Patch Series

Subject rxrpc: Miscellaneous fixes
Author dhowells@redhat.com
Date 2026-04-08 12:12:29 +0000 UTC
Version
Cc alok.a.tiwari@oracle.com anderson@allelesecurity.com bird@lzu.edu.cn davem@davemloft.net dhowells@redhat.com edumazet@google.com enjou1224z@gmail.com horms@kernel.org jaltman@auristor.com jiewang2024@lzu.edu.cn keenanat2000@gmail.com kuba@kernel.org ldy3087146292@gmail.com linux-afs@lists.infradead.org linux-kernel@vger.kernel.org marc.c.dionne@gmail.com marc.dionne@auristor.com n05ec@lzu.edu.cn netdev@vger.kernel.org pabeni@redhat.com pengpeng@iscas.ac.cn rakukuip@gmail.com security@1seal.org stable@kernel.org tanyuan98@gmail.com tomapufckgml@gmail.com torvalds@linux-foundation.org w@1wt.eu xuyuqiabc@gmail.com yifanwucs@gmail.com yuantan098@gmail.com

Patches (21)

Name Content [All]
[PATCH net v5 01/21] rxrpc: Fix key quota calculation for multitoken keys [Body]
[PATCH net v5 02/21] rxrpc: Fix key parsing memleak [Body]
[PATCH net v5 03/21] rxrpc: Fix anonymous key handling [Body]
[PATCH net v5 04/21] rxrpc: Fix call removal to use RCU safe deletion [Body]
[PATCH net v5 05/21] rxrpc: Fix RxGK token loading to check bounds [Body]
[PATCH net v5 06/21] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial [Body]
[PATCH net v5 07/21] rxrpc: Fix rack timer warning to report unexpected mode [Body]
[PATCH net v5 08/21] rxrpc: Fix key reference count leak from call->key [Body]
[PATCH net v5 09/21] rxrpc: Fix to request an ack if window is limited [Body]
[PATCH net v5 10/21] rxrpc: Only put the call ref if one was acquired [Body]
[PATCH net v5 11/21] rxrpc: reject undecryptable rxkad response tickets [Body]
[PATCH net v5 12/21] rxrpc: fix RESPONSE authenticator parser OOB read [Body]
[PATCH net v5 13/21] rxrpc: fix oversized RESPONSE authenticator length check [Body]
[PATCH net v5 14/21] rxrpc: fix reference count leak in rxrpc_server_keyring() [Body]
[PATCH net v5 15/21] rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING) [Body]
[PATCH net v5 16/21] rxrpc: Fix missing error checks for rxkad encryption/decryption failure [Body]
[PATCH net v5 17/21] rxrpc: Fix integer overflow in rxgk_verify_response() [Body]
[PATCH net v5 18/21] rxrpc: Fix leak of rxgk context in rxgk_verify_response() [Body]
[PATCH net v5 19/21] rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() [Body]
[PATCH net v5 20/21] rxrpc: only handle RESPONSE during service challenge [Body]
[PATCH net v5 21/21] rxrpc: proc: size address buffers for %pISpc output [Body]
Session 2026-04-08
ID (for dev) 5cbcac3c-58e2-4de8-9d61-3270d7d371a6
Status in progress
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base f821664dde29302e8450aa0597bf1e4c7c5b0a22 [Config] passed [Log]
[KASAN] Boot test: Base f821664dde29302e8450aa0597bf1e4c7c5b0a22 [Config] passed [Log]
[KASAN] Build Patched f821664dde29302e8450aa0597bf1e4c7c5b0a22 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched f821664dde29302e8450aa0597bf1e4c7c5b0a22 [Config] [patched] passed [Log]
[KASAN] Fuzz f821664dde29302e8450aa0597bf1e4c7c5b0a22 [Config] f821664dde29302e8450aa0597bf1e4c7c5b0a22 [Config] [patched] running [Log] [Artifacts]