Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp1297792rdg; Fri, 13 Oct 2023 17:54:59 -0700 (PDT) X-Google-Smtp-Source: AGHT+IECP0+te3jS4aueAva4wiyW/QqryZUp+wzFIWdIIIlCJEORGghp0UxaZolTMxDq9Qwzbrim X-Received: by 2002:a5b:c06:0:b0:d9b:48e0:14ed with SMTP id f6-20020a5b0c06000000b00d9b48e014edmr2011363ybq.31.1697244899590; Fri, 13 Oct 2023 17:54:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697244899; cv=none; d=google.com; s=arc-20160816; b=u/GcdRDwMwNELzdJUe3IhVLezd20xumK94I21R1poOLPm0uSh0dliFUBD+RPzXsy6R dVZvPiqAnp1g3Dm8sUJgiChrFlV1EEGEOteTfli5FZtRcy4X0QpphhNe2ZZljfo46aHt U/FnKKZ/Bvu2M1YygdNtf1Qu2Q6/fiQZVDjzh0qIXdmBdcDHm2xrE7pMfsKAd39hqsUE +67kNs78O4ECizFHwy2wfH2+HKWHd8jdhp3loxt/Ki25hEMdD1EnY9cucJ04SFaHYRS9 JvMS+LOjP5QUY6KSviI3bRD5QC1BcsNtyPplpUiAJeFad5NJLWdmPiUdQ4q4XBD6I9dE TGHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=W78LjeI3yv4GYL6ZD4xMI5juc7Cij1JMyQkJHNogZ4g=; fh=k+Dtnh/PITqpM+u5JtzvaU+Eoc1RR8LnfSG6mndSdyc=; b=djHfSFZhVjIsRqqfG0bplOqkhlw0eupUkSz/cer1RGUc3F7G/HDElwTVUgEXoOycgD sHejCtmvUfBc22VfFr0eWiPKezCMZoGh/0GebEzBjRaJwNMkestLRYk5hZsSYx6AOc/z 87FVZL2jzdF4ysiksjYcuTGaNx6+2YzE5XXHzUWJn9QYUnw/fkwnHWVLcydr2zt5YV52 5xQ4iLY36OMMHd7NZtQNvoTxbDLTr3VmF2vaKQjhtz/LWlUBFOuFAhaf65c5hFt8Lvb9 a/F4BCA0s/b0PtMCGdxca2eKhet8n9okCpAwtDMHFBGZU3WoZAPWf+YULM3/AK2Xebi7 gCqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QwTU0M1I; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id j73-20020a638b4c000000b005ab53fed203si2565992pge.461.2023.10.13.17.54.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Oct 2023 17:54:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QwTU0M1I; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id EFDFD806BC15; Fri, 13 Oct 2023 17:54:56 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229830AbjJNAyq (ORCPT + 99 others); Fri, 13 Oct 2023 20:54:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50686 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229649AbjJNAyq (ORCPT ); Fri, 13 Oct 2023 20:54:46 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2B8691 for ; Fri, 13 Oct 2023 17:54:44 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 38192C433C7; Sat, 14 Oct 2023 00:54:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697244884; bh=btX4q00tpa3kANjZqjMhb8YjMQR4zKgNcnsAX/WbXJ0=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=QwTU0M1Il4XW5GQ3r52HgZ7nvJBAVq9eoymPC23J/loMDxlIsI/4HO/hz8ahpQb75 dWWbTu5Lx/EnIMLfXYwY+IkKxWvm+/xOra/knpRLifvmskpTglU8sINe5NbZwgXLgh CGRSq0UTGq3JeES2hYC135VPRdPE/Xmg2gV5uvK4o7Dvr04rJB7F9qx1KPdaik3yYR gtjMHTZEmFKCg0jgq62+SHKRfGnaK1OjPozVUO6o0G57C3hkDwiupYJxRnZVmHRyYM X4dH8EuSL9/WEHLg8x0YZLGzyYPfTnROa3Gwij6K7vf8K5h+OFPO8c2zOYGX9GMZUU APLJbBckyIkzA== Date: Fri, 13 Oct 2023 17:54:43 -0700 From: Jakub Kicinski To: Luiz Augusto von Dentz Cc: davem@davemloft.net, linux-bluetooth@vger.kernel.org, netdev@vger.kernel.org Subject: Re: pull-request: bluetooth 2023-10-11 Message-ID: <20231013175443.5cb5c2ce@kernel.org> In-Reply-To: <20231011191524.1042566-1-luiz.dentz@gmail.com> References: <20231011191524.1042566-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Fri, 13 Oct 2023 17:54:57 -0700 (PDT) On Wed, 11 Oct 2023 12:15:24 -0700 Luiz Augusto von Dentz wrote: > - Fix race when opening vhci device > - Avoid memcmp() out of bounds warning > - Correctly bounds check and pad HCI_MON_NEW_INDEX name > - Fix using memcmp when comparing keys > - Ignore error return for hci_devcd_register() in btrtl > - Always check if connection is alive before deleting > - Fix a refcnt underflow problem for hci_conn Commit: fc11ae648f03 ("Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name") Fixes tag: Fixes: 78480de55a96 ("Bluetooth: hci_sock: fix slab oob read in create_monitor_event") Has these problem(s): - Target SHA1 does not exist Commit: 6f0ff718ed67 ("Bluetooth: avoid memcmp() out of bounds warning") Fixes tag: Fixes: d70e44fef8621 ("Bluetooth: Reject connection with the device which has same BD_ADDR") Has these problem(s): - Target SHA1 does not exist Commit: b03f32b195df ("Bluetooth: hci_event: Fix coding style") Fixes tag: Fixes: d70e44fef862 ("Bluetooth: Reject connection with the device which has same BD_ADDR") Has these problem(s): - Target SHA1 does not exist Commit: a9500f272b3b ("Bluetooth: hci_event: Fix using memcmp when comparing keys") Fixes tag: Fixes: fe7a9da4fa54 ("Bluetooth: hci_event: Ignore NULL link key") Has these problem(s): - Target SHA1 does not exist :(