aboutsummaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorAndrei Emeltchenko <andrei.emeltchenko@nokia.com>2010-11-03 06:32:44 -0400
committerGustavo F. Padovan <padovan@profusion.mobi>2010-12-01 18:04:36 -0500
commita49184c229535ebedbb659214db2d4d1d77b7c07 (patch)
tree6a06bba4cf178a45d2f1ad61d91c4e3adee46cd4 /net
parentd31dbf6e5989b2fd9a30ec5b25436e94f009d6df (diff)
Bluetooth: Check sk is not owned before freeing l2cap_conn
Check that socket sk is not locked in user process before removing l2cap connection handler. lock_sock and release_sock do not hold a normal spinlock directly but instead hold the owner field. This means bh_lock_sock can still execute even if the socket is "locked". More info can be found here: http://www.linuxfoundation.org/collaborate/workgroups/networking/socketlocks krfcommd kernel thread may be preempted with l2cap tasklet which remove l2cap_conn structure. If krfcommd is in process of sending of RFCOMM reply (like "RFCOMM UA" reply to "RFCOMM DISC") then kernel crash happens. ... [ 694.175933] Unable to handle kernel NULL pointer dereference at virtual address 00000000 [ 694.184936] pgd = c0004000 [ 694.187683] [00000000] *pgd=00000000 [ 694.191711] Internal error: Oops: 5 [#1] PREEMPT [ 694.196350] last sysfs file: /sys/devices/platform/hci_h4p/firmware/hci_h4p/loading [ 694.260375] CPU: 0 Not tainted (2.6.32.10 #1) [ 694.265106] PC is at l2cap_sock_sendmsg+0x43c/0x73c [l2cap] [ 694.270721] LR is at 0xd7017303 ... [ 694.525085] Backtrace: [ 694.527587] [<bf266be0>] (l2cap_sock_sendmsg+0x0/0x73c [l2cap]) from [<c02f2cc8>] (sock_sendmsg+0xb8/0xd8) [ 694.537292] [<c02f2c10>] (sock_sendmsg+0x0/0xd8) from [<c02f3044>] (kernel_sendmsg+0x48/0x80) Signed-off-by: Andrei Emeltchenko <andrei.emeltchenko@nokia.com> Acked-by: Marcel Holtmann <marcel@holtmann.org> Signed-off-by: Gustavo F. Padovan <padovan@profusion.mobi>
Diffstat (limited to 'net')
-rw-r--r--net/bluetooth/l2cap.c26
1 files changed, 26 insertions, 0 deletions
diff --git a/net/bluetooth/l2cap.c b/net/bluetooth/l2cap.c
index cd8f6ea03841..4ed38272df78 100644
--- a/net/bluetooth/l2cap.c
+++ b/net/bluetooth/l2cap.c
@@ -3078,6 +3078,14 @@ static inline int l2cap_connect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hd
3078 break; 3078 break;
3079 3079
3080 default: 3080 default:
3081 /* don't delete l2cap channel if sk is owned by user */
3082 if (sock_owned_by_user(sk)) {
3083 sk->sk_state = BT_DISCONN;
3084 l2cap_sock_clear_timer(sk);
3085 l2cap_sock_set_timer(sk, HZ / 5);
3086 break;
3087 }
3088
3081 l2cap_chan_del(sk, ECONNREFUSED); 3089 l2cap_chan_del(sk, ECONNREFUSED);
3082 break; 3090 break;
3083 } 3091 }
@@ -3283,6 +3291,15 @@ static inline int l2cap_disconnect_req(struct l2cap_conn *conn, struct l2cap_cmd
3283 3291
3284 sk->sk_shutdown = SHUTDOWN_MASK; 3292 sk->sk_shutdown = SHUTDOWN_MASK;
3285 3293
3294 /* don't delete l2cap channel if sk is owned by user */
3295 if (sock_owned_by_user(sk)) {
3296 sk->sk_state = BT_DISCONN;
3297 l2cap_sock_clear_timer(sk);
3298 l2cap_sock_set_timer(sk, HZ / 5);
3299 bh_unlock_sock(sk);
3300 return 0;
3301 }
3302
3286 l2cap_chan_del(sk, ECONNRESET); 3303 l2cap_chan_del(sk, ECONNRESET);
3287 bh_unlock_sock(sk); 3304 bh_unlock_sock(sk);
3288 3305
@@ -3305,6 +3322,15 @@ static inline int l2cap_disconnect_rsp(struct l2cap_conn *conn, struct l2cap_cmd
3305 if (!sk) 3322 if (!sk)
3306 return 0; 3323 return 0;
3307 3324
3325 /* don't delete l2cap channel if sk is owned by user */
3326 if (sock_owned_by_user(sk)) {
3327 sk->sk_state = BT_DISCONN;
3328 l2cap_sock_clear_timer(sk);
3329 l2cap_sock_set_timer(sk, HZ / 5);
3330 bh_unlock_sock(sk);
3331 return 0;
3332 }
3333
3308 l2cap_chan_del(sk, 0); 3334 l2cap_chan_del(sk, 0);
3309 bh_unlock_sock(sk); 3335 bh_unlock_sock(sk);
3310 3336