[linux-yocto] [PATCH] Bluetooth: Delay check for conn->smp in smp_conn_security()

Bruce Ashfield bruce.ashfield at windriver.com
Wed Sep 16 13:22:02 PDT 2015


On 15-09-15 05:10 AM, Wu Zheng wrote:
> From: Johan Hedberg <johan.hedberg at intel.com>
>
> There are several actions that smp_conn_security() might make that do
> not require a valid SMP context (conn->smp pointer). One of these
> actions is to encrypt the link with an existing LTK. If the SMP
> context wasn't initialized properly we should still allow the
> independent actions to be done, i.e. the check for the context should
> only be done at the last possible moment.

I've staged the commit. When my build tests pass, I'll push it to
the servers. Should be out by tomorrow.

Bruce

>
> Reported-by: Chuck Ebbert <cebbert.lkml at gmail.com>
> Signed-off-by: Johan Hedberg <johan.hedberg at intel.com>
> Signed-off-by: Marcel Holtmann <marcel at holtmann.org>
> ---
>   net/bluetooth/smp.c | 12 ++++++------
>   1 file changed, 6 insertions(+), 6 deletions(-)
>
> diff --git a/net/bluetooth/smp.c b/net/bluetooth/smp.c
> index ad82324..0510a57 100644
> --- a/net/bluetooth/smp.c
> +++ b/net/bluetooth/smp.c
> @@ -2311,12 +2311,6 @@ int smp_conn_security(struct hci_conn *hcon, __u8 sec_level)
>   	if (!conn)
>   		return 1;
>
> -	chan = conn->smp;
> -	if (!chan) {
> -		BT_ERR("SMP security requested but not available");
> -		return 1;
> -	}
> -
>   	if (!hci_dev_test_flag(hcon->hdev, HCI_LE_ENABLED))
>   		return 1;
>
> @@ -2330,6 +2324,12 @@ int smp_conn_security(struct hci_conn *hcon, __u8 sec_level)
>   		if (smp_ltk_encrypt(conn, hcon->pending_sec_level))
>   			return 0;
>
> +	chan = conn->smp;
> +	if (!chan) {
> +		BT_ERR("SMP security requested but not available");
> +		return 1;
> +	}
> +
>   	l2cap_chan_lock(chan);
>
>   	/* If SMP is already in progress ignore this request */
>



More information about the linux-yocto mailing list