[PATCH net-next 0/3] tcp: refactor skb_cmp_decrypted() checks

Jakub Kicinski posted 3 patches 3 months, 1 week ago
Patches applied successfully (tree, apply log)
git fetch https://github.com/multipath-tcp/mptcp_net-next tags/patchew/20240530233616.85897-1-kuba@kernel.org
include/net/tcp.h    | 16 ++++++++++++++++
net/core/skbuff.c    |  3 +++
net/ipv4/tcp_input.c | 11 +++--------
net/ipv4/tcp_ipv4.c  |  3 +--
net/tls/tls_device.c | 11 ++---------
5 files changed, 25 insertions(+), 19 deletions(-)
[PATCH net-next 0/3] tcp: refactor skb_cmp_decrypted() checks
Posted by Jakub Kicinski 3 months, 1 week ago
Refactor the input patch coalescing checks and wrap "EOR forcing"
logic into a helper. This will hopefully make the code easier to
follow. While at it throw some DEBUG_NET checks into skb_shift().

Jakub Kicinski (3):
  tcp: wrap mptcp and decrypted checks into tcp_skb_can_collapse_rx()
  tcp: add a helper for setting EOR on tail skb
  net: skb: add compatibility warnings to skb_shift()

 include/net/tcp.h    | 16 ++++++++++++++++
 net/core/skbuff.c    |  3 +++
 net/ipv4/tcp_input.c | 11 +++--------
 net/ipv4/tcp_ipv4.c  |  3 +--
 net/tls/tls_device.c | 11 ++---------
 5 files changed, 25 insertions(+), 19 deletions(-)

-- 
2.45.1
Re: [PATCH net-next 0/3] tcp: refactor skb_cmp_decrypted() checks
Posted by MPTCP CI 3 months, 1 week ago
Hi Jakub,

Thank you for your modifications, that's great!

Our CI did some validations and here is its report:

- KVM Validation: normal: Success! ✅
- KVM Validation: debug: Success! ✅
- KVM Validation: btf (only bpftest_all): Success! ✅
- Task: https://github.com/multipath-tcp/mptcp_net-next/actions/runs/9310667506

Initiator: Patchew Applier
Commits: https://github.com/multipath-tcp/mptcp_net-next/commits/9ff802fa78d3
Patchwork: https://patchwork.kernel.org/project/mptcp/list/?series=857501


If there are some issues, you can reproduce them using the same environment as
the one used by the CI thanks to a docker image, e.g.:

    $ cd [kernel source code]
    $ docker run -v "${PWD}:${PWD}:rw" -w "${PWD}" --privileged --rm -it \
        --pull always mptcp/mptcp-upstream-virtme-docker:latest \
        auto-normal

For more details:

    https://github.com/multipath-tcp/mptcp-upstream-virtme-docker


Please note that despite all the efforts that have been already done to have a
stable tests suite when executed on a public CI like here, it is possible some
reported issues are not due to your modifications. Still, do not hesitate to
help us improve that ;-)

Cheers,
MPTCP GH Action bot
Bot operated by Matthieu Baerts (NGI0 Core)