[{"id":3679372,"web_url":"http://patchwork.ozlabs.org/comment/3679372/","msgid":"<c706a726c2e82dfc6162f96d7c04313301c24d1a4e36af5c421fda7a1c01b1a1@mail.kernel.org>","list_archive_url":null,"date":"2026-04-20T11:36:15","subject":"Re: [PATCH bpf-next v4 3/6] bpf: add bpf_icmp_send_unreach kfunc","submitter":{"id":91980,"url":"http://patchwork.ozlabs.org/api/people/91980/","name":null,"email":"bot+bpf-ci@kernel.org"},"content":"> diff --git a/net/core/filter.c b/net/core/filter.c\n> --- a/net/core/filter.c\n> +++ b/net/core/filter.c\n\n[ ... ]\n\n> @@ -12423,6 +12427,86 @@\n>  \treturn 0;\n>  }\n>\n> +static DEFINE_PER_CPU(bool, bpf_icmp_send_in_progress);\n> +\n> +/**\n> + * bpf_icmp_send_unreach - Send ICMP destination unreachable error\n> + * @skb: Packet that triggered the error\n> + * @code: ICMP unreachable code (0-15 for IPv4, 0-6 for IPv6)\n> + *\n> + * Sends an ICMP destination unreachable message in response to the\n> + * packet. The original packet is cloned before sending the ICMP error,\n> + * so the BPF program can still let the packet pass if desired.\n> + *\n> + * Recursion protection: If called from a context that would trigger\n> + * recursion (e.g., root cgroup processing its own ICMP packets),\n> + * returns -EBUSY on re-entry.\n> + *\n> + * Return: 0 on success, negative error code on failure:\n> + *         -EINVAL: Invalid code parameter\n> + *         -ENOMEM: Memory allocation failed\n> + *         -EHOSTUNREACH: Routing lookup failed\n> + *         -EBUSY: Recursion detected\n> + *         -EPROTONOSUPPORT: Non-IP protocol\n> + */\n> +__bpf_kfunc int bpf_icmp_send_unreach(struct __sk_buff *__skb, int code)\n> +{\n> +\tstruct sk_buff *skb = (struct sk_buff *)__skb;\n> +\tstruct sk_buff *nskb;\n> +\tbool *in_progress;\n> +\n> +\tin_progress = this_cpu_ptr(&bpf_icmp_send_in_progress);\n> +\tif (*in_progress)\n> +\t\treturn -EBUSY;\n> +\n> +\tswitch (skb->protocol) {\n> +#if IS_ENABLED(CONFIG_INET)\n> +\tcase htons(ETH_P_IP):\n> +\t\tif (code < 0 || code > NR_ICMP_UNREACH)\n> +\t\t\treturn -EINVAL;\n> +\n> +\t\tnskb = skb_clone(skb, GFP_ATOMIC);\n> +\t\tif (!nskb)\n> +\t\t\treturn -ENOMEM;\n> +\n> +\t\tif (!skb_dst(nskb) && ip_route_reply_fetch_dst(nskb) < 0) {\n> +\t\t\tkfree_skb(nskb);\n> +\t\t\treturn -EHOSTUNREACH;\n> +\t\t}\n> +\n> +\t\t*in_progress = true;\n> +\t\ticmp_send(nskb, ICMP_DEST_UNREACH, code, 0);\n> +\t\t*in_progress = false;\n> +\t\tkfree_skb(nskb);\n> +\t\tbreak;\n> +#endif\n> +#if IS_ENABLED(CONFIG_IPV6)\n> +\tcase htons(ETH_P_IPV6):\n> +\t\tif (code < 0 || code > ICMPV6_REJECT_ROUTE)\n> +\t\t\treturn -EINVAL;\n> +\n> +\t\tnskb = skb_clone(skb, GFP_ATOMIC);\n> +\t\tif (!nskb)\n> +\t\t\treturn -ENOMEM;\n> +\n> +\t\tif (!skb_dst(nskb) && ip6_route_reply_fetch_dst(nskb) < 0) {\n> +\t\t\tkfree_skb(nskb);\n> +\t\t\treturn -EHOSTUNREACH;\n> +\t\t}\n\nIs the route lookup needed here? Looking at icmpv6_send() in\nnet/ipv6/icmp.c, it fills fl6.{daddr,saddr} and passes them to\nicmpv6_route_lookup() which performs its own route lookup. The function\ndoesn't appear to use skb_dst() from the original skb:\n\nicmpv6_send() {\n    ...\n    fl6.daddr = hdr->saddr;\n    fl6.saddr = saddr;\n    ...\n    dst = icmpv6_route_lookup(net, skb, sk, &fl6);\n    ...\n}\n\nThe same applies to the IPv4 path with icmp_send(). Additionally, at\ncgroup/egress the skb->_skb_refdst should already be set, and the same\nshould be true for cgroup/ingress for inet proto.\n\nDoes the kfunc work without ip_route_reply_fetch_dst() and\nip6_route_reply_fetch_dst()? If so, can these calls be removed?\n\nReference: Martin KaFai Lau's comment in v3 review\nhttps://lore.kernel.org/bpf/df4b0996-3e88-4ea4-983b-82866455a6fc@linux.dev/\n\n> +\n> +\t\t*in_progress = true;\n> +\t\ticmpv6_send(nskb, ICMPV6_DEST_UNREACH, code, 0);\n> +\t\t*in_progress = false;\n> +\t\tkfree_skb(nskb);\n> +\t\tbreak;\n> +#endif\n> +\tdefault:\n> +\t\treturn -EPROTONOSUPPORT;\n> +\t}\n> +\n> +\treturn 0;\n> +}\n\n[ ... ]\n\n\n---\nAI reviewed your patch. Please fix the bug or email reply why it's not a bug.\nSee: https://github.com/kernel-patches/vmtest/blob/master/ci/claude/README.md\n\nCI run summary: https://github.com/kernel-patches/bpf/actions/runs/24663313503","headers":{"Return-Path":"\n <netfilter-devel+bounces-12048-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=YVAiU11r;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12048-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"YVAiU11r\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzk3R4wJKz1yD4\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 21:36:51 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id BC39D3039F7A\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 11:36:18 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id BF45B39DBF4;\n\tMon, 20 Apr 2026 11:36:16 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 2A7E939DBC0;\n\tMon, 20 Apr 2026 11:36:16 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 8EC08C19425;\n\tMon, 20 Apr 2026 11:36:15 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776684976; cv=none;\n b=I9e6s48jtrS6nosKmQpl+ovklJTLfBZut+xd0bj5+yZQAvUzrM5pr6Nps+q9ix50908FLmOue5loLuVHZ5XDSj2OqdDsO14CpgKF1sGMuuUxWmLxI9dX9KaZkPS7VonqIRO+ShQ4ruMcbfbdYjGcmZoUmdiXm+h2epdzBA5JS+Q=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776684976; c=relaxed/simple;\n\tbh=CzC1f2IdcUuuIRupN0t9FEAu5CFDldqNWyqEI6A/ZuU=;\n\th=Content-Type:MIME-Version:Message-Id:In-Reply-To:References:\n\t Subject:From:To:Cc:Date;\n b=K2YKs9MX3lkVSbMY/NFiDTZfFGwBJuKF1/iZRvR2tQiJnnrqf3tfE/Q8YW9qwY1cBe6Kb6ql66YXDoC1WlX/n9Au0tQeStS1nm0Q8gD8Mt9+E3VmsqstkS1pgJK8wLqfkmqTv1saTgHvUMnM+mfKEmHd5BYPRibJVEc2BeMmKmE=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=YVAiU11r; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1776684976;\n\tbh=CzC1f2IdcUuuIRupN0t9FEAu5CFDldqNWyqEI6A/ZuU=;\n\th=In-Reply-To:References:Subject:From:To:Cc:Date:From;\n\tb=YVAiU11rMyQq0Omv4kN/avyNS7ihuTSIhEqP94Ip9HSTQ8NBTtrKA5B+HCeiQLWaf\n\t iJJhWOApYot7gcu/UCUluSce1Grvu0fkLRZoUswHhJdT5zzto8HfTgX0SaauH6fzYM\n\t lPcCeWzaHYfnZE3D1GYiRg06bbllSIxvYtXNjDDLaeT2mfaIS3eEhwzKtaDayddGyY\n\t vDgeLx6gaJqnrdQqbhTeunfFtsjvGmXkaOwzQmi/eIdd9DdunRmzJMRvS4uAV/RzWr\n\t jGiS+ao55shSq8vH5+8PNktGm0yl/k/f8zk1i+2y4MJAVKaR7zQzLMY+KN1BZe+SsO\n\t 18bsManvcxLvA==","Content-Type":"multipart/mixed; boundary=\"===============7598404052493046523==\"","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Message-Id":"\n <c706a726c2e82dfc6162f96d7c04313301c24d1a4e36af5c421fda7a1c01b1a1@mail.kernel.org>","In-Reply-To":"<20260420105816.72168-4-mahe.tardy@gmail.com>","References":"<20260420105816.72168-4-mahe.tardy@gmail.com>","Subject":"Re: [PATCH bpf-next v4 3/6] bpf: add bpf_icmp_send_unreach kfunc","From":"bot+bpf-ci@kernel.org","To":"mahe.tardy@gmail.com,mahe.tardy@gmail.com","Cc":"\n alexei.starovoitov@gmail.com,andrii@kernel.org,ast@kernel.org,bpf@vger.kernel.org,coreteam@netfilter.org,daniel@iogearbox.net,fw@strlen.de,john.fastabend@gmail.com,lkp@intel.com,martin.lau@linux.dev,netdev@vger.kernel.org,netfilter-devel@vger.kernel.org,oe-kbuild-all@lists.linux.dev,pablo@netfilter.org,ast@kernel.org,andrii@kernel.org,daniel@iogearbox.net,martin.lau@kernel.org,eddyz87@gmail.com,yonghong.song@linux.dev,clm@meta.com,ihor.solodrai@linux.dev","Date":"Mon, 20 Apr 2026 11:36:15 +0000 (UTC)"}},{"id":3679401,"web_url":"http://patchwork.ozlabs.org/comment/3679401/","msgid":"<aeYlCswvGdTHiAFp@gmail.com>","list_archive_url":null,"date":"2026-04-20T13:07:22","subject":"Re: [PATCH bpf-next v4 3/6] bpf: add bpf_icmp_send_unreach kfunc","submitter":{"id":91349,"url":"http://patchwork.ozlabs.org/api/people/91349/","name":"Mahe Tardy","email":"mahe.tardy@gmail.com"},"content":"On Mon, Apr 20, 2026 at 11:36:15AM +0000, bot+bpf-ci@kernel.org wrote:\n> > diff --git a/net/core/filter.c b/net/core/filter.c\n> > --- a/net/core/filter.c\n> > +++ b/net/core/filter.c\n> \n> [ ... ]\n> \n> > +#if IS_ENABLED(CONFIG_IPV6)\n> > +\tcase htons(ETH_P_IPV6):\n> > +\t\tif (code < 0 || code > ICMPV6_REJECT_ROUTE)\n> > +\t\t\treturn -EINVAL;\n> > +\n> > +\t\tnskb = skb_clone(skb, GFP_ATOMIC);\n> > +\t\tif (!nskb)\n> > +\t\t\treturn -ENOMEM;\n> > +\n> > +\t\tif (!skb_dst(nskb) && ip6_route_reply_fetch_dst(nskb) < 0) {\n> > +\t\t\tkfree_skb(nskb);\n> > +\t\t\treturn -EHOSTUNREACH;\n> > +\t\t}\n> \n> Is the route lookup needed here? Looking at icmpv6_send() in\n> net/ipv6/icmp.c, it fills fl6.{daddr,saddr} and passes them to\n> icmpv6_route_lookup() which performs its own route lookup. The function\n> doesn't appear to use skb_dst() from the original skb:\n> \n> icmpv6_send() {\n>     ...\n>     fl6.daddr = hdr->saddr;\n>     fl6.saddr = saddr;\n>     ...\n>     dst = icmpv6_route_lookup(net, skb, sk, &fl6);\n>     ...\n> }\n> \n> The same applies to the IPv4 path with icmp_send(). Additionally, at\n> cgroup/egress the skb->_skb_refdst should already be set, and the same\n> should be true for cgroup/ingress for inet proto.\n> \n> Does the kfunc work without ip_route_reply_fetch_dst() and\n> ip6_route_reply_fetch_dst()? If so, can these calls be removed?\n> \n> Reference: Martin KaFai Lau's comment in v3 review\n> https://lore.kernel.org/bpf/df4b0996-3e88-4ea4-983b-82866455a6fc@linux.dev/\n\nSame reply as https://lore.kernel.org/bpf/aeYkdKm7B4NQ3BDo@gmail.com/,\ntoo bad the LLM can't access the cover letter.\n\n> \n> > +\n> > +\t\t*in_progress = true;\n> > +\t\ticmpv6_send(nskb, ICMPV6_DEST_UNREACH, code, 0);\n> > +\t\t*in_progress = false;\n> > +\t\tkfree_skb(nskb);\n> > +\t\tbreak;\n> > +#endif\n> > +\tdefault:\n> > +\t\treturn -EPROTONOSUPPORT;\n> > +\t}\n> > +\n> > +\treturn 0;\n> > +}\n> \n> [ ... ]\n> \n> \n> ---\n> AI reviewed your patch. Please fix the bug or email reply why it's not a bug.\n> See: https://github.com/kernel-patches/vmtest/blob/master/ci/claude/README.md\n> \n> CI run summary: https://github.com/kernel-patches/bpf/actions/runs/24663313503","headers":{"Return-Path":"\n <netfilter-devel+bounces-12050-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=ZmsK9UBN;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12050-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=\"ZmsK9UBN\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=209.85.221.41","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=gmail.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzmD52ZlQz1yD4\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 23:14:29 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 616FF30B5F40\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 13:07:34 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id B47A33A169B;\n\tMon, 20 Apr 2026 13:07:31 +0000 (UTC)","from mail-wr1-f41.google.com (mail-wr1-f41.google.com\n [209.85.221.41])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 625B43A1681\n\tfor <netfilter-devel@vger.kernel.org>; Mon, 20 Apr 2026 13:07:27 +0000 (UTC)","by mail-wr1-f41.google.com with SMTP id\n ffacd0b85a97d-43d7badbd7dso1405172f8f.2\n        for <netfilter-devel@vger.kernel.org>;\n Mon, 20 Apr 2026 06:07:27 -0700 (PDT)","from gmail.com (deskosmtp.auranext.com. [195.134.167.217])\n        by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43fe4e4d525sm28070324f8f.31.2026.04.20.06.07.24\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Mon, 20 Apr 2026 06:07:24 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776690450; cv=none;\n b=Xy2yu+y7CfsYVC57uMDmIPhHsyfxK973Cy+AdjbecuL2+4BNIIQlMbWqHtwskgDhxsl6Y0mKOS9FC3RNR45O3WgBALKC8AFocbgz6gLAzcvls+qop0G23++V+g8Bz2sZrtx+YzQGdKS1b4+5bRHtAslmKJUBtZz+r1Y6GbjbgyM=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776690450; c=relaxed/simple;\n\tbh=JLX0QIE+ZaB7zS+4hzCYPPCnUIvUgu+mL5VLldlw4/E=;\n\th=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:\n\t Content-Type:Content-Disposition:In-Reply-To;\n b=XYG8lQ+MbNgMRG+h6IXtrtBNstrKWk8kLCGSSkWnXQT4Vwvw83JUzi9JMGyKd+JUrf6nRAH8H2IbKnF+vTYmuZQJ3mOreHKTgqrHPm+HKOaaSd2UGfJJZRDb87ukqFPL5leWPdrlJ+1si6OxMhGuBn3ysn7aZNGDwcXDcQhc/QM=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com;\n spf=pass smtp.mailfrom=gmail.com;\n dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=ZmsK9UBN; arc=none smtp.client-ip=209.85.221.41","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1776690445; x=1777295245;\n darn=vger.kernel.org;\n        h=in-reply-to:content-disposition:mime-version:references:message-id\n         :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to;\n        bh=/Ag56mmJk7Zmpm+f5Y09lyaEBE2YSArv7z93rWOQIdM=;\n        b=ZmsK9UBNEhonMgwHlY7RquBbKesfSJLglYPS0BN5a/HFrZzYxe+8PuUh4/t3/GwDeG\n         U2qXfV2DGAdQ5k+/6c6Cybp+rK8OKQWgXh5BjCPE2zIJ5JvEaIkXBjnovWB07due+OX6\n         NQLsFmQeK3JRKi1Ok6+GqM5H+45fahWB82mdzIEliC2MwqpOzttmvim3XoG7yuzvsc4o\n         WKCR28PLeNN0Jwvh/wW/L0/x9jY3C3bOFmhToRREM1MP0hoE0GMO1uGjH2E7RGmLn87T\n         H2SbmU7TH30b1nFfPyu/IgVr2MD32U7aycsE8+aMVCUDxgfiIY9FCWyiWIDzAh+XmG3N\n         iowg==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776690445; x=1777295245;\n        h=in-reply-to:content-disposition:mime-version:references:message-id\n         :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc\n         :subject:date:message-id:reply-to;\n        bh=/Ag56mmJk7Zmpm+f5Y09lyaEBE2YSArv7z93rWOQIdM=;\n        b=gUICqXyaOvIKt5bpJ89Zu86+Jn6TGmfllU0R5VhbNIBvmSOUfzNwr3Msm2rqpk7lAN\n         u1j8aCyoUrZWs0ZI4fKSk3hexFVpmyH+VTs1l4ZqwQgl4zoC4RsOM5k25f2tbXfpf5ov\n         S1xzSmr7J1Z1KcE3oZU83uX//fdR2UvMHk/JkXmnUpt2WqvdSG7KKpnY6oAmhlTIluVT\n         fMTG7Ll6GHRKTOht+HAOs2CXiD/BGpcHDy+1Y2Z8Atue0y/OL5cjW6FuTMyPPYrJYJaX\n         bwmu3d0lQeWd3I2dfoJtt99jt5oB/SMwIQ6jNnSEZ1rOyRCQe8s/KSJbXkf4W0kbydpn\n         V1Vg==","X-Forwarded-Encrypted":"i=1;\n AFNElJ85k+xRjeVyrHLjzr63NF17yg3Vm13thcsBD/h0bjDqIV3tFrZfU+AHSONlQPSYORVulPFOMKT7ajh1nYLIKkk=@vger.kernel.org","X-Gm-Message-State":"AOJu0Yy6UCXm6e1oi7KEj2/5cgqIuRZMyj6iVFSGIQfiRuzcQS+r7NfY\n\teu9B9Blz2n8dYpkIIx6A0NdrB4hMibr0HiZGinZBZGCl11SJDtL9r25w","X-Gm-Gg":"AeBDieuB1KkABJh12EL8Ad5HHV2HK9ySYuda1fT50Huri1Z0X5jXWJb1oTY6nyVIsHy\n\tpC27drGHG2XwyO0z+RpiBS7o8E5nx4jx52vNkq2qFFAXGb+I23Zds2zeim8+zV1+rzPnD90wHys\n\tIgBC6gjp9if5s7vXiVauApxym0m5QZjsBU2kERTzX63vY4/6lYNxfpUkSMeix1lnWtr9EZ+RWU7\n\tLf0g57+VmF2hMJxYOW6MLfaz5g4VCdIUSG/kZXiVDHDX/ZbH2UaHMPWtxJzHGCx6lXCM5tiAj+M\n\tMeiVdTh8vTs1vGLa858wXt//gQOtXtCJsf9JMKg/5dw7p+HRDSGQkmFVA2yw9rFSNVjP6rtJtdu\n\tKnrqU0Xo5Mh8vA3C0tm5dtfhkk3wzHFjlFR9PDqaZIKMpbtNqDZRZ4mi9NSYm+1muA8AH8epAA9\n\t5lVK4/6q1WBPM2TnAKLgbcXSwoqvKJwSY4uo2KkLxW+zFge4MF8TvKHBRFp2mgqI0pCw==","X-Received":"by 2002:a05:6000:4203:b0:43d:242:b9bb with SMTP id\n ffacd0b85a97d-43fe3dc5c80mr20542019f8f.18.1776690445002;\n        Mon, 20 Apr 2026 06:07:25 -0700 (PDT)","Date":"Mon, 20 Apr 2026 15:07:22 +0200","From":"Mahe Tardy <mahe.tardy@gmail.com>","To":"bot+bpf-ci@kernel.org","Cc":"alexei.starovoitov@gmail.com, andrii@kernel.org, ast@kernel.org,\n\tbpf@vger.kernel.org, coreteam@netfilter.org, daniel@iogearbox.net,\n\tfw@strlen.de, john.fastabend@gmail.com, lkp@intel.com,\n\tmartin.lau@linux.dev, netdev@vger.kernel.org,\n\tnetfilter-devel@vger.kernel.org, oe-kbuild-all@lists.linux.dev,\n\tpablo@netfilter.org, martin.lau@kernel.org, eddyz87@gmail.com,\n\tyonghong.song@linux.dev, clm@meta.com, ihor.solodrai@linux.dev","Subject":"Re: [PATCH bpf-next v4 3/6] bpf: add bpf_icmp_send_unreach kfunc","Message-ID":"<aeYlCswvGdTHiAFp@gmail.com>","References":"<20260420105816.72168-4-mahe.tardy@gmail.com>\n <c706a726c2e82dfc6162f96d7c04313301c24d1a4e36af5c421fda7a1c01b1a1@mail.kernel.org>","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","In-Reply-To":"\n <c706a726c2e82dfc6162f96d7c04313301c24d1a4e36af5c421fda7a1c01b1a1@mail.kernel.org>"}}]