Bluetooth: btintel: Reorganized bootloader mode tlv checks in intel_version_tlv parsing
authorLokendra Singh <lokendra.singh@intel.com>
Tue, 23 Mar 2021 18:59:02 +0000 (11:59 -0700)
committerMarcel Holtmann <marcel@holtmann.org>
Thu, 25 Mar 2021 15:10:53 +0000 (16:10 +0100)
This moves limited_cce and sbe_type checks under bootloader during tlv parsing
as operational firmware don't have access to these values. Any attempt to read
such values in operational firmware will only fetch garbage data.

Signed-off-by: Lokendra Singh <lokendra.singh@intel.com>
Signed-off-by: Kiran K <kiran.k@intel.com>
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Tested-by: Tedd Ho-Jeong An <tedd.an@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
drivers/bluetooth/btintel.c

index bddaa4f..4ddbf89 100644 (file)
@@ -434,26 +434,26 @@ int btintel_version_info_tlv(struct hci_dev *hdev, struct intel_version_tlv *ver
                return -EINVAL;
        }
 
-       /* It is required that every single firmware fragment is acknowledged
-        * with a command complete event. If the boot parameters indicate
-        * that this bootloader does not send them, then abort the setup.
-        */
-       if (version->limited_cce != 0x00) {
-               bt_dev_err(hdev, "Unsupported Intel firmware loading method (0x%x)",
-                          version->limited_cce);
-               return -EINVAL;
-       }
-
-       /* Secure boot engine type should be either 1 (ECDSA) or 0 (RSA) */
-       if (version->sbe_type > 0x01) {
-               bt_dev_err(hdev, "Unsupported Intel secure boot engine type (0x%x)",
-                          version->sbe_type);
-               return -EINVAL;
-       }
-
        switch (version->img_type) {
        case 0x01:
                variant = "Bootloader";
+               /* It is required that every single firmware fragment is acknowledged
+                * with a command complete event. If the boot parameters indicate
+                * that this bootloader does not send them, then abort the setup.
+                */
+               if (version->limited_cce != 0x00) {
+                       bt_dev_err(hdev, "Unsupported Intel firmware loading method (0x%x)",
+                                  version->limited_cce);
+                       return -EINVAL;
+               }
+
+               /* Secure boot engine type should be either 1 (ECDSA) or 0 (RSA) */
+               if (version->sbe_type > 0x01) {
+                       bt_dev_err(hdev, "Unsupported Intel secure boot engine type (0x%x)",
+                                  version->sbe_type);
+                       return -EINVAL;
+               }
+
                bt_dev_info(hdev, "Device revision is %u", version->dev_rev_id);
                bt_dev_info(hdev, "Secure boot is %s",
                            version->secure_boot ? "enabled" : "disabled");