* [PATCH] Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del()
@ 2026-03-19 15:16 Hyunwoo Kim
2026-03-19 18:16 ` Luiz Augusto von Dentz
0 siblings, 1 reply; 2+ messages in thread
From: Hyunwoo Kim @ 2026-03-19 15:16 UTC (permalink / raw)
To: marcel, johan.hedberg, luiz.dentz; +Cc: linux-bluetooth, imv4bel
l2cap_conn_del() calls cancel_delayed_work_sync() for both info_timer
and id_addr_timer while holding conn->lock. However, the work functions
l2cap_info_timeout() and l2cap_conn_update_id_addr() both acquire
conn->lock, creating a potential AB-BA deadlock if the work is already
executing when l2cap_conn_del() takes the lock.
Move the cancel_delayed_work_sync() calls before acquiring conn->lock
to break the lock inversion.
Fixes: ab4eedb790ca ("Bluetooth: L2CAP: Fix corrupted list in hci_chan_del")
Signed-off-by: Hyunwoo Kim <imv4bel@gmail.com>
---
net/bluetooth/l2cap_core.c | 12 +++++++-----
1 file changed, 7 insertions(+), 5 deletions(-)
diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
index a6ce09781083..68bc65b1c12a 100644
--- a/net/bluetooth/l2cap_core.c
+++ b/net/bluetooth/l2cap_core.c
@@ -1752,6 +1752,13 @@ static void l2cap_conn_del(struct hci_conn *hcon, int err)
BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
+ /* Cancel timers before acquiring conn->lock to prevent AB-BA
+ * deadlock with l2cap_info_timeout() and
+ * l2cap_conn_update_id_addr() which also acquire conn->lock.
+ */
+ cancel_delayed_work_sync(&conn->info_timer);
+ cancel_delayed_work_sync(&conn->id_addr_timer);
+
mutex_lock(&conn->lock);
kfree_skb(conn->rx_skb);
@@ -1767,8 +1774,6 @@ static void l2cap_conn_del(struct hci_conn *hcon, int err)
ida_destroy(&conn->tx_ida);
- cancel_delayed_work_sync(&conn->id_addr_timer);
-
l2cap_unregister_all_users(conn);
/* Force the connection to be immediately dropped */
@@ -1787,9 +1792,6 @@ static void l2cap_conn_del(struct hci_conn *hcon, int err)
l2cap_chan_put(chan);
}
- if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT)
- cancel_delayed_work_sync(&conn->info_timer);
-
hci_chan_del(conn->hchan);
conn->hchan = NULL;
--
2.43.0
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH] Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del()
2026-03-19 15:16 [PATCH] Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del() Hyunwoo Kim
@ 2026-03-19 18:16 ` Luiz Augusto von Dentz
0 siblings, 0 replies; 2+ messages in thread
From: Luiz Augusto von Dentz @ 2026-03-19 18:16 UTC (permalink / raw)
To: Hyunwoo Kim; +Cc: marcel, johan.hedberg, linux-bluetooth
Hi Hyunwoo,
On Thu, Mar 19, 2026 at 11:16 AM Hyunwoo Kim <imv4bel@gmail.com> wrote:
>
> l2cap_conn_del() calls cancel_delayed_work_sync() for both info_timer
> and id_addr_timer while holding conn->lock. However, the work functions
> l2cap_info_timeout() and l2cap_conn_update_id_addr() both acquire
> conn->lock, creating a potential AB-BA deadlock if the work is already
> executing when l2cap_conn_del() takes the lock.
>
> Move the cancel_delayed_work_sync() calls before acquiring conn->lock
> to break the lock inversion.
>
> Fixes: ab4eedb790ca ("Bluetooth: L2CAP: Fix corrupted list in hci_chan_del")
> Signed-off-by: Hyunwoo Kim <imv4bel@gmail.com>
> ---
> net/bluetooth/l2cap_core.c | 12 +++++++-----
> 1 file changed, 7 insertions(+), 5 deletions(-)
>
> diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
> index a6ce09781083..68bc65b1c12a 100644
> --- a/net/bluetooth/l2cap_core.c
> +++ b/net/bluetooth/l2cap_core.c
> @@ -1752,6 +1752,13 @@ static void l2cap_conn_del(struct hci_conn *hcon, int err)
>
> BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
>
> + /* Cancel timers before acquiring conn->lock to prevent AB-BA
> + * deadlock with l2cap_info_timeout() and
> + * l2cap_conn_update_id_addr() which also acquire conn->lock.
> + */
> + cancel_delayed_work_sync(&conn->info_timer);
> + cancel_delayed_work_sync(&conn->id_addr_timer);
> +
While at it we might want to update this to use disable_delayed_work_sync
> mutex_lock(&conn->lock);
>
> kfree_skb(conn->rx_skb);
> @@ -1767,8 +1774,6 @@ static void l2cap_conn_del(struct hci_conn *hcon, int err)
>
> ida_destroy(&conn->tx_ida);
>
> - cancel_delayed_work_sync(&conn->id_addr_timer);
> -
> l2cap_unregister_all_users(conn);
>
> /* Force the connection to be immediately dropped */
> @@ -1787,9 +1792,6 @@ static void l2cap_conn_del(struct hci_conn *hcon, int err)
> l2cap_chan_put(chan);
> }
>
> - if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT)
> - cancel_delayed_work_sync(&conn->info_timer);
> -
> hci_chan_del(conn->hchan);
> conn->hchan = NULL;
>
> --
> 2.43.0
>
--
Luiz Augusto von Dentz
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2026-03-19 18:16 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-19 15:16 [PATCH] Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del() Hyunwoo Kim
2026-03-19 18:16 ` Luiz Augusto von Dentz
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox