Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp234855rwd; Wed, 24 May 2023 17:23:32 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7wQAgDCdm6m8U/sdB8px3APeE6Yx0lwjVQcazmcX/Jkd7Gv0nkZFEqIbaLq3nwaAg/w0tr X-Received: by 2002:a17:902:7d8d:b0:1ae:4553:edfa with SMTP id a13-20020a1709027d8d00b001ae4553edfamr17542107plm.29.1684974211854; Wed, 24 May 2023 17:23:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684974211; cv=none; d=google.com; s=arc-20160816; b=XefQHfwAY630hZQ16Rd8KJQMxsqNJ7sbV5XM8j/wNZ40Ww/e7CqP6/Lta3qPlokpC2 OzjWkER/vIWaLZTEBfMjqJ9bSoXcJg8QScCTc0FCLknlf4AQ6XrB4gW7WOycU8GyjFqq MIMBV8Z63uPhj29OLK8oYrIFnxcH8WUzW5mrOy0dRM2KqT3oBoOT9Dz8qzaIR8NG/Ww6 rq3/eLKRRauc6QGBdP7sLk185UKEPtkPih1DTetYcv1Y5PeAoY2lPxJQ+huAOaJKd8EV ZgVf1dzqZ8XAgsU3AcerdNWCEzf6/lhhJl/v7D1xwVHY2Y0g5jNL+dKM+PR8kPfHnfeg KMcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=CuGzP4jvcFhZR0qNDB5MEw2qn9YAXXZ3upPhfuHloLo=; b=sLn1QE4GSG6vZDbwiM9aXlAsoAB2S6qurJh2efcN5rDqrdUhycgUNIQ3cLbpg5pIVU F7TNPuS4yubRZ2yslasaPhyLxoL/kUNca8Oe4pxm+yPDdazzzj40CYIKB0OxJ/GTy+/t 6hDmzrrTlQ1lyD/UmydZJVdVN1uOMOyElLOq6LoKOJx5W1oZHPaCNPal0W0frrcxFHmq MMftX1n27G08+h4oX0TMOU4aic2XFWZQt6NEZm7AOMbTPVaDiJox/gbcXMK4uCKFux2K 2nr6ywI/PyZhMAVIz8BCkBQmXkedIPVgLgoyITd0shFX9MWvINXszT5kPGihiaymT4xb w6HQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="QyP5/8p7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e13-20020a170902d38d00b001aaf08eae06si75695pld.591.2023.05.24.17.23.15; Wed, 24 May 2023 17:23:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b="QyP5/8p7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229955AbjEYAMG (ORCPT + 99 others); Wed, 24 May 2023 20:12:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36430 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229452AbjEYAMG (ORCPT ); Wed, 24 May 2023 20:12:06 -0400 Received: from mail-pf1-x44a.google.com (mail-pf1-x44a.google.com [IPv6:2607:f8b0:4864:20::44a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 717B7135 for ; Wed, 24 May 2023 17:12:04 -0700 (PDT) Received: by mail-pf1-x44a.google.com with SMTP id d2e1a72fcca58-64d20f79776so921388b3a.1 for ; Wed, 24 May 2023 17:12:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1684973524; x=1687565524; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=CuGzP4jvcFhZR0qNDB5MEw2qn9YAXXZ3upPhfuHloLo=; b=QyP5/8p7Gy/PZSdwURtv5JC7lUyDeFZAlQgrfKUMESQAz11X9jTC701MmiWTjBTWvF IAuICHYBgGOZqQeEcyVQjQpaMAQYEio+n0H39WxwzhfDxbpisBUkNZjpTJD5ubWRy1Iy c6nUdTAJEBFUNl/+Byq7Cyfiw0sqvpVQLlvMrz2cFsUwhoccvg3tiIsUCPORX8Fr1MC5 u000gRpAjzCP6n671I4By3AFo3+L3eeMmeRAwC87rjDfLnqU7Xk3YbbsJ516rCo/V6py UEzelwVRqWiBazvdg4pIdomKH5G/lutEBpQNw1JZ8k27mpiU74Cz5jr01Ri8TpDddZUW QLaA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684973524; x=1687565524; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=CuGzP4jvcFhZR0qNDB5MEw2qn9YAXXZ3upPhfuHloLo=; b=fdzgXnuy8Uk9WrGo1Ax4RmDYLMaGWcAaLfn7Guu0ea+SUGA1uma+w6T/aIHJdo3xI4 6TuzUdLS5SBozVPmgaz64jFNs2rCeqPvsVpdPJ4kBvhuSu+Yujyu3kYbLYBwUqNM1vrp uXef2ITrYK1gwr+hEop9AG1K2RxcrcsxN1KEkyFR0s38pOhI4ggBmi2DarjSQtMWm8rt xC2rtV+nlECeWZ6QfktiOFofaAH2HjXqASe0IM4hTgO+stC8/k+HO9mR/flyRQI7nHjY FS4ktLn+lmrkweTaYE9m3LLwpMxYTh8dNX6WyDZMWOgq374E2KKX+34GHmog6mjngLSE 0MNQ== X-Gm-Message-State: AC+VfDzhH0j9fUnAca1aEgIVYkdkvbnkBw/RLUpXhflLzIuBNf78vOcq ZTBHIGdHHpriaND5/Pou5etiosWIvqMW X-Received: from jiangzp-glinux-dev.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:4c52]) (user=jiangzp job=sendgmr) by 2002:a05:6a00:1514:b0:63d:397a:8fdd with SMTP id q20-20020a056a00151400b0063d397a8fddmr1747469pfu.0.1684973523938; Wed, 24 May 2023 17:12:03 -0700 (PDT) Date: Wed, 24 May 2023 17:11:58 -0700 Mime-Version: 1.0 X-Mailer: git-send-email 2.40.1.698.g37aff9b760-goog Message-ID: <20230524171158.kernel.v1.1.Ie9c81a5f8bbdb4f9a2007c56f05001d7e674dbe0@changeid> Subject: [kernel PATCH v1] Bluetooth: hci_sync: add lock to protect HCI_UNREGISTER From: Zhengping Jiang To: linux-bluetooth@vger.kernel.org, marcel@holtmann.org, luiz.dentz@gmail.com Cc: chromeos-bluetooth-upstreaming@chromium.org, Zhengping Jiang , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Johan Hedberg , Paolo Abeni , linux-kernel@vger.kernel.org, netdev@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When the HCI_UNREGISTER flag is set, no jobs should be scheduled. Fix potential race when HCI_UNREGISTER is set after the flag is tested in hci_cmd_sync_queue. Fixes: 0b94f2651f56 ("Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set") Signed-off-by: Zhengping Jiang --- Changes in v1: - Add a lock to protect HCI_UNREGISTER flag include/net/bluetooth/hci_core.h | 1 + net/bluetooth/hci_core.c | 2 ++ net/bluetooth/hci_sync.c | 20 ++++++++++++++------ 3 files changed, 17 insertions(+), 6 deletions(-) diff --git a/include/net/bluetooth/hci_core.h b/include/net/bluetooth/hci_core.h index c86ecce34854..9a21b4787df5 100644 --- a/include/net/bluetooth/hci_core.h +++ b/include/net/bluetooth/hci_core.h @@ -515,6 +515,7 @@ struct hci_dev { struct work_struct cmd_sync_work; struct list_head cmd_sync_work_list; struct mutex cmd_sync_work_lock; + struct mutex hdev_unregister_lock; struct work_struct cmd_sync_cancel_work; struct work_struct reenable_adv_work; diff --git a/net/bluetooth/hci_core.c b/net/bluetooth/hci_core.c index a856b1051d35..216c78656133 100644 --- a/net/bluetooth/hci_core.c +++ b/net/bluetooth/hci_core.c @@ -2686,7 +2686,9 @@ void hci_unregister_dev(struct hci_dev *hdev) { BT_DBG("%p name %s bus %d", hdev, hdev->name, hdev->bus); + mutex_lock(&hdev->hdev_unregister_lock); hci_dev_set_flag(hdev, HCI_UNREGISTER); + mutex_unlock(&hdev->hdev_unregister_lock); write_lock(&hci_dev_list_lock); list_del(&hdev->list); diff --git a/net/bluetooth/hci_sync.c b/net/bluetooth/hci_sync.c index 647a8ce54062..2038335bdc85 100644 --- a/net/bluetooth/hci_sync.c +++ b/net/bluetooth/hci_sync.c @@ -629,6 +629,7 @@ void hci_cmd_sync_init(struct hci_dev *hdev) INIT_WORK(&hdev->cmd_sync_work, hci_cmd_sync_work); INIT_LIST_HEAD(&hdev->cmd_sync_work_list); mutex_init(&hdev->cmd_sync_work_lock); + mutex_init(&hdev->hdev_unregister_lock); INIT_WORK(&hdev->cmd_sync_cancel_work, hci_cmd_sync_cancel_work); INIT_WORK(&hdev->reenable_adv_work, reenable_adv); @@ -692,14 +693,19 @@ int hci_cmd_sync_submit(struct hci_dev *hdev, hci_cmd_sync_work_func_t func, void *data, hci_cmd_sync_work_destroy_t destroy) { struct hci_cmd_sync_work_entry *entry; + int err = 0; - if (hci_dev_test_flag(hdev, HCI_UNREGISTER)) - return -ENODEV; + mutex_lock(&hdev->hdev_unregister_lock); + if (hci_dev_test_flag(hdev, HCI_UNREGISTER)) { + err = -ENODEV; + goto unlock; + } entry = kmalloc(sizeof(*entry), GFP_KERNEL); - if (!entry) - return -ENOMEM; - + if (!entry) { + err = -ENOMEM; + goto unlock; + } entry->func = func; entry->data = data; entry->destroy = destroy; @@ -710,7 +716,9 @@ int hci_cmd_sync_submit(struct hci_dev *hdev, hci_cmd_sync_work_func_t func, queue_work(hdev->req_workqueue, &hdev->cmd_sync_work); - return 0; +unlock: + mutex_unlock(&hdev->hdev_unregister_lock); + return err; } EXPORT_SYMBOL(hci_cmd_sync_submit); -- 2.40.1.698.g37aff9b760-goog