Message ID | 20240219135255.15429-1-justin.iurman@uliege.be |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-71431-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:693c:2685:b0:108:e6aa:91d0 with SMTP id mn5csp1295344dyc; Mon, 19 Feb 2024 05:55:00 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUsI9rDyE+B9IMB0r8dzs9mM9ZpYm2k+YFMxPWTjaWA47XQDyjgkR2ZnTbdeNjE+vUljUkVNbkydvgd9yrjULY4GCSh+g== X-Google-Smtp-Source: AGHT+IFF1s1/L0zFk7442xenW37JIlG+L3u8zchZL+goAJTFXx0q8fyObI0jFnJY0/UqCc1KImI0 X-Received: by 2002:a17:90b:3644:b0:299:35a1:f716 with SMTP id nh4-20020a17090b364400b0029935a1f716mr5643598pjb.12.1708350900626; Mon, 19 Feb 2024 05:55:00 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708350900; cv=pass; d=google.com; s=arc-20160816; b=KewyC2i3/qTgU6nqPnSZqMlIAsutI5aKeLXy5pBBHislHcL8VJHjNKuPMgFeM8vyOb W4pWptdmohyFAgjpmeiTl1EkhzV2VZB2TeggalRUDFtJ1IBopdL4vdhln4h4wZQO172U 6cu7zmWH+rI0+kCH/7KqhrheCKknKsite7zZcj2DdlgwCf2r0IazJS3FSOowT3Z4qxm/ 9+2rKw8depksPdZ8cWSq9Vszs+QTNDC56NzC6o3IaxsDM1F5io4ZjICjrlyRxsBArLGG s/GbFpmHnMT81qIcVcqXJGmCnv7cy2SgHREHxR6rtRjAr8XqiclwExMEyfokz3QmMJCr dw9Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature:dkim-filter; bh=tt503T/pGpOcgK0THB0iW+sdLkagW2VxJB9yOA5ESYg=; fh=1UEXF8WEdTRZGz3zsBPr9blJ8rxkIELeUsA6ymhnv1o=; b=DWvJeQzlh3GkyU9xyXH1palB3xOQlgcc58vThcMTs2f3X4JCd/WaFr2lO+mRzdF92N eR7/o+NfmsjEgpPYv1/AAkGgrOmiq3smfirlwZanhp/jSIGBjlDc7Bqa6Pb3vuHrO0aT spGT5Y0dZFYOtu3fMkxXCqLSTBjc+E8gUTAE6RFUj+QG5/yN/5xI5BvO8dJzrrby5V66 JU5cxYM/r0KaBfFAoSM78JHy68LlI4Kf1Eo3KZb5OMvditR0vjn3cKX/0UiWp5J1udYz hoaZ8fr1ToPCLenulWnLdTY6w+3oPics2es5PRzZK+5+ggyLvkSyN6gvQrgKCMOKXJR0 I8kQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@uliege.be header.s=ulg20190529 header.b=p0g99vru; arc=pass (i=1 spf=pass spfdomain=uliege.be dkim=pass dkdomain=uliege.be dmarc=pass fromdomain=uliege.be); spf=pass (google.com: domain of linux-kernel+bounces-71431-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-71431-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=uliege.be Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id mf11-20020a17090b184b00b002992bae6439si4701206pjb.0.2024.02.19.05.55.00 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Feb 2024 05:55:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-71431-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@uliege.be header.s=ulg20190529 header.b=p0g99vru; arc=pass (i=1 spf=pass spfdomain=uliege.be dkim=pass dkdomain=uliege.be dmarc=pass fromdomain=uliege.be); spf=pass (google.com: domain of linux-kernel+bounces-71431-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-71431-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=uliege.be Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id AFB0FB21307 for <ouuuleilei@gmail.com>; Mon, 19 Feb 2024 13:53:54 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9372E381C1; Mon, 19 Feb 2024 13:53:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=uliege.be header.i=@uliege.be header.b="p0g99vru" Received: from serv108.segi.ulg.ac.be (serv108.segi.ulg.ac.be [139.165.32.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3F0A1364C6; Mon, 19 Feb 2024 13:53:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=139.165.32.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708350783; cv=none; b=C3pvu0c51PWhWmMaA7ABQLKdQAOCyjHVkYV90bQtM+sLLy8jaAN/rOFhW/yga10qDC0ybm6jRh43okglpB+Mf1IB5IUUVLVC9HiykNoP0VS+I1INN7HXETafYEFstkMpcs7obaK0SMJuuOeZvPV+0nXC6/eir+J/HhxApQmhkuI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708350783; c=relaxed/simple; bh=hyWFT+ulXsZ5bGq5VmS2PaTwAmRzWqlpSCcPDiLoFCc=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=XrVZYisKWf8Ev2VogzpR8yAYKBL8r+ScTzDITTozbpeAYIfFJ2TsiEsIoznwGxLN+QQclNzavguReDwFDzVP+fRY/YSW+JMokFL3PEaUemDE38I2gvciPNloP0JaU96eL/VvwhT8DCYmSIoBXoh8ULuy4E3BEI0va2nmStUtz04= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=uliege.be; spf=pass smtp.mailfrom=uliege.be; dkim=pass (2048-bit key) header.d=uliege.be header.i=@uliege.be header.b=p0g99vru; arc=none smtp.client-ip=139.165.32.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=uliege.be Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=uliege.be Received: from ubuntu.home (125.179-65-87.adsl-dyn.isp.belgacom.be [87.65.179.125]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by serv108.segi.ulg.ac.be (Postfix) with ESMTPSA id 812242012153; Mon, 19 Feb 2024 14:52:59 +0100 (CET) DKIM-Filter: OpenDKIM Filter v2.11.0 serv108.segi.ulg.ac.be 812242012153 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uliege.be; s=ulg20190529; t=1708350779; bh=tt503T/pGpOcgK0THB0iW+sdLkagW2VxJB9yOA5ESYg=; h=From:To:Cc:Subject:Date:From; b=p0g99vru96y4+gufU78VYOpL1nxibj1MAFaoaGgs9OuPIwcF0Lx30DrfBGmgSPFEh JpKac7wWxZ4ynmGL2mgkPMlbJcEApIDFqyOGLXo15cX/LSv9H/5+0QQn1y92PtQYP3 lf1Z/wf5gb/lVrWgV0vRDb6PAUU6oQOzoB1WQC6itcU9FLawvuBQ6jeT+HhKpvHrPr t73bOoHweeOs0MB4QKYT2iVSmiMqR4Jp9C8D3nsvwfPTGL8y+KzFj1qVummG06duqp fdtKVxLqznRXFuAztBnCLIJKbjCCsNaZSS3sazuWSc0dViK+AIvEJjTJaX6l0eZ5/s Gwbn/8k8oi66A== From: Justin Iurman <justin.iurman@uliege.be> To: netdev@vger.kernel.org Cc: davem@davemloft.net, dsahern@kernel.org, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, linux-kernel@vger.kernel.org, justin.iurman@uliege.be Subject: [PATCH net v3 0/2] ioam6: fix write to cloned skb's Date: Mon, 19 Feb 2024 14:52:53 +0100 Message-Id: <20240219135255.15429-1-justin.iurman@uliege.be> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791335408496033576 X-GMAIL-MSGID: 1791335753765382738 |
Series |
ioam6: fix write to cloned skb's
|
|
Message
Justin Iurman
Feb. 19, 2024, 1:52 p.m. UTC
v3: - fix patches tag ("net" and version were removed unexpectedly) v2: - use skb_ensure_writable() instead of skb_cloned()+pskb_expand_head() - refresh network header pointer in ip6_parse_tlv() when returning from ipv6_hop_ioam() Make sure the IOAM data insertion is not applied on cloned skb's. As a consequence, ioam selftests needed a refactoring. Justin Iurman (2): Fix write to cloned skb in ipv6_hop_ioam() selftests: ioam: refactoring to align with the fix net/ipv6/exthdrs.c | 10 +++ tools/testing/selftests/net/ioam6.sh | 38 ++++----- tools/testing/selftests/net/ioam6_parser.c | 95 +++++++++++----------- 3 files changed, 76 insertions(+), 67 deletions(-) base-commit: 166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210
Comments
Hello: This series was applied to netdev/net.git (main) by Paolo Abeni <pabeni@redhat.com>: On Mon, 19 Feb 2024 14:52:53 +0100 you wrote: > v3: > - fix patches tag ("net" and version were removed unexpectedly) > > v2: > - use skb_ensure_writable() instead of skb_cloned()+pskb_expand_head() > - refresh network header pointer in ip6_parse_tlv() when returning from > ipv6_hop_ioam() > > [...] Here is the summary with links: - [net,v3,1/2] Fix write to cloned skb in ipv6_hop_ioam() https://git.kernel.org/netdev/net/c/f198d933c2e4 - [net,v3,2/2] selftests: ioam: refactoring to align with the fix https://git.kernel.org/netdev/net/c/187bbb6968af You are awesome, thank you!