From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D84F6232367; Thu, 9 Apr 2026 01:51:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775699475; cv=none; b=TYchLKMiiKt0DuNMcRWusNTzsmaIM/2+gquPitgaktnq/90N7cd/ClMUOuG3pMux+PBZy13Sm3PnrTmwk6YaTB78RVXW8VmiY2IXJsAXvR03Lern/OSv/SWPktpfQoepbkj6M04QsNgAxvWikSyfjkMPshh3b5xCGGWkr/cXcTI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775699475; c=relaxed/simple; bh=4bkcelQmN5Muntzw+d4/wQqgKbOlDu71rhjNDY1lmqk=; h=Content-Type:MIME-Version:Subject:From:Message-Id:Date:References: In-Reply-To:To:Cc; b=gZklGOwUr7MMu7kBX4UbZ/3ZIfqWqlV148V9P21b6Q+FNDmJwRjpplWuiymd9CsDCwXyj+lJ7uJmSe9+4l3lhB/3SIRffWIvRGzUrznx0hOGy88+wZfLtdEuhvPM2BTfaTgpC/L4EyUm6ptUwlx0E6cIgNfTphSdoSMlPI7QvwE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Ay24gmnc; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Ay24gmnc" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8451AC19421; Thu, 9 Apr 2026 01:51:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1775699475; bh=4bkcelQmN5Muntzw+d4/wQqgKbOlDu71rhjNDY1lmqk=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=Ay24gmncRkMp8Vh04QVcpamsrCfwBjdBAvf5/P6rrDyp4DWSZiNH4gTjtkxuHYQAq 604n+WEd7PjzqjuLvJYtHoIkjoE9tTPPM8SypaHtmx/Gl1GMmV8zSrxhlwqpsFkPMi oiQ+LTusby4JR37/Lr5DiQKov7fyv065kVeQ+yyBJaIiCX7cf8JOkF49O6gD7EOP1/ sRItnDUFZ6WFOO3MVr1QGEyua09ulja89fFzjbbTSJdgI0IM5HZCxKlDVTlu/0fnDv 4UPKl9yi2P3GTIM7OfMsv7sh+DPSgMgVafzCDltLqoyzu1FtwfCyoDwBQYLwRtXnzF Fotz1EoaMG6DQ== Received: from [10.30.226.235] (localhost [IPv6:::1]) by aws-us-west-2-korg-oddjob-rhel9-1.codeaurora.org (Postfix) with ESMTP id 02F153930793; Thu, 9 Apr 2026 01:50:53 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH net v5 00/21] rxrpc: Miscellaneous fixes From: patchwork-bot+netdevbpf@kernel.org Message-Id: <177569945153.949482.7195276358640737512.git-patchwork-notify@kernel.org> Date: Thu, 09 Apr 2026 01:50:51 +0000 References: <20260408121252.2249051-1-dhowells@redhat.com> In-Reply-To: <20260408121252.2249051-1-dhowells@redhat.com> To: David Howells Cc: netdev@vger.kernel.org, marc.dionne@auristor.com, kuba@kernel.org, davem@davemloft.net, edumazet@google.com, pabeni@redhat.com, linux-afs@lists.infradead.org, linux-kernel@vger.kernel.org Hello: This series was applied to netdev/net.git (main) by Jakub Kicinski : On Wed, 8 Apr 2026 13:12:28 +0100 you wrote: > Here are some fixes for rxrpc: > > (1) Fix key quota calculation. > > (2) Fix a memory leak. > > (3) Fix rxrpc_new_client_call_for_sendmsg() to substitute NULL for an > empty key. > > [...] Here is the summary with links: - [net,v5,01/21] rxrpc: Fix key quota calculation for multitoken keys https://git.kernel.org/netdev/net/c/bdbfead6d389 - [net,v5,02/21] rxrpc: Fix key parsing memleak https://git.kernel.org/netdev/net/c/b555912b9b21 - [net,v5,03/21] rxrpc: Fix anonymous key handling https://git.kernel.org/netdev/net/c/6a59d84b4fc2 - [net,v5,04/21] rxrpc: Fix call removal to use RCU safe deletion https://git.kernel.org/netdev/net/c/146d4ab94cf1 - [net,v5,05/21] rxrpc: Fix RxGK token loading to check bounds https://git.kernel.org/netdev/net/c/d179a868dd75 - [net,v5,06/21] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial https://git.kernel.org/netdev/net/c/b33f5741bb18 - [net,v5,07/21] rxrpc: Fix rack timer warning to report unexpected mode https://git.kernel.org/netdev/net/c/65b3ffe0972e - [net,v5,08/21] rxrpc: Fix key reference count leak from call->key https://git.kernel.org/netdev/net/c/d666540d217e - [net,v5,09/21] rxrpc: Fix to request an ack if window is limited https://git.kernel.org/netdev/net/c/0cd3e3f3f2ec - [net,v5,10/21] rxrpc: Only put the call ref if one was acquired https://git.kernel.org/netdev/net/c/6331f1b24a3e - [net,v5,11/21] rxrpc: reject undecryptable rxkad response tickets https://git.kernel.org/netdev/net/c/fe4447cd9562 - [net,v5,12/21] rxrpc: fix RESPONSE authenticator parser OOB read https://git.kernel.org/netdev/net/c/3e3138007887 - [net,v5,13/21] rxrpc: fix oversized RESPONSE authenticator length check https://git.kernel.org/netdev/net/c/a2567217ade9 - [net,v5,14/21] rxrpc: fix reference count leak in rxrpc_server_keyring() https://git.kernel.org/netdev/net/c/f125846ee79f - [net,v5,15/21] rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING) https://git.kernel.org/netdev/net/c/2afd86ccbb20 - [net,v5,16/21] rxrpc: Fix missing error checks for rxkad encryption/decryption failure https://git.kernel.org/netdev/net/c/f93af41b9f5f - [net,v5,17/21] rxrpc: Fix integer overflow in rxgk_verify_response() https://git.kernel.org/netdev/net/c/699e52180f42 - [net,v5,18/21] rxrpc: Fix leak of rxgk context in rxgk_verify_response() https://git.kernel.org/netdev/net/c/7e1876caa836 - [net,v5,19/21] rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() https://git.kernel.org/netdev/net/c/f564af387c8c - [net,v5,20/21] rxrpc: only handle RESPONSE during service challenge https://git.kernel.org/netdev/net/c/c43ffdcfdbb5 - [net,v5,21/21] rxrpc: proc: size address buffers for %pISpc output https://git.kernel.org/netdev/net/c/a44ce6aa2efb You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html