Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_PASS,UNPARSEABLE_RELAY,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7EFB0C43381 for ; Wed, 13 Mar 2019 23:52:40 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3EBA42183F for ; Wed, 13 Mar 2019 23:52:40 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="hT0cTPjX" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727262AbfCMXwX (ORCPT ); Wed, 13 Mar 2019 19:52:23 -0400 Received: from mail-yw1-f68.google.com ([209.85.161.68]:37982 "EHLO mail-yw1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726640AbfCMXwV (ORCPT ); Wed, 13 Mar 2019 19:52:21 -0400 Received: by mail-yw1-f68.google.com with SMTP id m207so2980167ywd.5 for ; Wed, 13 Mar 2019 16:52:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:mime-version:date:message-id:subject:to:cc; bh=f+t4V07aCemw8cZpkvomwq06lLcOjBQtHDVqyar9YBA=; b=hT0cTPjXYGOkK0QYxz1vIbcPOencR1uY+jwZquNNLCpAS0wnZauC8/nIJDkVWriCU8 epif7zG1eX9SlCt6Z0Rsi55TK+GCQVV15X3qjJvRN9E/GE93nca2ZLtn0nqg/Ocwc3ZD in9yC6edNVQ3ZeARWnwtLoUB9PtSIO1JwnQM8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:date:message-id:subject:to:cc; bh=f+t4V07aCemw8cZpkvomwq06lLcOjBQtHDVqyar9YBA=; b=P+/nuUBsL+wIMMO6B0PgpUHbHUFSq/Hxbz80S0XslJ3vX2jRYHmPW+JR6kKSVEUOBk 0yX0fZjVnDeDwscOwMAklnE1ANHzpdvQGtB40BQeZUf7g0+SRhm0vijRzI+RqEeA3/XY xJNj0mxwMumQ4xXpMlzlWjtoWKyuMjNMUra5gMx2XwnwhT+ppFd6Dv6tfkTrIkh3OkfN i//fsrllIluw7qwPX/6gOfAz1L4gBX8TK8vYpeWmdATZ/s8noFAkJVv+BTynMuwwypS7 GJ78MARLTbADcLJKCOAYKN1R5h3+T6OACaz5nIcCK6w8l3SsDUKL9XBe3lwKlDnOPPpP PSTA== X-Gm-Message-State: APjAAAWZXQAQ9/ZqePNixhcxEFiIRdf9qQh8ZEdDW60v8lQx36AoegKl bSw0PKn4Q4BsAiML6Zog+1ix61EwIj2iqMwOYN9Mvw== X-Google-Smtp-Source: APXvYqwh3mIabiSaIYbmTUO5xzXNp0J9huZbdniT74h4eblzaCj8E3NlWVfGYe7CWfT4K91Sll0tEsWNy4ivQ/yf/ug= X-Received: by 2002:a81:7a94:: with SMTP id v142mr16143111ywc.221.1552521140654; Wed, 13 Mar 2019 16:52:20 -0700 (PDT) Received: from 764776645087 named unknown by gmailapi.google.com with HTTPREST; Wed, 13 Mar 2019 16:52:19 -0700 From: Matthias Kaehlcke X-Mailer: git-send-email 2.21.0.360.g471c308f928-goog MIME-Version: 1.0 Date: Wed, 13 Mar 2019 16:52:19 -0700 Message-ID: Subject: [PATCH] Bluetooth: hci_qca: Fix crash with non-serdev devices To: Marcel Holtmann , Johan Hedberg Cc: linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org, Balakrishna Godavarthi , Hemantg , Rocky Liao , Matthias Kaehlcke Content-Type: text/plain; charset="UTF-8" Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org qca_set_baudrate() calls serdev_device_wait_until_sent() assuming that the HCI is always associated with a serdev device. This isn't true for ROME controllers instantiated through ldisc, where the call causes a crash due to a NULL pointer dereferentiation. Only call the function when we have a serdev device. The timeout for ROME devices at the end of qca_set_baudrate() is long enough to be reasonably sure that the command was sent. Fixes: fa9ad876b8e0 ("Bluetooth: hci_qca: Add support for Qualcomm Bluetooth chip wcn3990") Reported-by: Balakrishna Godavarthi Reported-by: Rocky Liao Signed-off-by: Matthias Kaehlcke --- drivers/bluetooth/hci_qca.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/bluetooth/hci_qca.c b/drivers/bluetooth/hci_qca.c index 4ea995d610d2..714a6a16f9d5 100644 --- a/drivers/bluetooth/hci_qca.c +++ b/drivers/bluetooth/hci_qca.c @@ -1004,7 +1004,8 @@ static int qca_set_baudrate(struct hci_dev *hdev, uint8_t baudrate) while (!skb_queue_empty(&qca->txq)) usleep_range(100, 200); - serdev_device_wait_until_sent(hu->serdev, + if (hu->serdev) + serdev_device_wait_until_sent(hu->serdev, msecs_to_jiffies(CMD_TRANS_TIMEOUT_MS)); /* Give the controller time to process the request */ -- 2.21.0.360.g471c308f928-goog