diff options
author | Luiz Augusto von Dentz <luiz.von.dentz@intel.com> | 2023-11-20 10:04:39 -0500 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-01-08 11:25:04 +0100 |
commit | 3abc53a64e0ab44041e8d2ba852806dfa0c8c421 (patch) | |
tree | 8ff14db8ff79814b1f4e00da12bfdaa0d0253304 | |
parent | 54fdb26372540e3a38e4e94ecd698525384459a5 (diff) | |
download | linux-stable-3abc53a64e0ab44041e8d2ba852806dfa0c8c421.tar.gz linux-stable-3abc53a64e0ab44041e8d2ba852806dfa0c8c421.tar.bz2 linux-stable-3abc53a64e0ab44041e8d2ba852806dfa0c8c421.zip |
Bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent
commit 99e67d46e5ff3c7c901af6009edec72d3d363be8 upstream.
Before setting HCI_INQUIRY bit check if HCI_OP_INQUIRY was really sent
otherwise the controller maybe be generating invalid events or, more
likely, it is a result of fuzzing tools attempting to test the right
behavior of the stack when unexpected events are generated.
Cc: stable@vger.kernel.org
Link: https://bugzilla.kernel.org/show_bug.cgi?id=218151
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | net/bluetooth/hci_event.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c index bf863cf845bb..07605fcc9091 100644 --- a/net/bluetooth/hci_event.c +++ b/net/bluetooth/hci_event.c @@ -1471,7 +1471,8 @@ static void hci_cs_inquiry(struct hci_dev *hdev, __u8 status) return; } - set_bit(HCI_INQUIRY, &hdev->flags); + if (hci_sent_cmd_data(hdev, HCI_OP_INQUIRY)) + set_bit(HCI_INQUIRY, &hdev->flags); } static void hci_cs_create_conn(struct hci_dev *hdev, __u8 status) |