/drivers/bluetooth/hci_serdev.c +++ b/drivers/bluetooth/hci_serdev.c @@ -360,6 +360,7 @@ void hci_uart_unregister_device(struct hci_uart *hu) { struct hci_dev *hdev = hu->hdev; + clear_bit(HCI_UART_PROTO_READY, &hu->flags); hci_unregister_dev(hdev); hci_free_dev(hdev); -- 2.20.1