From patchwork Fri Jun 13 04:28:01 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mina Almasry X-Patchwork-Id: 897220 Received: from mail-pj1-f73.google.com (mail-pj1-f73.google.com [209.85.216.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7BC0E202963 for ; Fri, 13 Jun 2025 04:28:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1749788904; cv=none; b=hUXApQpWogwlbdNIyRFXWtgL5arL5PP2dArrNSY/Fdsdkn4GyORHEvcmiMjBj+bOQNdPw44+HZEzOb2IvaLvggR0dnxf9G4nqKBaDOB902pPj5WiCDcmrmLjv1oaUenAghlVEVTLfQgIbCvnKXZnquztsOgj5qb6pFLEXumgoKA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1749788904; c=relaxed/simple; bh=ajuHnnSRgwwpumvdXLZB+CCnOw6RWfwS4TirYIkFOco=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=jKeKzblMYvUrnwmmbuUSnf5bghDhUG31MdjJgMQWWo+47B4M5VhObnLhRK+NTnXLSWUyCo+v+jJ1ypQAFtF5qj1rHesnj/c3Jnjt93wDDvygTol7XYMH0giCH1t5qdh0dLN78lb92ZSnUIXa8jFCgUZYJmWdzPUU2GEq2aXaoUQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--almasrymina.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=LuVENKno; arc=none smtp.client-ip=209.85.216.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--almasrymina.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="LuVENKno" Received: by mail-pj1-f73.google.com with SMTP id 98e67ed59e1d1-31220ecc586so1664005a91.2 for ; Thu, 12 Jun 2025 21:28:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1749788903; x=1750393703; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=OMs4el2zdME0U5Bh0u38RmmxtHkZW7DUfeo5MQZot3o=; b=LuVENKnonGHeos7U0m4y+eucCFMWSlYbACDFv35ANzZnhpoLQhFOWnqKD2geeJXeab Tg+FezyNbOpncNO9xWFFWPab65YbdKvL3VN47FNthJv5aHIqn7OU7LMkr1n7fbg/R00H K4lxAD/DmDXbZPhIj4Oj5C3dPof+XqhW8wTHmUH0R6KRPi8N/MoiQ7A/75WSQEyLH7TS 6ASem8JTYuXlFKj05WIvqg1fxrhzKiCFZbzqel8KFiKFSDBrMG/5oQ5T3HxrWrWkD8J8 kPoTM4KAHrEt5pAhYJauIMln3H8rhlEzNfV4Ca6mLqs4zCt/mb2yofmIYC6Uf8fyAer+ tBtw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1749788903; x=1750393703; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=OMs4el2zdME0U5Bh0u38RmmxtHkZW7DUfeo5MQZot3o=; b=PerrGrlAkyRIJzvdrMYOP9ISHLplsyY58AgBfCNx6PCHF42n7ZJsLr7r+XuCm8rtPC DRXsxznljU4Z3dSZ36SQBHF8NGGZ79hBXO0tS3+XHkt66AoIEnySarlJjUUBshxEJnR3 D7zUZXlPQb0B8e14g0sBSN9s1gpEUP7e6AY26MOq65GJKlphcg1svBJTgNfsjpzV4dJw qEkF2aOp7xAwGsgC46GqEuP/QjfRO4rE2CHUhvg2ZjWS03AAjp9EyORbcyUlt8iB7Vb2 JZ1L69RohrYT5bSTaB0fvuZ17CPrYzipHg7vTJOw0SexFKyWLxJAk1j4mNDqKjpa/T9I WGWw== X-Forwarded-Encrypted: i=1; AJvYcCXr9VOlcetIbUaU0DzpCDgY41Q9Bg0eR8ajXkzbNbPTAOa30MH69JY5Syd8n8rf8mrE6CdnpO59RNBVP+CfbyI=@vger.kernel.org X-Gm-Message-State: AOJu0Yyr5LriA70f0LcHlRNlyABRM8HBJI6K7kQ/stRRN4I/BhLlhBF9 q9L5D0/ee/xEtAuJHidhz9z+o3GZ19eB24KqUDbY/jBlxWXC6+EZZUseUpt3URJHbwN/c94hM8Y EXUPa021czWVbqPrL2jB4EVAGIA== X-Google-Smtp-Source: AGHT+IEokZ+VFPB53+gBJoGAUqzmEK3QBv1KmzWNzDUXYog11k26C5cCePG3sYOEDR3ejCqBCKhLhSef9kk2MmSKqQ== X-Received: from pjbta16.prod.google.com ([2002:a17:90b:4ed0:b0:30e:6bb2:6855]) (user=almasrymina job=prod-delivery.src-stubby-dispatcher) by 2002:a17:90b:17c4:b0:311:ffe8:20ee with SMTP id 98e67ed59e1d1-313d9c306aamr2594977a91.11.1749788902651; Thu, 12 Jun 2025 21:28:22 -0700 (PDT) Date: Fri, 13 Jun 2025 04:28:01 +0000 Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-Mailer: git-send-email 2.50.0.rc1.591.g9c95f17f64-goog Message-ID: <20250613042804.3259045-1-almasrymina@google.com> Subject: [PATCH net-next v1 1/4] net: netmem: fix skb_ensure_writable with unreadable skbs From: Mina Almasry To: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Cc: Mina Almasry , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Andrew Lunn , Shuah Khan skb_ensure_writable actually makes sure that the header of the skb is writable, and doesn't touch the payload. It doesn't need an skb_frags_readable check. Removing this check restores DSCP functionality with unreadable skbs as it's called from dscp_tg. Fixes: 65249feb6b3d ("net: add support for skbs with unreadable frags") Signed-off-by: Mina Almasry --- net/core/skbuff.c | 3 --- 1 file changed, 3 deletions(-) base-commit: 6d4e01d29d87356924f1521ca6df7a364e948f13 diff --git a/net/core/skbuff.c b/net/core/skbuff.c index 85fc82f72d26..d6420b74ea9c 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c @@ -6261,9 +6261,6 @@ int skb_ensure_writable(struct sk_buff *skb, unsigned int write_len) if (!pskb_may_pull(skb, write_len)) return -ENOMEM; - if (!skb_frags_readable(skb)) - return -EFAULT; - if (!skb_cloned(skb) || skb_clone_writable(skb, write_len)) return 0;