Re: Bluetooth: mgmt: Fix heap overflow in mgmt_mesh_add

From: Maiquel Paiva

Date: Thu Feb 19 2026 - 12:25:07 EST


Thank you for the detailed follow-up.
The explanation about EXPORT_SYMBOL makes perfect sense.

I was analyzing the function's limits in complete isolation,
and didn't realize the context of the trust limit within the module itself.

I will certainly use this as a great learning experience,
(it's never too late to learn!)

I fully agree with reverting commit ac0c6f1b6a58
("Bluetooth: mgmt: Fix heap overflow in mgmt_mesh_add")
to avoid confusion and unnecessary code changes,
since the function that calls mesh_send already handles sanitization.

Just to confirm: what will happen to the other commit in this series that addresses the blocking problem
(003ca042a386)? The handling of the mesh_pending list was indeed unprotected
that's exactly what guard(mutex) is for.

Thank you for the review.

Thanks,
Maiquel Paiva