From patchwork Sat Nov 5 06:00:34 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steven Rostedt X-Patchwork-Id: 15896 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp829268wru; Fri, 4 Nov 2022 23:03:18 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6/H6LfMxz9sOrly21+y0NEuIuiw/HJkFb4qwS7005pnflae5zH006xGdlVz3WdGxkYFX98 X-Received: by 2002:a17:902:edcd:b0:17a:6fa:228d with SMTP id q13-20020a170902edcd00b0017a06fa228dmr39406747plk.29.1667628198454; Fri, 04 Nov 2022 23:03:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667628198; cv=none; d=google.com; s=arc-20160816; b=gX5k3tBMbqvbjpyq57hgs52uSm8XzxxvFKCGovA4ezUHCbbEaH+gI3yg6wi6kOpamD uc/xGiYrMHJePPVILn9YUvA91F0eLF29Tc16WD2saw5pPqjEAqEq9wAwg1S98CCRIHSB frWM6++vJHqMUyjOPU/dSVCTmFaZZcv8Wf1c6FkJUnfb2aC3Jwa8OADpq4hAge4hHqgl VVeADjuOdA7L2H36I1zP4kQSfWsuw1ssMcd7ne5Olo+V0Ab3NztuMTXxcMt5CygR3IRK CTEZpAXWuHJ53wmXAygbJzbIkXaj9hd9H/X0nfBcYjcpyjtRRLe7mC4l/Bh9K3A5kNr4 JtGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:subject:cc:to:from:date :user-agent:message-id; bh=YzGicS3q6s/hyPgHpdJHnDf/pdfSk/0UfRZaCbuf4OI=; b=YiclGR7Iy3CKcku+tWMsdqVVt+NjTBEvNrGnkVckHNqWvMMZY/bnCF4RukA+DlBKy8 EJJiq+eqstwfsRyeS+mVE8VY5mjv8CltTBtR4A8yCR6ucjowxSEQvfS8E3WDOZIcbSdn 9oKp5tG4S6+XW/IKlxtbcO+KCqY/oeCyZpAN0VTY2Vslm7rvGKU4SoBUsgmkg7lsLA0w ntrP5flnpDFKUBpM9H8nX9RwTQmtLi3Q996cpzZpZepNoheu/ZPTYQV5gY9bv3PePd66 jqaCc8RWuzDq1q6CWdyOCH/9jExdOTDbJxFRqPJAol3ZTdM4L4S72lEVSqH4IpSNet5m PW0Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j3-20020a17090a94c300b0020a1c6bb23csi5623216pjw.74.2022.11.04.23.03.05; Fri, 04 Nov 2022 23:03:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229797AbiKEGCL (ORCPT + 99 others); Sat, 5 Nov 2022 02:02:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60168 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229628AbiKEGBe (ORCPT ); Sat, 5 Nov 2022 02:01:34 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 01CE83121C; Fri, 4 Nov 2022 23:01:31 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id F40F5B830C6; Sat, 5 Nov 2022 06:01:29 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A421FC43141; Sat, 5 Nov 2022 06:01:28 +0000 (UTC) Received: from rostedt by gandalf.local.home with local (Exim 4.96) (envelope-from ) id 1orCFg-007OkS-2j; Sat, 05 Nov 2022 02:01:56 -0400 Message-ID: <20221105060156.686027537@goodmis.org> User-Agent: quilt/0.66 Date: Sat, 05 Nov 2022 02:00:34 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Linus Torvalds , Thomas Gleixner , Stephen Boyd , Guenter Roeck , Anna-Maria Gleixner , Andrew Morton , Marcel Holtmann , Johan Hedberg , Luiz Augusto von Dentz , linux-bluetooth@vger.kernel.org Subject: [PATCH v4a 10/38] timers: Bluetooth: Use timer_shutdown_sync() before freeing timer References: <20221105060024.598488967@goodmis.org> MIME-Version: 1.0 X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748634906060382764?= X-GMAIL-MSGID: =?utf-8?q?1748634906060382764?= From: "Steven Rostedt (Google)" Before a timer is freed, timer_shutdown_sync() must be called. In h5_close(), the timer is removed with del_timer_sync(), but it is only freed if hu->serdev is NULL. I added timer_shutdown_sync() just before it is freed. timer_shutdown() may also be used, but just in case it gets re-armed somehow, I figured another sync will keep that from being an issue. Link: https://lore.kernel.org/all/20221104054053.431922658@goodmis.org/ Cc: Marcel Holtmann Cc: Johan Hedberg Cc: Luiz Augusto von Dentz Cc: linux-bluetooth@vger.kernel.org Signed-off-by: Steven Rostedt (Google) --- drivers/bluetooth/hci_bcsp.c | 2 +- drivers/bluetooth/hci_h5.c | 4 +++- drivers/bluetooth/hci_qca.c | 4 ++-- 3 files changed, 6 insertions(+), 4 deletions(-) diff --git a/drivers/bluetooth/hci_bcsp.c b/drivers/bluetooth/hci_bcsp.c index cf4a56095817..834b2efaa9bf 100644 --- a/drivers/bluetooth/hci_bcsp.c +++ b/drivers/bluetooth/hci_bcsp.c @@ -737,7 +737,7 @@ static int bcsp_close(struct hci_uart *hu) { struct bcsp_struct *bcsp = hu->priv; - del_timer_sync(&bcsp->tbcsp); + timer_shutdown_sync(&bcsp->tbcsp); hu->priv = NULL; diff --git a/drivers/bluetooth/hci_h5.c b/drivers/bluetooth/hci_h5.c index c5a0409ef84f..633f3027abd2 100644 --- a/drivers/bluetooth/hci_h5.c +++ b/drivers/bluetooth/hci_h5.c @@ -265,8 +265,10 @@ static int h5_close(struct hci_uart *hu) if (h5->vnd && h5->vnd->close) h5->vnd->close(h5); - if (!hu->serdev) + if (!hu->serdev) { + timer_shutdown_sync(&h5->timer); kfree(h5); + } return 0; } diff --git a/drivers/bluetooth/hci_qca.c b/drivers/bluetooth/hci_qca.c index 8df11016fd51..eb81296b284c 100644 --- a/drivers/bluetooth/hci_qca.c +++ b/drivers/bluetooth/hci_qca.c @@ -697,8 +697,8 @@ static int qca_close(struct hci_uart *hu) skb_queue_purge(&qca->txq); skb_queue_purge(&qca->rx_memdump_q); destroy_workqueue(qca->workqueue); - del_timer_sync(&qca->tx_idle_timer); - del_timer_sync(&qca->wake_retrans_timer); + timer_shutdown_sync(&qca->tx_idle_timer); + timer_shutdown_sync(&qca->wake_retrans_timer); qca->hu = NULL; kfree_skb(qca->rx_skb);