Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 900FFC636CC for ; Fri, 3 Feb 2023 09:31:15 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232315AbjBCJbM (ORCPT ); Fri, 3 Feb 2023 04:31:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48832 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232287AbjBCJbK (ORCPT ); Fri, 3 Feb 2023 04:31:10 -0500 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9566E10A8C for ; Fri, 3 Feb 2023 01:31:01 -0800 (PST) Received: by mail-yb1-xb49.google.com with SMTP id a4-20020a5b0004000000b006fdc6aaec4fso4321041ybp.20 for ; Fri, 03 Feb 2023 01:31:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=sRTbWykUitHgvhIuijlROFHq2rLMmEeBT0jym/fZRho=; b=ZxWqHCLVjngGEk4ipClqZnRBMhXs5pSp6EiXtCoAYhRe2gcqC2BVj53CiBoI039z8x eU7DUl5OyCx6/wcW7k0VZA8iV3j3OcEBzrHOhIZQyXiRuqib7fGkhKrCjUzCHFoMOs16 +yWvyt+MXChCX+qNjXpNBuJy6m0hOQmvvEVb0zBnDwD2OlV3lTM7aI8lCJS/KeURGuSr M3z0oA81BT5p2MGj4XGc2hnjal4j0I4xLfdDM6ybou9L2AOCN7pUZMnKlLIYDnkCN1To BtHJojOUK7tZw9t2g3IgkHUZUgvdWQ/pAPsTcm6q1BwooCkviCjPqE/Ge89CRtch43zU TWWA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=sRTbWykUitHgvhIuijlROFHq2rLMmEeBT0jym/fZRho=; b=2MZumJhZHAfWAAT6RlKKPIBixxOKM3nUe+yQFKJ26uhIBnpGXlgzv/o0ZXvmWGGn1L ekXLmOP3ZNFX0F4RXH0GTHPImIIoyk4sr3C8rMN2xnKISN9zKGdGtsPbFRUGSioPwLt+ 8z8DufxBRCpXVuwxZQG1BN/O+j3wM3o0aqvzTK/MdYZoy0VPPxiKDcdHImuHgTfo/STC M5IoT9i4F8N00XKNoHzwbOJxo0fomAmiyi5CPTDcwZiZZ+hy8mN1DITf29ss0uoG9nHu 8ueWQBjZcmUof78rgxyjtqaedVhwcVziY13Yu8ZkxjbwseKGvI5vbze3MaRLZ+16EDIj UVOg== X-Gm-Message-State: AO0yUKWQRsX5aofwo9IqM+hxgSMCrcSlX0zy27yiF+SoEIlcMYqRnOwb tFvshUYJnPhg8zVnZxK+7Ln9KgmFJ/G3RidWcPmo762f9/6dJNx83efSRsgFH/l1mAD/uFseK3v GlONeVD4ojmKi7R/yR0rDu75hgEqnivQlMHYN6ZrIW0rcJ4uv7CKyrmeNFOq7NfTlSqTo0H5Mus yf X-Google-Smtp-Source: AK7set93uK0vjiKvgKPCxErhx5wSC107Pw7JjXaebDJDuLrkzVIe9hoW7AcJu1HsNKq+FLpnrjagECO5pnxG X-Received: from apusaka-p920.tpe.corp.google.com ([2401:fa00:1:17:dc12:2976:77a:8cb7]) (user=apusaka job=sendgmr) by 2002:a25:d215:0:b0:863:a092:156d with SMTP id j21-20020a25d215000000b00863a092156dmr249062ybg.23.1675416660756; Fri, 03 Feb 2023 01:31:00 -0800 (PST) Date: Fri, 3 Feb 2023 17:30:55 +0800 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.1.519.gcb327c4b5f-goog Message-ID: <20230203173024.1.Ieb6662276f3bd3d79e9134ab04523d584c300c45@changeid> Subject: [PATCH] Bluetooth: Free potentially unfreed SCO connection From: Archie Pusaka To: linux-bluetooth , Luiz Augusto von Dentz , Marcel Holtmann Cc: CrosBT Upstreaming , Archie Pusaka , Ying Hsu , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Johan Hedberg , Paolo Abeni , linux-kernel@vger.kernel.org, netdev@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Archie Pusaka It is possible to initiate a SCO connection while deleting the corresponding ACL connection, e.g. in below scenario: (1) < hci setup sync connect command (2) > hci disconn complete event (for the acl connection) (3) > hci command complete event (for(1), failure) When it happens, hci_cs_setup_sync_conn won't be able to obtain the reference to the SCO connection, so it will be stuck and potentially hinder subsequent connections to the same device. This patch prevents that by also deleting the SCO connection if it is still not established when the corresponding ACL connection is deleted. Signed-off-by: Archie Pusaka Reviewed-by: Ying Hsu --- net/bluetooth/hci_conn.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/net/bluetooth/hci_conn.c b/net/bluetooth/hci_conn.c index 61a34801e61e..838f51c272a6 100644 --- a/net/bluetooth/hci_conn.c +++ b/net/bluetooth/hci_conn.c @@ -1061,8 +1061,15 @@ int hci_conn_del(struct hci_conn *conn) if (conn->type == ACL_LINK) { struct hci_conn *sco = conn->link; - if (sco) + if (sco) { sco->link = NULL; + /* Due to race, SCO connection might be not established + * yet at this point. Delete it now, otherwise it is + * possible for it to be stuck and can't be deleted. + */ + if (sco->handle == HCI_CONN_HANDLE_UNSET) + hci_conn_del(sco); + } /* Unacked frames */ hdev->acl_cnt += conn->sent; -- 2.39.1.519.gcb327c4b5f-goog