* [PATCH net 0/5] rxrpc: Miscellaneous fixes
@ 2022-05-21 8:02 David Howells
2022-05-22 20:32 ` David Miller
2022-05-22 20:40 ` patchwork-bot+netdevbpf
0 siblings, 2 replies; 22+ messages in thread
From: David Howells @ 2022-05-21 8:02 UTC (permalink / raw)
To: netdev
Cc: linux-afs, Jeffrey Altman, Marc Dionne, dhowells, linux-afs,
linux-kernel
Here are some fixes for AF_RXRPC:
(1) Fix listen() allowing preallocation to overrun the prealloc buffer.
(2) Prevent resending the request if we've seen the reply starting to
arrive.
(3) Fix accidental sharing of ACK state between transmission and
reception.
(4) Ignore ACKs in which ack.previousPacket regresses. This indicates the
highest DATA number so far seen, so should not be seen to go
backwards.
(5) Fix the determination of when to generate an IDLE-type ACK,
simplifying it so that we generate one if we have more than two DATA
packets that aren't hard-acked (consumed) or soft-acked (in the rx
buffer, but could be discarded and re-requested).
The patches are tagged here:
git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
rxrpc-fixes-20220521
and can also be found on the following branch:
http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
Tested-by: kafs-testing+fedora34_64checkkafs-build-495@auristor.com
Changes
=======
ver #2)
- Rebased onto net/master
- Dropped the IPv6 checksum patch as it's already upstream.
David
Link: https://lore.kernel.org/r/165306442115.34086.1818959430525328753.stgit@warthog.procyon.org.uk/ # v1
---
David Howells (5):
rxrpc: Fix listen() setting the bar too high for the prealloc rings
rxrpc: Don't try to resend the request if we're receiving the reply
rxrpc: Fix overlapping ACK accounting
rxrpc: Don't let ack.previousPacket regress
rxrpc: Fix decision on when to generate an IDLE ACK
include/trace/events/rxrpc.h | 2 +-
net/rxrpc/ar-internal.h | 13 +++++++------
net/rxrpc/call_event.c | 3 ++-
net/rxrpc/input.c | 31 ++++++++++++++++++++-----------
net/rxrpc/output.c | 20 ++++++++++++--------
net/rxrpc/recvmsg.c | 8 +++-----
net/rxrpc/sysctl.c | 4 ++--
7 files changed, 47 insertions(+), 34 deletions(-)
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2022-05-21 8:02 David Howells
@ 2022-05-22 20:32 ` David Miller
2022-05-22 20:40 ` patchwork-bot+netdevbpf
1 sibling, 0 replies; 22+ messages in thread
From: David Miller @ 2022-05-22 20:32 UTC (permalink / raw)
To: dhowells; +Cc: netdev, linux-afs, jaltman, marc.dionne, linux-kernel
From: David Howells <dhowells@redhat.com>
Date: Sat, 21 May 2022 09:02:58 +0100
>
> Here are some fixes for AF_RXRPC:
>
> (1) Fix listen() allowing preallocation to overrun the prealloc buffer.
>
> (2) Prevent resending the request if we've seen the reply starting to
> arrive.
>
> (3) Fix accidental sharing of ACK state between transmission and
> reception.
>
> (4) Ignore ACKs in which ack.previousPacket regresses. This indicates the
> highest DATA number so far seen, so should not be seen to go
> backwards.
>
> (5) Fix the determination of when to generate an IDLE-type ACK,
> simplifying it so that we generate one if we have more than two DATA
> packets that aren't hard-acked (consumed) or soft-acked (in the rx
> buffer, but could be discarded and re-requested).
>
> The patches are tagged here:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> rxrpc-fixes-20220521
>
> and can also be found on the following branch:
>
> http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
I tried to pull from this url and it does not work, just fyi...
So I applied the series instead.
> Tested-by: kafs-testing+fedora34_64checkkafs-build-495@auristor.com
Thank you.
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2022-05-21 8:02 David Howells
2022-05-22 20:32 ` David Miller
@ 2022-05-22 20:40 ` patchwork-bot+netdevbpf
1 sibling, 0 replies; 22+ messages in thread
From: patchwork-bot+netdevbpf @ 2022-05-22 20:40 UTC (permalink / raw)
To: David Howells; +Cc: netdev, linux-afs, jaltman, marc.dionne, linux-kernel
Hello:
This series was applied to netdev/net.git (master)
by David S. Miller <davem@davemloft.net>:
On Sat, 21 May 2022 09:02:58 +0100 you wrote:
> Here are some fixes for AF_RXRPC:
>
> (1) Fix listen() allowing preallocation to overrun the prealloc buffer.
>
> (2) Prevent resending the request if we've seen the reply starting to
> arrive.
>
> [...]
Here is the summary with links:
- [net,1/5] rxrpc: Fix listen() setting the bar too high for the prealloc rings
https://git.kernel.org/netdev/net/c/88e22159750b
- [net,2/5] rxrpc: Don't try to resend the request if we're receiving the reply
https://git.kernel.org/netdev/net/c/114af61f88fb
- [net,3/5] rxrpc: Fix overlapping ACK accounting
https://git.kernel.org/netdev/net/c/8940ba3cfe48
- [net,4/5] rxrpc: Don't let ack.previousPacket regress
https://git.kernel.org/netdev/net/c/81524b631253
- [net,5/5] rxrpc: Fix decision on when to generate an IDLE ACK
https://git.kernel.org/netdev/net/c/9a3dedcf1809
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 22+ messages in thread
* [PATCH net 0/5] rxrpc: Miscellaneous fixes
@ 2024-05-03 15:07 David Howells
2024-05-08 2:44 ` Jakub Kicinski
2024-05-08 15:10 ` patchwork-bot+netdevbpf
0 siblings, 2 replies; 22+ messages in thread
From: David Howells @ 2024-05-03 15:07 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, linux-afs, linux-kernel
Here some miscellaneous fixes for AF_RXRPC:
(1) Fix the congestion control algorithm to start cwnd at 4 and to not cut
ssthresh when the peer cuts its rwind size.
(2) Only transmit a single ACK for all the DATA packets glued together
into a jumbo packet to reduce the number of ACKs being generated.
(3) Clean up the generation of flags in the protocol header when creating
a packet for transmission. This means we don't carry the old
REQUEST-ACK bit around from previous transmissions, will make it
easier to fix the MORE-PACKETS flag and make it easier to do jumbo
packet assembly in future.
(4) Fix how the MORE-PACKETS flag is driven. We shouldn't be setting it
in sendmsg() as the packet is then queued and the bit is left in that
state, no matter how long it takes us to transmit the packet - and
will still be in that state if the packet is retransmitted.
(5) Request an ACK on an impending transmission stall due to the app layer
not feeding us new data fast enough. If we don't request an ACK, we
may have to hold on to the packet buffers for a significant amount of
time until the receiver gets bored and sends us an ACK anyway.
David
---
The patches can be found here also:
http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
David Howells (5):
rxrpc: Fix congestion control algorithm
rxrpc: Only transmit one ACK per jumbo packet received
rxrpc: Clean up Tx header flags generation handling
rxrpc: Change how the MORE-PACKETS rxrpc wire header flag is driven
rxrpc: Request an ACK on impending Tx stall
include/trace/events/rxrpc.h | 2 +-
net/rxrpc/ar-internal.h | 2 +-
net/rxrpc/call_object.c | 7 +-----
net/rxrpc/input.c | 49 +++++++++++++++++++++++++-----------
net/rxrpc/output.c | 26 ++++++++++++++-----
net/rxrpc/proc.c | 6 ++---
net/rxrpc/sendmsg.c | 3 ---
7 files changed, 61 insertions(+), 34 deletions(-)
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2024-05-03 15:07 David Howells
@ 2024-05-08 2:44 ` Jakub Kicinski
2024-05-08 7:57 ` Jeffrey Altman
2024-05-08 14:00 ` David Howells
2024-05-08 15:10 ` patchwork-bot+netdevbpf
1 sibling, 2 replies; 22+ messages in thread
From: Jakub Kicinski @ 2024-05-08 2:44 UTC (permalink / raw)
To: David Howells
Cc: netdev, Marc Dionne, David S. Miller, Eric Dumazet, Paolo Abeni,
linux-afs, linux-kernel
On Fri, 3 May 2024 16:07:38 +0100 David Howells wrote:
> Here some miscellaneous fixes for AF_RXRPC:
>
> (1) Fix the congestion control algorithm to start cwnd at 4 and to not cut
> ssthresh when the peer cuts its rwind size.
>
> (2) Only transmit a single ACK for all the DATA packets glued together
> into a jumbo packet to reduce the number of ACKs being generated.
>
> (3) Clean up the generation of flags in the protocol header when creating
> a packet for transmission. This means we don't carry the old
> REQUEST-ACK bit around from previous transmissions, will make it
> easier to fix the MORE-PACKETS flag and make it easier to do jumbo
> packet assembly in future.
>
> (4) Fix how the MORE-PACKETS flag is driven. We shouldn't be setting it
> in sendmsg() as the packet is then queued and the bit is left in that
> state, no matter how long it takes us to transmit the packet - and
> will still be in that state if the packet is retransmitted.
>
> (5) Request an ACK on an impending transmission stall due to the app layer
> not feeding us new data fast enough. If we don't request an ACK, we
> may have to hold on to the packet buffers for a significant amount of
> time until the receiver gets bored and sends us an ACK anyway.
Looks like these got marked as Rejected in patchwork.
I think either because lore is confused and attaches an exchange with
DaveM from 2022 to them (?) or because I mentioned to DaveM that I'm
not sure these are fixes. So let me ask - on a scale of 1 to 10, how
convinced are you that these should go to Linus this week rather than
being categorized as general improvements and go during the merge
window (without the Fixes tags)?
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2024-05-08 2:44 ` Jakub Kicinski
@ 2024-05-08 7:57 ` Jeffrey Altman
2024-05-08 13:54 ` Jakub Kicinski
2024-05-08 14:00 ` David Howells
1 sibling, 1 reply; 22+ messages in thread
From: Jeffrey Altman @ 2024-05-08 7:57 UTC (permalink / raw)
To: Jakub Kicinski
Cc: David Howells, netdev, Marc Dionne, David S. Miller, Eric Dumazet,
Paolo Abeni, linux-afs, linux-kernel
[-- Attachment #1: Type: text/plain, Size: 2071 bytes --]
> On May 7, 2024, at 8:44 PM, Jakub Kicinski <kuba@kernel.org> wrote:
>
> On Fri, 3 May 2024 16:07:38 +0100 David Howells wrote:
>> Here some miscellaneous fixes for AF_RXRPC:
>>
>> (1) Fix the congestion control algorithm to start cwnd at 4 and to not cut
>> ssthresh when the peer cuts its rwind size.
>>
>> (2) Only transmit a single ACK for all the DATA packets glued together
>> into a jumbo packet to reduce the number of ACKs being generated.
>>
>> (3) Clean up the generation of flags in the protocol header when creating
>> a packet for transmission. This means we don't carry the old
>> REQUEST-ACK bit around from previous transmissions, will make it
>> easier to fix the MORE-PACKETS flag and make it easier to do jumbo
>> packet assembly in future.
>>
>> (4) Fix how the MORE-PACKETS flag is driven. We shouldn't be setting it
>> in sendmsg() as the packet is then queued and the bit is left in that
>> state, no matter how long it takes us to transmit the packet - and
>> will still be in that state if the packet is retransmitted.
>>
>> (5) Request an ACK on an impending transmission stall due to the app layer
>> not feeding us new data fast enough. If we don't request an ACK, we
>> may have to hold on to the packet buffers for a significant amount of
>> time until the receiver gets bored and sends us an ACK anyway.
>
> Looks like these got marked as Rejected in patchwork.
> I think either because lore is confused and attaches an exchange with
> DaveM from 2022 to them (?) or because I mentioned to DaveM that I'm
> not sure these are fixes. So let me ask - on a scale of 1 to 10, how
> convinced are you that these should go to Linus this week rather than
> being categorized as general improvements and go during the merge
> window (without the Fixes tags)?
Jakub,
In my opinion, the first two patches in the series I believe are important to back port to the stable branches.
Reviewed-by: Jeffrey Altman <jaltman@auristor.com <mailto:jaltman@auristor.com>>
Jeffrey
[-- Attachment #2: smime.p7s --]
[-- Type: application/pkcs7-signature, Size: 3929 bytes --]
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2024-05-08 7:57 ` Jeffrey Altman
@ 2024-05-08 13:54 ` Jakub Kicinski
0 siblings, 0 replies; 22+ messages in thread
From: Jakub Kicinski @ 2024-05-08 13:54 UTC (permalink / raw)
To: Jeffrey Altman, David Howells
Cc: netdev, Marc Dionne, David S. Miller, Eric Dumazet, Paolo Abeni,
linux-afs, linux-kernel
On Wed, 8 May 2024 01:57:43 -0600 Jeffrey Altman wrote:
> > Looks like these got marked as Rejected in patchwork.
> > I think either because lore is confused and attaches an exchange with
> > DaveM from 2022 to them (?) or because I mentioned to DaveM that I'm
> > not sure these are fixes. So let me ask - on a scale of 1 to 10, how
> > convinced are you that these should go to Linus this week rather than
> > being categorized as general improvements and go during the merge
> > window (without the Fixes tags)?
>
> Jakub,
>
> In my opinion, the first two patches in the series I believe are important to back port to the stable branches.
>
> Reviewed-by: Jeffrey Altman <jaltman@auristor.com <mailto:jaltman@auristor.com>>
Are they regressions? Seems possible from the Fixes tag but unclear
from the text of the commit messages.
In any case, taking the first two may be a reasonable compromise.
Does it sounds good to you, David?
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2024-05-08 2:44 ` Jakub Kicinski
2024-05-08 7:57 ` Jeffrey Altman
@ 2024-05-08 14:00 ` David Howells
2024-05-08 15:07 ` Jakub Kicinski
1 sibling, 1 reply; 22+ messages in thread
From: David Howells @ 2024-05-08 14:00 UTC (permalink / raw)
To: Jakub Kicinski
Cc: dhowells, netdev, Marc Dionne, David S. Miller, Eric Dumazet,
Paolo Abeni, linux-afs, linux-kernel
Jakub Kicinski <kuba@kernel.org> wrote:
> Looks like these got marked as Rejected in patchwork.
> I think either because lore is confused and attaches an exchange with
> DaveM from 2022 to them (?) or because I mentioned to DaveM that I'm
> not sure these are fixes. So let me ask - on a scale of 1 to 10, how
> convinced are you that these should go to Linus this week rather than
> being categorized as general improvements and go during the merge
> window (without the Fixes tags)?
Ah, sorry. I marked them rejected as I put myself as cc: not S-o-b on one of
them, but then got distracted and didn't get around to reposting them. And
Jeff mentioned that the use of the MORE-PACKETS flag is not exactly
consistent between various implementations.
So if you could take just the first two for the moment?
Thanks,
David
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2024-05-08 14:00 ` David Howells
@ 2024-05-08 15:07 ` Jakub Kicinski
0 siblings, 0 replies; 22+ messages in thread
From: Jakub Kicinski @ 2024-05-08 15:07 UTC (permalink / raw)
To: David Howells
Cc: netdev, Marc Dionne, David S. Miller, Eric Dumazet, Paolo Abeni,
linux-afs, linux-kernel
On Wed, 08 May 2024 15:00:28 +0100 David Howells wrote:
> Jakub Kicinski <kuba@kernel.org> wrote:
>
> > Looks like these got marked as Rejected in patchwork.
> > I think either because lore is confused and attaches an exchange with
> > DaveM from 2022 to them (?) or because I mentioned to DaveM that I'm
> > not sure these are fixes. So let me ask - on a scale of 1 to 10, how
> > convinced are you that these should go to Linus this week rather than
> > being categorized as general improvements and go during the merge
> > window (without the Fixes tags)?
>
> Ah, sorry. I marked them rejected as I put myself as cc: not S-o-b on one of
> them, but then got distracted and didn't get around to reposting them. And
> Jeff mentioned that the use of the MORE-PACKETS flag is not exactly
> consistent between various implementations.
Ah, mystery solved :)
> So if you could take just the first two for the moment?
Done!
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 0/5] rxrpc: Miscellaneous fixes
2024-05-03 15:07 David Howells
2024-05-08 2:44 ` Jakub Kicinski
@ 2024-05-08 15:10 ` patchwork-bot+netdevbpf
1 sibling, 0 replies; 22+ messages in thread
From: patchwork-bot+netdevbpf @ 2024-05-08 15:10 UTC (permalink / raw)
To: David Howells
Cc: netdev, marc.dionne, davem, edumazet, kuba, pabeni, linux-afs,
linux-kernel
Hello:
This series was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:
On Fri, 3 May 2024 16:07:38 +0100 you wrote:
> Here some miscellaneous fixes for AF_RXRPC:
>
> (1) Fix the congestion control algorithm to start cwnd at 4 and to not cut
> ssthresh when the peer cuts its rwind size.
>
> (2) Only transmit a single ACK for all the DATA packets glued together
> into a jumbo packet to reduce the number of ACKs being generated.
>
> [...]
Here is the summary with links:
- [net,1/5] rxrpc: Fix congestion control algorithm
https://git.kernel.org/netdev/net/c/ba4e103848d3
- [net,2/5] rxrpc: Only transmit one ACK per jumbo packet received
https://git.kernel.org/netdev/net/c/012b7206918d
- [net,3/5] rxrpc: Clean up Tx header flags generation handling
(no matching commit)
- [net,4/5] rxrpc: Change how the MORE-PACKETS rxrpc wire header flag is driven
(no matching commit)
- [net,5/5] rxrpc: Request an ACK on impending Tx stall
(no matching commit)
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 22+ messages in thread
* [PATCH net 0/5] rxrpc: Miscellaneous fixes
@ 2025-07-16 11:52 David Howells
0 siblings, 0 replies; 22+ messages in thread
From: David Howells @ 2025-07-16 11:52 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel
Here are some fixes for rxrpc:
(1) Fix the calling of IP routing code with IRQs disabled.
(2) Fix a recvmsg/recvmsg race when the first completes a call.
(3) Fix a race between notification, recvmsg and sendmsg releasing a call.
(4) Fix abort of abort.
(5) Fix call-level aborts that should be connection-level aborts.
David
The patches can be found here also:
http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
David Howells (5):
rxrpc: Fix irq-disabled in local_bh_enable()
rxrpc: Fix recv-recv race of completed call
rxrpc: Fix notification vs call-release vs recvmsg
rxrpc: Fix transmission of an abort in response to an abort
rxrpc: Fix to use conn aborts for conn-wide failures
include/trace/events/rxrpc.h | 6 +++++-
net/rxrpc/ar-internal.h | 4 ++++
net/rxrpc/call_accept.c | 14 ++++++++------
net/rxrpc/call_object.c | 28 ++++++++++++----------------
net/rxrpc/io_thread.c | 14 ++++++++++++++
net/rxrpc/output.c | 22 +++++++++++++---------
net/rxrpc/peer_object.c | 6 ++----
net/rxrpc/recvmsg.c | 23 +++++++++++++++++++++--
net/rxrpc/security.c | 8 ++++----
9 files changed, 83 insertions(+), 42 deletions(-)
^ permalink raw reply [flat|nested] 22+ messages in thread
* [PATCH net 0/5] rxrpc: Miscellaneous fixes
@ 2026-03-19 15:01 David Howells
2026-03-19 15:01 ` [PATCH net 1/5] rxrpc: Fix RxGK token loading to check bounds David Howells
` (4 more replies)
0 siblings, 5 replies; 22+ messages in thread
From: David Howells @ 2026-03-19 15:01 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel
Here are some fixes for rxrpc:
(1) Fix missing bounds checks when parsing RxGK tickets.
(2) Fix use of wrong skbuff to get challenge serial number.
(3) Fix unexpected RACK timer warning to report old mode.
(4) Fix server keyring refcount leak.
(5) Fix call key refcount leak.
David
The patches can be found here also:
http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-fixes
Alok Tiwari (2):
rxrpc: Fix use of wrong skb when comparing queued RESP challenge
serial
rxrpc: Fix rack timer warning to report unexpected mode
Anderson Nascimento (2):
rxrpc: Fix keyring reference count leak in rxrpc_setsockopt()
rxrpc: Fix key reference count leak from call->key
Oleh Konko (1):
rxrpc: Fix RxGK token loading to check bounds
net/rxrpc/af_rxrpc.c | 2 +-
net/rxrpc/call_object.c | 1 +
net/rxrpc/conn_event.c | 2 +-
net/rxrpc/input_rack.c | 2 +-
net/rxrpc/key.c | 30 +++++++++++++++++-------------
5 files changed, 21 insertions(+), 16 deletions(-)
^ permalink raw reply [flat|nested] 22+ messages in thread
* [PATCH net 1/5] rxrpc: Fix RxGK token loading to check bounds
2026-03-19 15:01 [PATCH net 0/5] rxrpc: Miscellaneous fixes David Howells
@ 2026-03-19 15:01 ` David Howells
2026-03-19 15:01 ` [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial David Howells
` (3 subsequent siblings)
4 siblings, 0 replies; 22+ messages in thread
From: David Howells @ 2026-03-19 15:01 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel, Oleh Konko,
Jeffrey Altman, Simon Horman, stable
From: Oleh Konko <security@1seal.org>
rxrpc_preparse_xdr_yfs_rxgk() reads the raw key length and ticket length
from the XDR token as u32 values and passes each through round_up(x, 4)
before using the rounded value for validation and allocation. When the raw
length is >= 0xfffffffd, round_up() wraps to 0, so the bounds check and
kzalloc both use 0 while the subsequent memcpy still copies the original
~4 GiB value, producing a heap buffer overflow reachable from an
unprivileged add_key() call.
Fix this by:
(1) Rejecting raw key lengths above AFSTOKEN_GK_KEY_MAX and raw ticket
lengths above AFSTOKEN_GK_TOKEN_MAX before rounding, consistent with
the caps that the RxKAD path already enforces via AFSTOKEN_RK_TIX_MAX.
(2) Sizing the flexible-array allocation from the validated raw key
length via struct_size_t() instead of the rounded value.
(3) Caching the raw lengths so that the later field assignments and
memcpy calls do not re-read from the token, eliminating a class of
TOCTOU re-parse.
The control path (valid token with lengths within bounds) is unaffected.
Fixes: 0ca100ff4df6 ("rxrpc: Add YFS RxGK (GSSAPI) security class")
Signed-off-by: Oleh Konko <security@1seal.org>
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Jeffrey Altman <jaltman@auristor.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Eric Dumazet <edumazet@google.com>
cc: "David S. Miller" <davem@davemloft.net>
cc: Jakub Kicinski <kuba@kernel.org>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
cc: stable@kernel.org
---
net/rxrpc/key.c | 30 +++++++++++++++++-------------
1 file changed, 17 insertions(+), 13 deletions(-)
diff --git a/net/rxrpc/key.c b/net/rxrpc/key.c
index 85078114b2dd..c96e1d8f4845 100644
--- a/net/rxrpc/key.c
+++ b/net/rxrpc/key.c
@@ -13,6 +13,7 @@
#include <crypto/skcipher.h>
#include <linux/module.h>
#include <linux/net.h>
+#include <linux/overflow.h>
#include <linux/skbuff.h>
#include <linux/key-type.h>
#include <linux/ctype.h>
@@ -171,7 +172,7 @@ static int rxrpc_preparse_xdr_yfs_rxgk(struct key_preparsed_payload *prep,
size_t plen;
const __be32 *ticket, *key;
s64 tmp;
- u32 tktlen, keylen;
+ size_t raw_keylen, raw_tktlen, keylen, tktlen;
_enter(",{%x,%x,%x,%x},%x",
ntohl(xdr[0]), ntohl(xdr[1]), ntohl(xdr[2]), ntohl(xdr[3]),
@@ -181,18 +182,22 @@ static int rxrpc_preparse_xdr_yfs_rxgk(struct key_preparsed_payload *prep,
goto reject;
key = xdr + (6 * 2 + 1);
- keylen = ntohl(key[-1]);
- _debug("keylen: %x", keylen);
- keylen = round_up(keylen, 4);
+ raw_keylen = ntohl(key[-1]);
+ _debug("keylen: %zx", raw_keylen);
+ if (raw_keylen > AFSTOKEN_GK_KEY_MAX)
+ goto reject;
+ keylen = round_up(raw_keylen, 4);
if ((6 * 2 + 2) * 4 + keylen > toklen)
goto reject;
ticket = xdr + (6 * 2 + 1 + (keylen / 4) + 1);
- tktlen = ntohl(ticket[-1]);
- _debug("tktlen: %x", tktlen);
- tktlen = round_up(tktlen, 4);
+ raw_tktlen = ntohl(ticket[-1]);
+ _debug("tktlen: %zx", raw_tktlen);
+ if (raw_tktlen > AFSTOKEN_GK_TOKEN_MAX)
+ goto reject;
+ tktlen = round_up(raw_tktlen, 4);
if ((6 * 2 + 2) * 4 + keylen + tktlen != toklen) {
- kleave(" = -EKEYREJECTED [%x!=%x, %x,%x]",
+ kleave(" = -EKEYREJECTED [%zx!=%x, %zx,%zx]",
(6 * 2 + 2) * 4 + keylen + tktlen, toklen,
keylen, tktlen);
goto reject;
@@ -206,7 +211,7 @@ static int rxrpc_preparse_xdr_yfs_rxgk(struct key_preparsed_payload *prep,
if (!token)
goto nomem;
- token->rxgk = kzalloc(sizeof(*token->rxgk) + keylen, GFP_KERNEL);
+ token->rxgk = kzalloc(struct_size_t(struct rxgk_key, _key, raw_keylen), GFP_KERNEL);
if (!token->rxgk)
goto nomem_token;
@@ -221,9 +226,9 @@ static int rxrpc_preparse_xdr_yfs_rxgk(struct key_preparsed_payload *prep,
token->rxgk->enctype = tmp = xdr_dec64(xdr + 5 * 2);
if (tmp < 0 || tmp > UINT_MAX)
goto reject_token;
- token->rxgk->key.len = ntohl(key[-1]);
+ token->rxgk->key.len = raw_keylen;
token->rxgk->key.data = token->rxgk->_key;
- token->rxgk->ticket.len = ntohl(ticket[-1]);
+ token->rxgk->ticket.len = raw_tktlen;
if (token->rxgk->endtime != 0) {
expiry = rxrpc_s64_to_time64(token->rxgk->endtime);
@@ -236,8 +241,7 @@ static int rxrpc_preparse_xdr_yfs_rxgk(struct key_preparsed_payload *prep,
memcpy(token->rxgk->key.data, key, token->rxgk->key.len);
/* Pad the ticket so that we can use it directly in XDR */
- token->rxgk->ticket.data = kzalloc(round_up(token->rxgk->ticket.len, 4),
- GFP_KERNEL);
+ token->rxgk->ticket.data = kzalloc(tktlen, GFP_KERNEL);
if (!token->rxgk->ticket.data)
goto nomem_yrxgk;
memcpy(token->rxgk->ticket.data, ticket, token->rxgk->ticket.len);
^ permalink raw reply related [flat|nested] 22+ messages in thread
* [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
2026-03-19 15:01 [PATCH net 0/5] rxrpc: Miscellaneous fixes David Howells
2026-03-19 15:01 ` [PATCH net 1/5] rxrpc: Fix RxGK token loading to check bounds David Howells
@ 2026-03-19 15:01 ` David Howells
2026-03-21 1:45 ` Jakub Kicinski
2026-03-19 15:01 ` [PATCH net 3/5] rxrpc: Fix rack timer warning to report unexpected mode David Howells
` (2 subsequent siblings)
4 siblings, 1 reply; 22+ messages in thread
From: David Howells @ 2026-03-19 15:01 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel, Alok Tiwari,
Jeffrey Altman, Simon Horman, stable
From: Alok Tiwari <alok.a.tiwari@oracle.com>
In rxrpc_post_response(), the code should be comparing the challenge serial
number from the cached response before deciding to switch to a newer
response, but looks at the newer packet private data instead, rendering the
comparison always false.
Fix this by switching to look at the older packet.
Fixes: 5800b1cf3fd8 ("rxrpc: Allow CHALLENGEs to the passed to the app for a RESPONSE")
Signed-off-by: Alok Tiwari <alok.a.tiwari@oracle.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Jeffrey Altman <jaltman@auristor.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Eric Dumazet <edumazet@google.com>
cc: "David S. Miller" <davem@davemloft.net>
cc: Jakub Kicinski <kuba@kernel.org>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
cc: stable@kernel.org
---
net/rxrpc/conn_event.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/rxrpc/conn_event.c b/net/rxrpc/conn_event.c
index 98ad9b51ca2c..2c27f47951f9 100644
--- a/net/rxrpc/conn_event.c
+++ b/net/rxrpc/conn_event.c
@@ -557,7 +557,7 @@ void rxrpc_post_response(struct rxrpc_connection *conn, struct sk_buff *skb)
spin_lock_irq(&local->lock);
old = conn->tx_response;
if (old) {
- struct rxrpc_skb_priv *osp = rxrpc_skb(skb);
+ struct rxrpc_skb_priv *osp = rxrpc_skb(old);
/* Always go with the response to the most recent challenge. */
if (after(sp->resp.challenge_serial, osp->resp.challenge_serial))
^ permalink raw reply related [flat|nested] 22+ messages in thread
* [PATCH net 3/5] rxrpc: Fix rack timer warning to report unexpected mode
2026-03-19 15:01 [PATCH net 0/5] rxrpc: Miscellaneous fixes David Howells
2026-03-19 15:01 ` [PATCH net 1/5] rxrpc: Fix RxGK token loading to check bounds David Howells
2026-03-19 15:01 ` [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial David Howells
@ 2026-03-19 15:01 ` David Howells
2026-03-19 15:01 ` [PATCH net 4/5] rxrpc: Fix keyring reference count leak in rxrpc_setsockopt() David Howells
2026-03-19 15:01 ` [PATCH net 5/5] rxrpc: Fix key reference count leak from call->key David Howells
4 siblings, 0 replies; 22+ messages in thread
From: David Howells @ 2026-03-19 15:01 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel, Alok Tiwari,
Simon Horman, Jeffrey Altman, stable
From: Alok Tiwari <alok.a.tiwari@oracle.com>
rxrpc_rack_timer_expired() clears call->rack_timer_mode to OFF before
the switch. The default case warning therefore always prints OFF and
doesn't identify the unexpected timer mode.
Log the saved mode value instead so the warning reports the actual
unexpected rack timer mode.
Fixes: 7c482665931b ("rxrpc: Implement RACK/TLP to deal with transmission stalls [RFC8985]")
Signed-off-by: Alok Tiwari <alok.a.tiwari@oracle.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Simon Horman <horms@kernel.org>
Reviewed-by: Jeffrey Altman <jaltman@auristor.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Eric Dumazet <edumazet@google.com>
cc: "David S. Miller" <davem@davemloft.net>
cc: Jakub Kicinski <kuba@kernel.org>
cc: Paolo Abeni <pabeni@redhat.com>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
cc: stable@kernel.org
---
net/rxrpc/input_rack.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/rxrpc/input_rack.c b/net/rxrpc/input_rack.c
index 13c371261e0a..9eb109ffba56 100644
--- a/net/rxrpc/input_rack.c
+++ b/net/rxrpc/input_rack.c
@@ -413,6 +413,6 @@ void rxrpc_rack_timer_expired(struct rxrpc_call *call, ktime_t overran_by)
break;
//case RXRPC_CALL_RACKTIMER_ZEROWIN:
default:
- pr_warn("Unexpected rack timer %u", call->rack_timer_mode);
+ pr_warn("Unexpected rack timer %u", mode);
}
}
^ permalink raw reply related [flat|nested] 22+ messages in thread
* [PATCH net 4/5] rxrpc: Fix keyring reference count leak in rxrpc_setsockopt()
2026-03-19 15:01 [PATCH net 0/5] rxrpc: Miscellaneous fixes David Howells
` (2 preceding siblings ...)
2026-03-19 15:01 ` [PATCH net 3/5] rxrpc: Fix rack timer warning to report unexpected mode David Howells
@ 2026-03-19 15:01 ` David Howells
2026-03-19 15:01 ` [PATCH net 5/5] rxrpc: Fix key reference count leak from call->key David Howells
4 siblings, 0 replies; 22+ messages in thread
From: David Howells @ 2026-03-19 15:01 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel,
Anderson Nascimento, Jeffrey Altman, Simon Horman, stable
From: Anderson Nascimento <anderson@allelesecurity.com>
In rxrpc_setsockopt(), the code checks 'rx->key' when handling the
RXRPC_SECURITY_KEYRING option. However, this appears to be a logic error.
The code should be checking 'rx->securities' to determine if a keyring has
already been defined for the socket.
Currently, if a user calls setsockopt(RXRPC_SECURITY_KEYRING) multiple
times on the same socket, the check 'if (rx->key)' fails to block
subsequent calls because 'rx->key' has not been defined by the function.
This results in a reference count leak on the keyring.
This patch changes the check to 'rx->securities' to correctly identify if
the socket security keyring has already been configured, returning -EINVAL
on subsequent attempts.
Before the patch:
It shows the keyring reference counter elevated.
$ cat /proc/keys | grep AFSkeys1
27aca8ae I--Q--- 24469721 perm 3f010000 1000 1000 keyring AFSkeys1: empty
$
After the patch:
The keyring reference counter remains stable and subsequent calls return an
error:
$ ./poc
setsockopt: Invalid argument
$
Fixes: 17926a79320a ("[AF_RXRPC]: Provide secure RxRPC sockets for use by userspace and kernel both")
Signed-off-by: Anderson Nascimento <anderson@allelesecurity.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Jeffrey Altman <jaltman@auristor.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Eric Dumazet <edumazet@google.com>
cc: "David S. Miller" <davem@davemloft.net>
cc: Jakub Kicinski <kuba@kernel.org>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
cc: stable@kernel.org
---
net/rxrpc/af_rxrpc.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/rxrpc/af_rxrpc.c b/net/rxrpc/af_rxrpc.c
index 0f90272ac254..0b7ed99a3025 100644
--- a/net/rxrpc/af_rxrpc.c
+++ b/net/rxrpc/af_rxrpc.c
@@ -665,7 +665,7 @@ static int rxrpc_setsockopt(struct socket *sock, int level, int optname,
case RXRPC_SECURITY_KEYRING:
ret = -EINVAL;
- if (rx->key)
+ if (rx->securities)
goto error;
ret = -EISCONN;
if (rx->sk.sk_state != RXRPC_UNBOUND)
^ permalink raw reply related [flat|nested] 22+ messages in thread
* [PATCH net 5/5] rxrpc: Fix key reference count leak from call->key
2026-03-19 15:01 [PATCH net 0/5] rxrpc: Miscellaneous fixes David Howells
` (3 preceding siblings ...)
2026-03-19 15:01 ` [PATCH net 4/5] rxrpc: Fix keyring reference count leak in rxrpc_setsockopt() David Howells
@ 2026-03-19 15:01 ` David Howells
4 siblings, 0 replies; 22+ messages in thread
From: David Howells @ 2026-03-19 15:01 UTC (permalink / raw)
To: netdev
Cc: David Howells, Marc Dionne, Jakub Kicinski, David S. Miller,
Eric Dumazet, Paolo Abeni, linux-afs, linux-kernel,
Anderson Nascimento, Jeffrey Altman, Simon Horman, stable
From: Anderson Nascimento <anderson@allelesecurity.com>
When creating a client call in rxrpc_alloc_client_call(), the code obtains
a reference to the key. This is never cleaned up and gets leaked when the
call is destroyed.
Fix this by freeing call->key in rxrpc_destroy_call().
Before the patch, it shows the key reference counter elevated:
$ cat /proc/keys | grep afs@54321
1bffe9cd I--Q--i 8053480 4169w 3b010000 1000 1000 rxrpc afs@54321: ka
$
After the patch, the invalidated key is removed when the code exits:
$ cat /proc/keys | grep afs@54321
$
Fixes: f3441d4125fc ("rxrpc: Copy client call parameters into rxrpc_call earlier")
Signed-off-by: Anderson Nascimento <anderson@allelesecurity.com>
Co-developed-by: David Howells <dhowells@redhat.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Reviewed-by: Jeffrey Altman <jaltman@auristor.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Eric Dumazet <edumazet@google.com>
cc: "David S. Miller" <davem@davemloft.net>
cc: Jakub Kicinski <kuba@kernel.org>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
cc: stable@kernel.org
---
net/rxrpc/call_object.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/net/rxrpc/call_object.c b/net/rxrpc/call_object.c
index 918f41d97a2f..8d874ea428ff 100644
--- a/net/rxrpc/call_object.c
+++ b/net/rxrpc/call_object.c
@@ -694,6 +694,7 @@ static void rxrpc_destroy_call(struct work_struct *work)
rxrpc_put_bundle(call->bundle, rxrpc_bundle_put_call);
rxrpc_put_peer(call->peer, rxrpc_peer_put_call);
rxrpc_put_local(call->local, rxrpc_local_put_call);
+ key_put(call->key);
call_rcu(&call->rcu, rxrpc_rcu_free_call);
}
^ permalink raw reply related [flat|nested] 22+ messages in thread
* Re: [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
2026-03-19 15:01 ` [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial David Howells
@ 2026-03-21 1:45 ` Jakub Kicinski
2026-03-21 8:15 ` David Howells
0 siblings, 1 reply; 22+ messages in thread
From: Jakub Kicinski @ 2026-03-21 1:45 UTC (permalink / raw)
To: dhowells
Cc: Jakub Kicinski, netdev, linux-afs, horms, alok.a.tiwari, davem,
marc.dionne, linux-kernel, security, stable, pabeni, anderson,
jaltman, edumazet
Hi David!
The review under --- is AI generated. It looks legit to me.
The Google reviewer also points out preexiting problems that may be worth looking at:
https://sashiko.dev/#/patchset/20260319150150.4189381-1-dhowells%40redhat.com
For local reproduction steps see https://netdev-ai.bots.linux.dev/ai-local.html
---
rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
In rxrpc_post_response(), the code should be comparing the challenge
serial number from the cached response before deciding to switch to a
newer response, but looks at the newer packet private data instead,
rendering the comparison always false.
Fix this by switching to look at the older packet.
> diff --git a/net/rxrpc/conn_event.c b/net/rxrpc/conn_event.c
> index 98ad9b51ca2c..2c27f47951f9 100644
> --- a/net/rxrpc/conn_event.c
> +++ b/net/rxrpc/conn_event.c
> @@ -557,7 +557,7 @@ void rxrpc_post_response(struct rxrpc_connection *conn, struct sk_buff *skb)
> spin_lock_irq(&local->lock);
> old = conn->tx_response;
> if (old) {
> - struct rxrpc_skb_priv *osp = rxrpc_skb(skb);
> + struct rxrpc_skb_priv *osp = rxrpc_skb(old);
>
> /* Always go with the response to the most recent challenge. */
> if (after(sp->resp.challenge_serial, osp->resp.challenge_serial))
> conn->tx_response = old;
^^^^
Does this have the logic inverted? The comment says "Always go with
the response to the most recent challenge" and the condition checks
if the new response has a more recent serial number:
if (after(sp->resp.challenge_serial, osp->resp.challenge_serial))
When this is TRUE (new serial is after old serial), the code keeps
the OLD response by setting conn->tx_response = old. Shouldn't it
keep the NEW response instead? Something like:
if (after(sp->resp.challenge_serial, osp->resp.challenge_serial))
conn->tx_response = skb;
This would cause the connection to respond to outdated challenges
rather than the most recent one.
> else
> old = skb;
When a new response is rejected here (because the old response has a
more recent challenge serial), what happens to the rejected packet?
The function assigns it to the local variable 'old' but never frees
it.
Looking at the callers:
- rxkad_respond_to_challenge() in rxkad.c sets response = NULL after
calling this function
- rxgk_construct_response() in rxgk.c does the same
This suggests ownership transfers to rxrpc_post_response(). Should
the rejected packet be freed with rxrpc_free_skb() before returning?
> } else {
> conn->tx_response = skb;
> }
> spin_unlock_irq(&local->lock);
> rxrpc_poke_conn(conn, rxrpc_conn_get_poke_response);
> }
--
pw-bot: cr
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
2026-03-21 1:45 ` Jakub Kicinski
@ 2026-03-21 8:15 ` David Howells
2026-03-23 21:45 ` Jakub Kicinski
0 siblings, 1 reply; 22+ messages in thread
From: David Howells @ 2026-03-21 8:15 UTC (permalink / raw)
To: Jakub Kicinski
Cc: dhowells, netdev, linux-afs, horms, alok.a.tiwari, davem,
marc.dionne, linux-kernel, security, stable, pabeni, anderson,
jaltman, edumazet
Jakub Kicinski <kuba@kernel.org> wrote:
> The review under --- is AI generated. It looks legit to me.
I saw that there was one on patchwork, but I couldn't access it.
Thanks,
David
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
2026-03-21 8:15 ` David Howells
@ 2026-03-23 21:45 ` Jakub Kicinski
2026-03-23 21:51 ` David Howells
0 siblings, 1 reply; 22+ messages in thread
From: Jakub Kicinski @ 2026-03-23 21:45 UTC (permalink / raw)
To: David Howells
Cc: netdev, linux-afs, horms, alok.a.tiwari, davem, marc.dionne,
linux-kernel, security, stable, pabeni, anderson, jaltman,
edumazet
On Sat, 21 Mar 2026 08:15:19 +0000 David Howells wrote:
> Jakub Kicinski <kuba@kernel.org> wrote:
>
> > The review under --- is AI generated. It looks legit to me.
>
> I saw that there was one on patchwork, but I couldn't access it.
There's a 24h delay before results are public otherwise noobs spam
the list with 100 versions until the AI is happy.
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
2026-03-23 21:45 ` Jakub Kicinski
@ 2026-03-23 21:51 ` David Howells
2026-03-23 22:11 ` Jakub Kicinski
0 siblings, 1 reply; 22+ messages in thread
From: David Howells @ 2026-03-23 21:51 UTC (permalink / raw)
To: Jakub Kicinski
Cc: dhowells, netdev, linux-afs, horms, alok.a.tiwari, davem,
marc.dionne, linux-kernel, security, stable, pabeni, anderson,
jaltman, edumazet
Btw, do you know how to credit the AI site with reporting something? For
instance for syzbot gives me a Reported-by: line that carries something that
can be used as an email address. There were other things in the AI report,
some of which I added patches for.
David
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
2026-03-23 21:51 ` David Howells
@ 2026-03-23 22:11 ` Jakub Kicinski
0 siblings, 0 replies; 22+ messages in thread
From: Jakub Kicinski @ 2026-03-23 22:11 UTC (permalink / raw)
To: David Howells
Cc: netdev, linux-afs, horms, alok.a.tiwari, davem, marc.dionne,
linux-kernel, security, stable, pabeni, anderson, jaltman,
edumazet
On Mon, 23 Mar 2026 21:51:08 +0000 David Howells wrote:
> Btw, do you know how to credit the AI site with reporting something? For
> instance for syzbot gives me a Reported-by: line that carries something that
> can be used as an email address. There were other things in the AI report,
> some of which I added patches for.
I was also wondering about that. syzbot reports are for stuff that's
already committed. Most of the CI and AI reports are pre-commit.
IDK if we have a way to attribute issues caught before commits go in.
I guess AI reviews are an integral part of the process now. We don't
have a tag for when reviewers/maintainers catch bugs in patches either.
^ permalink raw reply [flat|nested] 22+ messages in thread
end of thread, other threads:[~2026-03-23 22:11 UTC | newest]
Thread overview: 22+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-19 15:01 [PATCH net 0/5] rxrpc: Miscellaneous fixes David Howells
2026-03-19 15:01 ` [PATCH net 1/5] rxrpc: Fix RxGK token loading to check bounds David Howells
2026-03-19 15:01 ` [PATCH net 2/5] rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial David Howells
2026-03-21 1:45 ` Jakub Kicinski
2026-03-21 8:15 ` David Howells
2026-03-23 21:45 ` Jakub Kicinski
2026-03-23 21:51 ` David Howells
2026-03-23 22:11 ` Jakub Kicinski
2026-03-19 15:01 ` [PATCH net 3/5] rxrpc: Fix rack timer warning to report unexpected mode David Howells
2026-03-19 15:01 ` [PATCH net 4/5] rxrpc: Fix keyring reference count leak in rxrpc_setsockopt() David Howells
2026-03-19 15:01 ` [PATCH net 5/5] rxrpc: Fix key reference count leak from call->key David Howells
-- strict thread matches above, loose matches on Subject: below --
2025-07-16 11:52 [PATCH net 0/5] rxrpc: Miscellaneous fixes David Howells
2024-05-03 15:07 David Howells
2024-05-08 2:44 ` Jakub Kicinski
2024-05-08 7:57 ` Jeffrey Altman
2024-05-08 13:54 ` Jakub Kicinski
2024-05-08 14:00 ` David Howells
2024-05-08 15:07 ` Jakub Kicinski
2024-05-08 15:10 ` patchwork-bot+netdevbpf
2022-05-21 8:02 David Howells
2022-05-22 20:32 ` David Miller
2022-05-22 20:40 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox