Received: by 2002:a05:7412:8521:b0:e2:908c:2ebd with SMTP id t33csp734464rdf; Fri, 3 Nov 2023 13:28:03 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFo45MQWXBEoYVG5RW9GPVu4Znuk8Tnf/kLZFPFBQAgulw0lH38nxK07XWx622eVul9+7uw X-Received: by 2002:a05:6a20:b790:b0:17f:8f9f:14c2 with SMTP id fh16-20020a056a20b79000b0017f8f9f14c2mr13860303pzb.27.1699043283072; Fri, 03 Nov 2023 13:28:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1699043283; cv=none; d=google.com; s=arc-20160816; b=Nh3YDh9bnMeMdDtaFSybgppJgiSWY5iglTmmqpD7Pd2xN7RVgWLdev6M2y2Z/ruGi+ 0PGjZtn+jhCdmfYREd9tRzHYfVFDJ4tT1sOsDDWQK/20yGkgUP93dIuIrOZF+Ppk0cwY UFtxhfkk5BAcePiXLly60hcwK70SAj++RuqfBrvkWGY+A9G2igc7n84KXj2qS8PtQt20 ob6OlBZRyAJ/sKepAZxr6lztqqoVkU655fUwUUMZLjHawrT9Cz9h28mkVNy0FMkFdLbp lNCx1XpagrLT+DlEyUaH/eacKQ27yggt2SVdXHUt7VTdFVVnaZP5FBpQFR3ClK/prCH6 /+Dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:reply-to:references:in-reply-to:subject:to:from :mime-version:date:message-id:dkim-signature; bh=EXtvSG1OVovOX/Pa0SIGdrAaL+JA9mlXOqEloqi5F5o=; fh=1CW6ko15J0a6TdnOjCLumETiN16MXJFEe5l+0KNlf6w=; b=phPryYT1QkdeEgEwc9iqoug0PchAwfOXeIPN4N7LrmLxmWl1w131G8AkyCQC8XH/zY YonSDTtVIzy3WiSN6Zdkso8kbnHNTLuS6IDuGEAAVc/zO8VS7ilK3jS4IUwd02OjggFt vGHrtcPxqxHKNujAhOwJ8A/20ltgqnJSU0gX5Li35XW8gxJen9LPTpgeJqKQzJSi/ZlQ J9dhK83FOPmRx1Ptrq9H1uwrwfGnKqfQPnZr00S1OFtYzBsr4t8eWjG5GNskB/fCMvHF ChIccw01+bZf50HxNJmFrCwyWD8hh5DbbMwT4TBVveRnTCWEMRTL7VX45E59Dc+Xz+IX MOag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="Oqj/DqbI"; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id e8-20020a170902cf4800b001cc3480e703si2070621plg.517.2023.11.03.13.28.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 Nov 2023 13:28:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="Oqj/DqbI"; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 7D62D82589A2; Fri, 3 Nov 2023 13:27:57 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377822AbjKCU16 (ORCPT + 99 others); Fri, 3 Nov 2023 16:27:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376881AbjKCU15 (ORCPT ); Fri, 3 Nov 2023 16:27:57 -0400 Received: from mail-pg1-x535.google.com (mail-pg1-x535.google.com [IPv6:2607:f8b0:4864:20::535]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8B48B18B for ; Fri, 3 Nov 2023 13:27:54 -0700 (PDT) Received: by mail-pg1-x535.google.com with SMTP id 41be03b00d2f7-5b9a456798eso1754390a12.3 for ; Fri, 03 Nov 2023 13:27:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1699043274; x=1699648074; darn=vger.kernel.org; h=reply-to:references:in-reply-to:subject:to:from:mime-version:date :message-id:from:to:cc:subject:date:message-id:reply-to; bh=EXtvSG1OVovOX/Pa0SIGdrAaL+JA9mlXOqEloqi5F5o=; b=Oqj/DqbIIk6Hr4dtz0193YHGSl86PnVh27irFpMrnvVGti17SZNfWENk56EHXf7AYl LiKM7I569WXpVxdeqG+Cnf/h3a11S9iUq2G8lAgiEHWLQ5PgJLi03xglApepY0EuOE/0 UXMGv0MPpwxieFy/jeUsjVjtD/C5oKKqH6KgO2ZBToli3DalwoYG14xhxEQVCGgc834e TRaCn8zV6H0ExwkpqF08CqLY77I0xrqmT9k6cWO6TITtzgvSbhl2JLfI/QwzqOXh7O6u iXisWkgh25GQFnM2EizS693tsGzy0O2cEENrCkU9Kau+54mwa8/p2ycbQsQYztULEjJQ VOGA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699043274; x=1699648074; h=reply-to:references:in-reply-to:subject:to:from:mime-version:date :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=EXtvSG1OVovOX/Pa0SIGdrAaL+JA9mlXOqEloqi5F5o=; b=OQcwKFuwdWTdhuqp6RaU3cKry4GUq85rKbc6owh3FEE6KtB5HD9eLDiBLrIFiOV+DX KW//+0+9Lrs9zawQsev0GWuJWGzbS/lcpvyNVeBgiavH0fDB6yiln29Kt1gp3IUD15sx ykkQ4sgWTH7DG3ut9BcM25zgdZ05brWoGqRnAvAm6pmdf2kvtUPvtl2qVla4RW8oBH6D WE6PkPQSLaPVUDsM/R9XQRXnJT7XfXWVq0o1SvEAF23GB/qbz/N0egIobHJakG7/CDLp D9AhfUtlofc9LVNLDaHucAyu3lnRDQ8CJQUBmlq2daBNUFwlpdSol1MGNgjBMA+N/aHF mH0g== X-Gm-Message-State: AOJu0YzhFq73isJFaHV4fX6h8Sv6GF/xETWa1OV9+eIiaUnrThJRYAsV uXor6o+2KjgztwyUYxvR5knHizeP/Ac= X-Received: by 2002:a05:6a20:12c4:b0:181:275f:3b53 with SMTP id v4-20020a056a2012c400b00181275f3b53mr10393121pzg.42.1699043273584; Fri, 03 Nov 2023 13:27:53 -0700 (PDT) Received: from [172.17.0.2] ([13.83.45.18]) by smtp.gmail.com with ESMTPSA id g9-20020a170902c38900b001c726147a45sm1762236plg.190.2023.11.03.13.27.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 Nov 2023 13:27:53 -0700 (PDT) Message-ID: <654557c9.170a0220.5edbc.5418@mx.google.com> Date: Fri, 03 Nov 2023 13:27:53 -0700 (PDT) Content-Type: multipart/mixed; boundary="===============6046630260743502846==" MIME-Version: 1.0 From: bluez.test.bot@gmail.com To: linux-bluetooth@vger.kernel.org, verdre@v0yd.nl Subject: RE: Fix an allocation oversight in SDP parsing In-Reply-To: <20231103182150.60088-2-verdre@v0yd.nl> References: <20231103182150.60088-2-verdre@v0yd.nl> Reply-To: linux-bluetooth@vger.kernel.org X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 03 Nov 2023 13:27:57 -0700 (PDT) --===============6046630260743502846== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit This is automated email and please do not reply to this email! Dear submitter, Thank you for submitting the patches to the linux bluetooth mailing list. This is a CI test results with your patch series: PW Link:https://patchwork.kernel.org/project/bluetooth/list/?series=798710 ---Test result--- Test Summary: CheckPatch FAIL 1.64 seconds GitLint PASS 0.91 seconds BuildEll PASS 33.44 seconds BluezMake PASS 953.81 seconds MakeCheck PASS 12.88 seconds MakeDistcheck PASS 200.22 seconds CheckValgrind PASS 309.63 seconds CheckSmatch PASS 413.84 seconds bluezmakeextell PASS 135.45 seconds IncrementalBuild PASS 3258.43 seconds ScanBuild WARNING 1227.60 seconds Details ############################## Test: CheckPatch - FAIL Desc: Run checkpatch.pl script Output: [BlueZ,1/4] lib/sdp: Allocate strings in sdp_data_t with NULL termination WARNING:BAD_SIGN_OFF: Co-developed-by: must be immediately followed by Signed-off-by: #59: Co-developed-by: Zander Brown --- /github/workspace/src/src/13444881.patch total: 0 errors, 1 warnings, 8 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. /github/workspace/src/src/13444881.patch has style problems, please review. NOTE: Ignored message types: COMMIT_MESSAGE COMPLEX_MACRO CONST_STRUCT FILE_PATH_CHANGES MISSING_SIGN_OFF PREFER_PACKED SPDX_LICENSE_TAG SPLIT_STRING SSCANF_TO_KSTRTO NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. [BlueZ,2/4] lib/sdp: Don't assume uint8_t has size 1 WARNING:REPEATED_WORD: Possible repeated word: 'of' #47: Assuming the size of of uint8_t is bad practice, we use WARNING:BAD_SIGN_OFF: Co-developed-by: must be immediately followed by Signed-off-by: #52: Co-developed-by: Zander Brown --- /github/workspace/src/src/13444882.patch total: 0 errors, 2 warnings, 8 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. /github/workspace/src/src/13444882.patch has style problems, please review. NOTE: Ignored message types: COMMIT_MESSAGE COMPLEX_MACRO CONST_STRUCT FILE_PATH_CHANGES MISSING_SIGN_OFF PREFER_PACKED SPDX_LICENSE_TAG SPLIT_STRING SSCANF_TO_KSTRTO NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. [BlueZ,3/4] lib/sdp: Use correct string length in sdp_copy_seq() WARNING:COMMIT_LOG_LONG_LINE: Possible unwrapped commit description (prefer a maximum 75 chars per line) #52: only the length of the string (so `sdp_data_t->unitSize - sizeof(uint8_t)`). WARNING:BAD_SIGN_OFF: Co-developed-by: must be immediately followed by Signed-off-by: #61: Co-developed-by: Zander Brown --- /github/workspace/src/src/13444883.patch total: 0 errors, 2 warnings, 13 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. /github/workspace/src/src/13444883.patch has style problems, please review. NOTE: Ignored message types: COMMIT_MESSAGE COMPLEX_MACRO CONST_STRUCT FILE_PATH_CHANGES MISSING_SIGN_OFF PREFER_PACKED SPDX_LICENSE_TAG SPLIT_STRING SSCANF_TO_KSTRTO NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. [BlueZ,4/4] lib/sdp: Pass size_t to sdp_get_string_attr() WARNING:BAD_SIGN_OFF: Co-developed-by: must be immediately followed by Signed-off-by: #58: Co-developed-by: Zander Brown --- WARNING:LONG_LINE_COMMENT: line length of 91 exceeds 80 columns #80: FILE: lib/sdp.c:2189: + /* Have to copy the NULL terminator too, so check len < valuelen */ WARNING:LONG_LINE: line length of 94 exceeds 80 columns #94: FILE: lib/sdp_lib.h:144: +int sdp_get_string_attr(const sdp_record_t *rec, uint16_t attr, char *value, size_t valuelen); WARNING:LONG_LINE: line length of 86 exceeds 80 columns #103: FILE: lib/sdp_lib.h:546: +static inline int sdp_get_service_name(const sdp_record_t *rec, char *str, size_t len) WARNING:LONG_LINE: line length of 86 exceeds 80 columns #109: FILE: lib/sdp_lib.h:551: +static inline int sdp_get_service_desc(const sdp_record_t *rec, char *str, size_t len) WARNING:LONG_LINE: line length of 87 exceeds 80 columns #115: FILE: lib/sdp_lib.h:556: +static inline int sdp_get_provider_name(const sdp_record_t *rec, char *str, size_t len) WARNING:LONG_LINE: line length of 81 exceeds 80 columns #121: FILE: lib/sdp_lib.h:561: +static inline int sdp_get_doc_url(const sdp_record_t *rec, char *str, size_t len) WARNING:LONG_LINE: line length of 87 exceeds 80 columns #127: FILE: lib/sdp_lib.h:566: +static inline int sdp_get_clnt_exec_url(const sdp_record_t *rec, char *str, size_t len) WARNING:LONG_LINE: line length of 82 exceeds 80 columns #133: FILE: lib/sdp_lib.h:571: +static inline int sdp_get_icon_url(const sdp_record_t *rec, char *str, size_t len) /github/workspace/src/src/13444884.patch total: 0 errors, 9 warnings, 62 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. /github/workspace/src/src/13444884.patch has style problems, please review. NOTE: Ignored message types: COMMIT_MESSAGE COMPLEX_MACRO CONST_STRUCT FILE_PATH_CHANGES MISSING_SIGN_OFF PREFER_PACKED SPDX_LICENSE_TAG SPLIT_STRING SSCANF_TO_KSTRTO NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. ############################## Test: ScanBuild - WARNING Desc: Run Scan Build Output: lib/sdp.c:507:16: warning: Dereference of undefined pointer value int8_t dtd = *(uint8_t *) dtds[i]; ^~~~~~~~~~~~~~~~~~~~ lib/sdp.c:535:17: warning: Dereference of undefined pointer value uint8_t dtd = *(uint8_t *) dtds[i]; ^~~~~~~~~~~~~~~~~~~~ lib/sdp.c:580:12: warning: Access to field 'attrId' results in a dereference of a null pointer (loaded from variable 'd') d->attrId = attr; ~ ^ lib/sdp.c:1870:26: warning: Potential leak of memory pointed to by 'ap' for (; pdlist; pdlist = pdlist->next) { ^~~~~~ lib/sdp.c:1884:6: warning: Potential leak of memory pointed to by 'pds' ap = sdp_list_append(ap, pds); ~~~^~~~~~~~~~~~~~~~~~~~~~~~~~ lib/sdp.c:1929:10: warning: Potential leak of memory pointed to by 'u' *seqp = sdp_list_append(*seqp, u); ~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/sdp.c:2034:4: warning: Potential leak of memory pointed to by 'lang' sdp_list_free(*langSeq, free); ^~~~~~~~~~~~~ lib/sdp.c:2123:9: warning: Potential leak of memory pointed to by 'profDesc' return 0; ^ lib/sdp.c:3251:8: warning: Potential leak of memory pointed to by 'pSvcRec' pSeq = sdp_list_append(pSeq, pSvcRec); ~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ lib/sdp.c:3252:9: warning: Potential leak of memory pointed to by 'pSeq' pdata += sizeof(uint32_t); ~~~~~~^~~~~~~~~~~~~~~~~~~ lib/sdp.c:4588:13: warning: Potential leak of memory pointed to by 'rec_list' } while (scanned < attr_list_len && pdata_len > 0); ^~~~~~~ lib/sdp.c:4884:40: warning: Potential leak of memory pointed to by 'tseq' for (d = sdpdata->val.dataseq; d; d = d->next) { ^ lib/sdp.c:4920:8: warning: Potential leak of memory pointed to by 'subseq' tseq = sdp_list_append(tseq, subseq); ~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 13 warnings generated. --- Regards, Linux Bluetooth --===============6046630260743502846==--