[{"id":3690985,"web_url":"http://patchwork.ozlabs.org/comment/3690985/","msgid":"<20260513162925.4072-1-linuxtestproject.agent@gmail.com>","list_archive_url":null,"date":"2026-05-13T16:29:25","subject":"Re: [LTP] sockets/xfrm02: Add ESP-in-TCP page cache corruption test","submitter":{"id":93132,"url":"http://patchwork.ozlabs.org/api/people/93132/","name":null,"email":"linuxtestproject.agent@gmail.com"},"content":"Hi Andrea,\n\nOn Wed, 13 May 2026 17:35:03 +0200, Andrea Cervesato wrote:\n> sockets/xfrm02: Add ESP-in-TCP page cache corruption test\n\n> +\t\tSAFE_POSIX_FADVISE(cli_fd, 0, 0, POSIX_FADV_DONTNEED);\n\nposix_fadvise(2) is only valid for regular files; on a socket fd it\nreturns ESPIPE, causing SAFE_POSIX_FADVISE to call tst_brk(TBROK) in\nthe child and the test never actually exercises the corruption path.\nReplace with SAFE_POSIX_FADVISE(file_fd, 0, DATA_SIZE, POSIX_FADV_DONTNEED).\n\n> +\t/* Let the espintcp strparser process buffered ESP data */\n> +\tusleep(30000);\n\nSleep-based synchronization is not allowed (G2). Use poll() on acc_fd\nwaiting for POLLIN to detect when the strparser has consumed the data.\n\n> +\tacc_fd = SAFE_ACCEPT(srv_fd, NULL, NULL);\n> +\tSAFE_CLOSE(srv_fd);\n\nsrv_fd is not reset to -1 after close here; cleanup() will find\nsrv_fd != -1 and attempt a double-close, hitting TBROK on every run.\nAdd `srv_fd = -1;` after SAFE_CLOSE(srv_fd).\n\n> +cve-2026-fragnesia xfrm02\n\nPlease confirm whether the fix for this CVE is in kernel 7.1 (current\nstable). If not, this belongs in runtest/staging with a [STAGING]\nprefix in the commit subject.\n\n---\nNote:\n\nOur agent completed the review of the patch. The full review can be\nfound at: https://github.com/linux-test-project/ltp-agent/actions/runs/25811801064\n\nThe agent can sometimes produce false positives although often its\nfindings are genuine. If you find issues with the review, please\ncomment this email or ignore the suggestions.\n\nRegards,\nLTP AI Reviewer","headers":{"Return-Path":"<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>","X-Original-To":["incoming@patchwork.ozlabs.org","ltp@lists.linux.it"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ltp@picard.linux.it"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=RUPdKLOn;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=213.254.12.146; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)"],"Received":["from picard.linux.it (picard.linux.it [213.254.12.146])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gFzSf441zz1yKH\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 14 May 2026 02:29:38 +1000 (AEST)","from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id 18E583C2441\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 13 May 2026 18:29:36 +0200 (CEST)","from in-4.smtp.seeweb.it (in-4.smtp.seeweb.it\n [IPv6:2001:4b78:1:20::4])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id DE7693C0D0D\n for <ltp@lists.linux.it>; Wed, 13 May 2026 18:29:32 +0200 (CEST)","from mail-qk1-x742.google.com (mail-qk1-x742.google.com\n [IPv6:2607:f8b0:4864:20::742])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-4.smtp.seeweb.it (Postfix) with ESMTPS id 527231000985\n for <ltp@lists.linux.it>; Wed, 13 May 2026 18:29:32 +0200 (CEST)","by mail-qk1-x742.google.com with SMTP id\n af79cd13be357-902deb2412fso766505585a.3\n for <ltp@lists.linux.it>; Wed, 13 May 2026 09:29:32 -0700 (PDT)","from\n runnervmeorf1.lca4z4pwcdgebph4hp2vtpj1rd.bx.internal.cloudapp.net\n ([20.163.133.232]) by smtp.gmail.com with ESMTPSA id\n 6a1803df08f44-8b53ca982a1sm411305066d6.38.2026.05.13.09.29.26\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 13 May 2026 09:29:26 -0700 (PDT)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1778689771; x=1779294571; darn=lists.linux.it;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=rmdgDDTo8FRMZ+x8J1P6zCWcQksdUGn+UM47C+z8AtM=;\n b=RUPdKLOnB+NIxFbiD7+Q553vrmomswE7FJ1K/3e1zGMUycEvs+8cewe8VsaHpL0Z+M\n TYGU49RtkQoZsJPlJcvbZf61V/cxmYMGSk5IuGBBDDsZV7f1GPxLzDB60DTeWtP0VcKo\n 24nEi8EiMDky8dIML0+pMTtWYR/RzdqDOTfDUgmRaUnkJO0GCfrBTg5+bpbLRFyWOybM\n VJjYxukpsUKGpHCy74DivhDu87AEcwlGdgqIJWQy6bBGCwBfO5hOym3auBKFCUb63A9h\n MJMcKHZ9c5jAGrpBGWZVsj3SIRV88hbZjoTADc8dMCOpPCa7upYHF9Ax0nXy7JNSzdtQ\n dU5g==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1778689771; x=1779294571;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=rmdgDDTo8FRMZ+x8J1P6zCWcQksdUGn+UM47C+z8AtM=;\n b=gRwfjhre9qSVk1nVrX52mLQTqGzPmjkJqUKooIneVhmvFdjpTDr1fg4HT7KnDoCLdh\n SeoXwGFFOkR6hRw9qXfbctNuq2K82fM5PFDf+pRUsh+vxnI6q56yONulj1D7SylRK57I\n /Las7RslZjc3yEyuPiGKZOjqKFtZe5dNSkmXCOT09AuD190ZEZMvFaPNsOqki26oxlax\n 8ONBEfdpULvssuRhs1s1JmVwitj1b1pB+NbsEStWx2PDnKESY5LWBpOJ8zGXj00iu/aH\n LEV1DJ7UPVZ4DPuo8mHAO69GaR8EOQvIaTBKVvaDI5laKVCDvrBP7WyroyMu92H56Pji\n 4yeA==","X-Gm-Message-State":"AOJu0YxLgQ6061Y9qtgUs3Q2MOSo26yAn5MdJHcON8KzXNTje/TTrz6P\n AQXTFqI+sAuj64D8+xHwpfQulIwsis0niFiFnlPvkELLU8eNdJDtYe7D","X-Gm-Gg":"Acq92OG7qDACwPhEGEY5HXZID/EpdW5UOr+xIwtRtzFjcbUMdDYzwiBQ1MWx/SRHHrP\n clui6lqvwf0hiHvQh4CN6CHgl3LvLPafDQmf22WhrgMjNIShiVxueXK46JNcj2PGIiQrb5KktTq\n 9Qtb/OvTnTHpYJ2uBmEfEMFAHK5aV4QOn3WLZu4enMNRUfRScwSSgc/Qo7sBQmNNlKZQ1yzaani\n L2w6JFfeBCrki11P7aU2hjuLC+esU7UQSqttLDmYdBn5dS3e9QHeux2q++pE+6dHkocqKhkG0iJ\n GxpD9JWBp9zl9+hJxhnGhDjzL+C/dWw3Hm99KnWaFVg8iGbzr087QxHjDaYUIE4za+4Byc2GWNu\n i2TpZOb27nCcvp+SymSoUW3A23Oh9ORCLjwcrT31nth116ASIixJrnLImadGHFOxCF8h5SP2ruz\n DyNj1S48yHEEUzHGcj+xP39SbbguxVaEYg0/isF4IaaTGDEQpIHAjo+VAzLRm7+B+olX0mmoYo4\n BNCsVxYad/vWTvXE+K/3P31s902P9P1ucr7Ze0riIom394Sfls=","X-Received":"by 2002:a05:620a:469e:b0:90f:5da3:950e with SMTP id\n af79cd13be357-90f888c31a9mr675881685a.9.1778689766341;\n Wed, 13 May 2026 09:29:26 -0700 (PDT)","From":"linuxtestproject.agent@gmail.com","To":"Andrea Cervesato <andrea.cervesato@suse.de>","Date":"Wed, 13 May 2026 16:29:25 +0000","Message-ID":"<20260513162925.4072-1-linuxtestproject.agent@gmail.com>","X-Mailer":"git-send-email 2.54.0","In-Reply-To":"<20260513-fragnesia-v2-1-07a822c66cbd@suse.com>","References":"<20260513-fragnesia-v2-1-07a822c66cbd@suse.com>","MIME-Version":"1.0","X-Spam-Status":"No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,SPF_HELO_NONE,SPF_PASS\n shortcircuit=no autolearn=disabled version=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on in-4.smtp.seeweb.it","X-Virus-Scanned":"clamav-milter 1.0.9 at in-4.smtp.seeweb.it","X-Virus-Status":"Clean","Subject":"Re: [LTP] sockets/xfrm02: Add ESP-in-TCP page cache corruption test","X-BeenThere":"ltp@lists.linux.it","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"Linux Test Project <ltp.lists.linux.it>","List-Unsubscribe":"<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>","List-Archive":"<http://lists.linux.it/pipermail/ltp/>","List-Post":"<mailto:ltp@lists.linux.it>","List-Help":"<mailto:ltp-request@lists.linux.it?subject=help>","List-Subscribe":"<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>","Cc":"ltp@lists.linux.it","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it","Sender":"\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"}},{"id":3690989,"web_url":"http://patchwork.ozlabs.org/comment/3690989/","msgid":"<9d5866a3-dba3-47b6-8cd2-146305eafbb0@suse.cz>","list_archive_url":null,"date":"2026-05-13T16:35:19","subject":"Re: [LTP] [PATCH v2] sockets/xfrm02: Add ESP-in-TCP page cache\n corruption test","submitter":{"id":77472,"url":"http://patchwork.ozlabs.org/api/people/77472/","name":"Martin Doucha","email":"mdoucha@suse.cz"},"content":"Hi,\ntwo minor fixes that can be done during merge:\n- The bug has a CVE now: CVE-2026-46300\n- One issue below.\n\nTested on kernels v5.14 and v6.12.\n\nReviewed-by: Martin Doucha <mdoucha@suse.cz>\n\nOn 5/13/26 17:35, Andrea Cervesato wrote:\n> From: Andrea Cervesato <andrea.cervesato@suse.com>\n> \n> Verify that ESP-in-TCP (espintcp) does not corrupt the page cache when\n> file data is spliced into a TCP socket. When MSG_SPLICE_PAGES references\n> page cache pages directly in the skb and the receiving socket has\n> espintcp ULP enabled, the kernel's ESP handler may decrypt the payload\n> in-place on those pages, corrupting the cached file contents.\n> \n> The test sets up an ESP-in-TCP xfrm state on IPv6 loopback, writes\n> known data to a file, creates a TCP connection where the receiver\n> enables espintcp ULP, splices the file data into the TCP socket as\n> part of a crafted ESP-in-TCP frame, and then verifies whether the\n> page cache was corrupted.\n> \n> Reproducer based on:\n> https://github.com/v12-security/pocs/tree/main/fragnesia\n> \n> Signed-off-by: Andrea Cervesato <andrea.cervesato@suse.com>\n> ---\n> Changes in v2:\n> - use tst_cmd()\n> - evict pages before sending prefix\n> - remove checkpoints\n> - add usleep() to trigger the bug\n> - use tst_reap_children()\n> - Link to v1: https://lore.kernel.org/r/20260513-fragnesia-v1-1-80c5b3b09005@suse.com\n> ---\n>   runtest/cve                          |   1 +\n>   testcases/network/sockets/.gitignore |   1 +\n>   testcases/network/sockets/xfrm02.c   | 227 +++++++++++++++++++++++++++++++++++\n>   3 files changed, 229 insertions(+)\n> \n> diff --git a/runtest/cve b/runtest/cve\n> index 530f8751ed3a8e8aa7e9110d89d577df3e8cc6ce..5fe83ec2d1803a5c0f6b4eba05fcf00cc80c8809 100644\n> --- a/runtest/cve\n> +++ b/runtest/cve\n> @@ -95,3 +95,4 @@ cve-2025-38236 cve-2025-38236\n>   cve-2025-21756 cve-2025-21756\n>   cve-2026-31431 af_alg08\n>   cve-2026-43284 xfrm01\n> +cve-2026-fragnesia xfrm02\n> diff --git a/testcases/network/sockets/.gitignore b/testcases/network/sockets/.gitignore\n> index 6f3c0ad84c000f0214f371c6a601afb592b15faa..35bc0462b676b041d9a5b52a37fded973d0157a9 100644\n> --- a/testcases/network/sockets/.gitignore\n> +++ b/testcases/network/sockets/.gitignore\n> @@ -1 +1,2 @@\n>   /xfrm01\n> +/xfrm02\n> diff --git a/testcases/network/sockets/xfrm02.c b/testcases/network/sockets/xfrm02.c\n> new file mode 100644\n> index 0000000000000000000000000000000000000000..d7fe70e3d242227c374b5c9b876c8efeeb0e1f5d\n> --- /dev/null\n> +++ b/testcases/network/sockets/xfrm02.c\n> @@ -0,0 +1,227 @@\n> +// SPDX-License-Identifier: GPL-2.0-or-later\n> +/*\n> + * Copyright (C) 2026 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>\n> + */\n> +\n> +/*\\\n> + * Verify that ESP-in-TCP (espintcp) does not corrupt the page cache\n> + * when file data is spliced into a TCP socket.\n> + *\n> + * When file data is spliced into a TCP socket, the kernel uses\n> + * MSG_SPLICE_PAGES to reference page cache pages directly in the skb.\n> + * If the receiving socket has TCP_ULP \"espintcp\" enabled and a matching\n> + * xfrm SA exists, the kernel's ESP handler decrypts the payload\n> + * in-place on those page cache pages, corrupting the cached file\n> + * contents.\n> + *\n> + * The test sets up an ESP-in-TCP xfrm state on IPv6 loopback, writes\n> + * known data to a file, creates a TCP connection where the receiver\n> + * enables espintcp ULP, splices the file data into the TCP socket as\n> + * part of a crafted ESP-in-TCP frame, and then verifies whether the\n> + * page cache was corrupted.\n> + *\n> + * Reproducer based on:\n> + * https://github.com/v12-security/pocs/tree/main/fragnesia\n> + */\n> +\n> +#define _GNU_SOURCE\n> +\n> +#include \"tst_test.h\"\n> +#include \"tst_net.h\"\n> +#include \"tst_netdevice.h\"\n> +#include \"lapi/tcp.h\"\n> +#include \"lapi/splice.h\"\n> +\n> +#define TESTFILE \"pagecache_test\"\n> +#define DATA_SIZE 4096\n> +\n> +#define SPI 0x100\n> +#define TCP_PORT 5556\n> +#define IV_LEN 8\n> +#define ESP_HDR_SIZE 16\n> +#define AES_KEYLEN 16\n> +#define SALT_LEN 4\n> +#define KEYTOTAL (AES_KEYLEN + SALT_LEN)\n> +\n> +/* ESP-in-TCP frame prefix: 2-byte length + ESP header */\n> +#define PREFIX_SIZE (2 + ESP_HDR_SIZE)\n> +\n> +static const uint8_t aead_key[KEYTOTAL] = {\n> +\t0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,\n> +\t0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,\n> +\t0x01, 0x02, 0x03, 0x04\n> +};\n> +\n> +static uint8_t original[DATA_SIZE];\n> +static int file_fd = -1;\n> +static int srv_fd = -1;\n> +\n> +static void setup(void)\n> +{\n> +\tchar keyhex[KEYTOTAL * 2 + 3];\n> +\tchar spihex[16];\n> +\tchar port_str[8];\n> +\tint i, ret;\n> +\n> +\ttst_setup_netns();\n> +\tNETDEV_SET_STATE(\"lo\", 1);\n> +\n> +\tkeyhex[0] = '0';\n> +\tkeyhex[1] = 'x';\n> +\tfor (i = 0; i < KEYTOTAL; i++)\n> +\t\tsprintf(keyhex + 2 + i * 2, \"%02x\", aead_key[i]);\n> +\n> +\tsnprintf(spihex, sizeof(spihex), \"0x%08x\", SPI);\n> +\tsnprintf(port_str, sizeof(port_str), \"%d\", TCP_PORT);\n> +\n> +\tconst char *const xfrm_cmd[] = {\n> +\t\t\"ip\", \"xfrm\", \"state\", \"add\",\n> +\t\t\"src\", \"::1\", \"dst\", \"::1\",\n> +\t\t\"proto\", \"esp\", \"spi\", spihex,\n> +\t\t\"encap\", \"espintcp\", port_str, port_str, \"::\",\n> +\t\t\"aead\", \"rfc4106(gcm(aes))\", keyhex, \"128\",\n> +\t\t\"mode\", \"transport\",\n> +\t\tNULL\n> +\t};\n> +\n> +\tret = tst_cmd(xfrm_cmd, NULL, NULL, TST_CMD_PASS_RETVAL);\n> +\tif (ret)\n> +\t\ttst_brk(TBROK, \"Failed to install xfrm ESP-in-TCP state\");\n> +\n> +\tfor (i = 0; i < DATA_SIZE; i++)\n> +\t\toriginal[i] = (uint8_t)(i & 0xff);\n> +}\n> +\n> +static void try_corrupt(void)\n> +{\n> +\tstruct sockaddr_in6 addr = {\n> +\t\t.sin6_family = AF_INET6,\n> +\t\t.sin6_addr = IN6ADDR_LOOPBACK_INIT,\n> +\t\t.sin6_port = htons(TCP_PORT),\n> +\t};\n> +\tuint8_t prefix[PREFIX_SIZE];\n> +\tuint16_t frame_len;\n> +\tuint32_t spi_net, seq_net;\n> +\tchar ulp[] = \"espintcp\";\n> +\tint acc_fd;\n> +\tloff_t off;\n> +\n> +\tframe_len = htons(PREFIX_SIZE + DATA_SIZE);\n> +\tmemcpy(prefix, &frame_len, 2);\n> +\n> +\tspi_net = htonl(SPI);\n> +\tmemcpy(prefix + 2, &spi_net, 4);\n> +\n> +\tseq_net = htonl(1);\n> +\tmemcpy(prefix + 6, &seq_net, 4);\n> +\n> +\tmemset(prefix + 10, 0xcc, IV_LEN);\n> +\n> +\tsrv_fd = SAFE_SOCKET(AF_INET6, SOCK_STREAM, 0);\n> +\tSAFE_SETSOCKOPT_INT(srv_fd, SOL_SOCKET, SO_REUSEADDR, 1);\n> +\tSAFE_BIND(srv_fd, (struct sockaddr *)&addr, sizeof(addr));\n> +\tSAFE_LISTEN(srv_fd, 1);\n> +\n> +\tif (!SAFE_FORK()) {\n> +\t\tint cli_fd, pipefd[2];\n> +\n> +\t\tSAFE_CLOSE(srv_fd);\n> +\n> +\t\tcli_fd = SAFE_SOCKET(AF_INET6, SOCK_STREAM, 0);\n> +\t\tSAFE_SETSOCKOPT_INT(cli_fd, IPPROTO_TCP, TCP_NODELAY, 1);\n> +\t\tSAFE_CONNECT(cli_fd, (struct sockaddr *)&addr, sizeof(addr));\n> +\n> +\t\tSAFE_POSIX_FADVISE(cli_fd, 0, 0, POSIX_FADV_DONTNEED);\n> +\n> +\t\tSAFE_SEND(1, cli_fd, prefix, sizeof(prefix), 0);\n> +\t\tSAFE_PIPE(pipefd);\n> +\n> +\t\toff = 0;\n> +\t\tSAFE_SPLICE(file_fd, &off, pipefd[1], NULL, DATA_SIZE, 0);\n> +\n> +\t\t/*\n> +\t\t * Splice pipe into TCP socket. The kernel uses\n> +\t\t * MSG_SPLICE_PAGES to keep page cache references in\n> +\t\t * the skb. On loopback the receiver's ESP handler may\n> +\t\t * decrypt in-place, corrupting the page cache. May\n> +\t\t * fail on patched kernels.\n> +\t\t */\n> +\t\tsplice(pipefd[0], NULL, cli_fd, NULL, DATA_SIZE, 0);\n> +\n> +\t\tSAFE_CLOSE(pipefd[0]);\n> +\t\tSAFE_CLOSE(pipefd[1]);\n> +\t\tSAFE_CLOSE(cli_fd);\n> +\n> +\t\texit(0);\n> +\t}\n> +\n> +\ttst_reap_children();\n> +\n> +\tacc_fd = SAFE_ACCEPT(srv_fd, NULL, NULL);\n> +\tSAFE_CLOSE(srv_fd);\n\ntst_reap_children() should be called here, after accepting the \nconnection and closing the listen socket.\n\n> +\n> +\tSAFE_SETSOCKOPT(acc_fd, IPPROTO_TCP, TCP_ULP, ulp, sizeof(ulp));\n> +\n> +\t/* Let the espintcp strparser process buffered ESP data */\n> +\tusleep(30000);\n> +\n> +\tSAFE_CLOSE(acc_fd);\n> +}\n> +\n> +static void run(void)\n> +{\n> +\tuint8_t readback[DATA_SIZE];\n> +\n> +\tfile_fd = SAFE_OPEN(TESTFILE, O_WRONLY | O_CREAT, 0444);\n> +\tSAFE_WRITE(SAFE_WRITE_ALL, file_fd, original, DATA_SIZE);\n> +\tSAFE_CLOSE(file_fd);\n> +\n> +\tfile_fd = SAFE_OPEN(TESTFILE, O_RDONLY);\n> +\ttry_corrupt();\n> +\tSAFE_CLOSE(file_fd);\n> +\n> +\tfile_fd = SAFE_OPEN(TESTFILE, O_RDONLY);\n> +\tSAFE_READ(1, file_fd, readback, sizeof(readback));\n> +\tSAFE_CLOSE(file_fd);\n> +\n> +\tif (memcmp(readback, original, DATA_SIZE) != 0)\n> +\t\ttst_res(TFAIL, \"Page cache corrupted via xfrm ESP-in-TCP splice\");\n> +\telse\n> +\t\ttst_res(TPASS, \"Page cache was not corrupted\");\n> +\n> +\tSAFE_UNLINK(TESTFILE);\n> +}\n> +\n> +static void cleanup(void)\n> +{\n> +\tif (srv_fd != -1)\n> +\t\tSAFE_CLOSE(srv_fd);\n> +\n> +\tif (file_fd != -1)\n> +\t\tSAFE_CLOSE(file_fd);\n> +}\n> +\n> +static struct tst_test test = {\n> +\t.test_all = run,\n> +\t.setup = setup,\n> +\t.cleanup = cleanup,\n> +\t.needs_tmpdir = 1,\n> +\t.forks_child = 1,\n> +\t.needs_kconfigs = (const char *[]) {\n> +\t\t\"CONFIG_USER_NS=y\",\n> +\t\t\"CONFIG_NET_NS=y\",\n> +\t\t\"CONFIG_XFRM\",\n> +\t\t\"CONFIG_INET6_ESP\",\n> +\t\t\"CONFIG_INET6_ESPINTCP\",\n> +\t\t\"CONFIG_CRYPTO_GCM\",\n> +\t\tNULL\n> +\t},\n> +\t.save_restore = (const struct tst_path_val[]) {\n> +\t\t{\"/proc/sys/user/max_user_namespaces\", \"1024\", TST_SR_SKIP},\n> +\t\t{}\n> +\t},\n> +\t.needs_cmds = (struct tst_cmd[]) {\n> +\t\t{.cmd = \"ip\"},\n> +\t\t{}\n> +\t},\n> +};\n> \n> ---\n> base-commit: e1fc50957c98ae4c27064756e063de0e7136cde3\n> change-id: 20260513-fragnesia-9588d855becf\n> \n> Best regards,","headers":{"Return-Path":"<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>","X-Original-To":["incoming@patchwork.ozlabs.org","ltp@lists.linux.it"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ltp@picard.linux.it"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256\n header.s=susede2_rsa header.b=fHt2ex0E;\n\tdkim=fail reason=\"signature verification failed\" header.d=suse.cz\n header.i=@suse.cz header.a=ed25519-sha256 header.s=susede2_ed25519\n header.b=fvotZUaK;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256 header.s=susede2_rsa\n header.b=fHt2ex0E;\n\tdkim=neutral header.d=suse.cz header.i=@suse.cz header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=fvotZUaK;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=2001:1418:10:5::2; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)","smtp-out1.suse.de;\n\tnone"],"Received":["from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gFzbM3gVfz1y5L\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 14 May 2026 02:35:27 +1000 (AEST)","from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id 1AC9B3C2385\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 13 May 2026 18:35:25 +0200 (CEST)","from in-5.smtp.seeweb.it (in-5.smtp.seeweb.it [217.194.8.5])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id B0E513C0E5D\n for <ltp@lists.linux.it>; Wed, 13 May 2026 18:35:21 +0200 (CEST)","from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-5.smtp.seeweb.it (Postfix) with ESMTPS id D3ED76002C8\n for <ltp@lists.linux.it>; Wed, 13 May 2026 18:35:20 +0200 (CEST)","from imap1.dmz-prg2.suse.org (unknown [10.150.64.97])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-out1.suse.de (Postfix) with ESMTPS id 05F8A5BCD0;\n Wed, 13 May 2026 16:35:20 +0000 (UTC)","from imap1.dmz-prg2.suse.org (localhost [127.0.0.1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id F075B593A9;\n Wed, 13 May 2026 16:35:19 +0000 (UTC)","from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167])\n by imap1.dmz-prg2.suse.org with ESMTPSA id 509COkeoBGqeGwAAD6G6ig\n (envelope-from <mdoucha@suse.cz>); Wed, 13 May 2026 16:35:19 +0000"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1778690120; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=PvnbqdBEzimOWwkQrHCMmgG23kubqJsn9nq15w7CFw8=;\n b=fHt2ex0E1RitSVCzlDVuzvFakrtWNueGb0fiVq3y76tinMD1fk1Gn7EbSNpLZrSRa8blp9\n Pn0S0r9yKCoWr5q0TRll1JCoY+B1ZlSHmY9NqMNblaEPpdLp9EdhfHTQEDCuN2Xg17pAJ0\n I1+Zuwn5N9ExcIyBo6RfdncAybSGGQ0=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1778690120;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=PvnbqdBEzimOWwkQrHCMmgG23kubqJsn9nq15w7CFw8=;\n b=fvotZUaKzb9Er7ChPynnQ8i3Sogrl8uaFrlOLwEkXV8jcOuuVD/oiD0upI6CKbYme1qlZm\n j9Rg6mefGOjbqUCQ==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1778690120; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=PvnbqdBEzimOWwkQrHCMmgG23kubqJsn9nq15w7CFw8=;\n b=fHt2ex0E1RitSVCzlDVuzvFakrtWNueGb0fiVq3y76tinMD1fk1Gn7EbSNpLZrSRa8blp9\n Pn0S0r9yKCoWr5q0TRll1JCoY+B1ZlSHmY9NqMNblaEPpdLp9EdhfHTQEDCuN2Xg17pAJ0\n I1+Zuwn5N9ExcIyBo6RfdncAybSGGQ0=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1778690120;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=PvnbqdBEzimOWwkQrHCMmgG23kubqJsn9nq15w7CFw8=;\n b=fvotZUaKzb9Er7ChPynnQ8i3Sogrl8uaFrlOLwEkXV8jcOuuVD/oiD0upI6CKbYme1qlZm\n j9Rg6mefGOjbqUCQ=="],"Message-ID":"<9d5866a3-dba3-47b6-8cd2-146305eafbb0@suse.cz>","Date":"Wed, 13 May 2026 18:35:19 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"Andrea Cervesato <andrea.cervesato@suse.de>,\n Linux Test Project <ltp@lists.linux.it>","References":"<20260513-fragnesia-v2-1-07a822c66cbd@suse.com>","Content-Language":"en-US","From":"Martin Doucha <mdoucha@suse.cz>","Autocrypt":"addr=mdoucha@suse.cz; keydata=\n xsFNBGaqVbgBEACpipjj9sTO/5/DFIIYr/HiC9GEAHpmU+jzRraYh7Lcx11XDVZ00nWN5AlO\n GL+UxpvYs9cInmLGVav2gK36FxAUsxl99OCQjM45OrQHVkyDPbeZzw7NSvEblv1gaydu/YKk\n ktwuO3yzjtb5X1hiDLYULorpCYGz8CXnkkoYm79fa0g+rTivJLMaMSnO2rDcp4EsSofBE/is\n UcG4e2BIUKQE2d+ogrbHYkmbt9jQZnyipCDm61yEiNZSKR9ktbQ8IvevCpoZJu+2EFRRhDsv\n 3lvNKmlJpa+MkZ/18u/OX5zZwyP5wS9SYGIAW9236R4qoFinYYlA1LeHjJtVLq2cVjIyo9Wm\n ZG5BPsKLC31H4dzGUcvBTU0D/V5dowb5Qnt0kPAb7cmKC3vNrVBgWjEwk8mwrzNj/6wUxugR\n OnFvuUljDT48su9MFsSCQtygR0qQNnuaSr1S+a0Mzd5NgOdQ3rgWV/T1YnlSjSQQAjykom2a\n nwVKhToJSFYBezItmE2raMUpToraDXa3we48HBibs7JH1PjUGMyX1ADwHg7oIQbRGLWtWWiS\n Dy9jL7rw46lEnRHm4KIvUC1jvBM1DPz5LHHRLsA0QmzmBbDMTGTKEuuUaIo9FclwNjhiSybb\n qWGF5JQZcihg/SSpTWcjucyeDyI/x6drNz/qpXSQz6Yk00MBDQARAQABzR9NYXJ0aW4gRG91\n Y2hhIDxtZG91Y2hhQHN1c2UuY3o+wsGaBBMBCABEAhsDBQkJZgGABQsJCAcCAiICBhUKCQgL\n AgQWAgMBAh4HAheAFiEEMmUpXLa1dxYwexErBwUVKaC6qJsFAmaqWFUCGQEACgkQBwUVKaC6\n qJv+WA//btgD9l5FyfsQW4qriE1nntpyuJ+rVSL/rICYOh5rK2zdpOikNdtqQ0XOQew4AuMB\n ZSONHn5GkmCTsIjLDIiGn1v88OHJ9P+FNtfdZmMyYUYRed3tgYqlIdTjAkUy/gzNuKQl26fU\n v4Yl50MIqhm/ILmlb2s+iA5W8IZSDwy4xZo886oRGYS8/ix23HuLXTMlHNZV1a1ty62tRLyq\n pIA4kX6ymLxlXoM6G3+Ie/DOSJuaa25dlSXNQhhcFYp0ytiLdr3vByKdUpPO+Cjct601+a3w\n HS/Xzt24hlMqhvtic8EPmNhNFDMosqJBTote/sTSsiUjgSAC8h2nm91+sPyr+U5c9Bdzcytl\n ZnCJOkm5iSSHQqpP/LxdRU1AiibK+BQUqAt7WjAWmneeFUskqC4Ss3GHr2yOoEro2Nbo8i1b\n RXG8F4H4GZB+osgGIDm3zejUdZ59701E4X3KEtmz8+m4hg37nudl2hIPjop/vS7wyah7J17i\n ujM/DQQflrorbv9xmcx0z/rgtwf73gYX48O3AQmh3HlpTQ2tnIojoteYujgwxMEToyBgRG7Y\n bDB40+umKnWLqN3QtKoPP9RUynWv7bTjXtwn0I7/ATw50yJqatP1dGXP/FY7zWEVyYNB5qUi\n ZpuUX95g3qtlSIqhBrR61phpu1bYaWB/IMKstSTwdCPOwU0EZqpVuAEQALHeH9zmpNzV8E3V\n SWffDMJRGeFjcJuha0wpHMUrXGmz7Mld6o8/ZXu8QXT5gM6r6UpXytN6dUfRdllgQoj2uSjg\n ZgoaDJ8HkLYjdrcipkX6IkAe8Q9i/sZvoekuwfqVgTMfwtGyl3vfgyQkX1NiNIU967MDewcT\n Krv+5qUFnnx67qLdcd2XfIo9dsxv9nqyp4AwHtZ6Sj40KCefuaVl7YpYM3H9AnfVusr56OQC\n 9VBPex98OzEGsROcijVvhdIChMkZazYdy643xhJ9i5fjdg7Lxwg7IbyjlpVn8gZ2CQ4BupjT\n wLgvEi2O1yZlNWNk3JJMgZ29O/qbZYmsSXkCmuUj1GcZm+mvVdc/GFlq4d9Eb9BItYCCiMlJ\n LFWhFghaaqv/tHgBPcx+vmxO6iZhl07mw+mv3VohlCyWrbM2mb9uwpOYmVZcNxsRHAXSUthx\n 9sG4Bv9Szg37D7C4pX5T5Q4OO29ss4VZflvgE3vRHQd373oxdhM5jcOCEbUKw7tTpiVRUhko\n lTvQScZMR1FletK5ieHnA06qrKCZpB+WP7xr3rYYYRVTW8qhdo7p+UnfVSzdErT6Sz35tlxg\n 0wQGWbTYsBw6mk0hjaqvUS7ffRFuoVVaVQJVXLscE/nv7b+3NtK0LCFDACsZX5A2Ee0AfpKw\n WM7PJAbuI4GHc1MhhLubABEBAAHCwXwEGAEIACYWIQQyZSlctrV3FjB7ESsHBRUpoLqomwUC\n ZqpVuAIbDAUJCWYBgAAKCRAHBRUpoLqom4RUD/4xLZz0ahnRPA7Y6IRX4/bB3fDMfMlxG0Dv\n Y6USpubfUqxG61Q6P/DfOLvp5iC5OYct7Id7arA/FsQs2g2L875pNefPLzuuG/XXujJ6Vokr\n WzMy/3gnBrvcUKTiVr+wLifenDDBImQzOTsjcTBpTzX8edGMrb2jnT1+M6VEWP8bMadbTMyE\n uVTsRqzKKRPPhp8dQX7DnPzfFixvBoSbodNaBL+R432Ljl9CvXkDDLymuLyzxPdhrQ3mf02T\n jq1nHXCXFm8zC3bRvCv7k8m/PLBY956/8OPRt3ePxSFgO/Pf3FKFTKIqHDiV3dAxAO7Ibuii\n Zr5AzfbRpdA7Gt8afL/yTujen+skhuVentxwhoLw/WqqgZefK9CUXTv5A9HzXuhsgTQPPzBn\n qsL+5eFNf1QBdRa6lInbwbH0vgHZEF04mK7Ac4dsXGU+cMsHEUaNhrEBoR0cu/NFfmlwpWqO\n sOf6M5s7RKNzreVXkrlArE+x29swkXZbxFoXuahA2iykPyyCAgPz0ikRI+374jXVAtbZAAut\n HD1KfuCahogFT4upYpOUl26KquywYOGciSan4jHuqXIVCQzjYd/zOzsL7hTJiteae/oOg4m5\n i8BUUzanmo3FPwFBcjEn4nDvkw/YEo5gtQZmrxOHQAdSHdyqtFgRxu4+w3JFmnQvkResUgm3 ag==","In-Reply-To":"<20260513-fragnesia-v2-1-07a822c66cbd@suse.com>","X-Spam-Level":"","X-Spamd-Result":"default: False [-8.30 / 50.00]; REPLY(-4.00)[];\n BAYES_HAM(-3.00)[100.00%]; NEURAL_HAM_LONG(-1.00)[-1.000];\n NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain];\n RCPT_COUNT_TWO(0.00)[2]; MID_RHS_MATCH_FROM(0.00)[];\n ARC_NA(0.00)[]; FUZZY_RATELIMITED(0.00)[rspamd.com];\n RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_ALL(0.00)[];\n DKIM_SIGNED(0.00)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519];\n TO_DN_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; MIME_TRACE(0.00)[0:+];\n FROM_EQ_ENVFROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2];\n TO_MATCH_ENVRCPT_ALL(0.00)[];\n DBL_BLOCKED_OPENRESOLVER(0.00)[imap1.dmz-prg2.suse.org:helo, suse.cz:mid,\n suse.cz:email, suse.com:email]","X-Spam-Score":"-8.30","X-Spam-Status":"No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on in-5.smtp.seeweb.it","X-Virus-Scanned":"clamav-milter 1.0.9 at in-5.smtp.seeweb.it","X-Virus-Status":"Clean","Subject":"Re: [LTP] [PATCH v2] sockets/xfrm02: Add ESP-in-TCP page cache\n corruption test","X-BeenThere":"ltp@lists.linux.it","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"Linux Test Project <ltp.lists.linux.it>","List-Unsubscribe":"<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>","List-Archive":"<http://lists.linux.it/pipermail/ltp/>","List-Post":"<mailto:ltp@lists.linux.it>","List-Help":"<mailto:ltp-request@lists.linux.it?subject=help>","List-Subscribe":"<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>","Content-Transfer-Encoding":"7bit","Content-Type":"text/plain; charset=\"us-ascii\"; Format=\"flowed\"","Errors-To":"ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it","Sender":"\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"}},{"id":3690995,"web_url":"http://patchwork.ozlabs.org/comment/3690995/","msgid":"<9472388a-1314-4c19-b945-b1aa35aa109c@suse.cz>","list_archive_url":null,"date":"2026-05-13T16:42:56","subject":"Re: [LTP] sockets/xfrm02: Add ESP-in-TCP page cache corruption test","submitter":{"id":77472,"url":"http://patchwork.ozlabs.org/api/people/77472/","name":"Martin Doucha","email":"mdoucha@suse.cz"},"content":"On 5/13/26 18:29, linuxtestproject.agent@gmail.com wrote:\n> Hi Andrea,\n> \n> On Wed, 13 May 2026 17:35:03 +0200, Andrea Cervesato wrote:\n>> sockets/xfrm02: Add ESP-in-TCP page cache corruption test\n> \n>> +\t\tSAFE_POSIX_FADVISE(cli_fd, 0, 0, POSIX_FADV_DONTNEED);\n> \n> posix_fadvise(2) is only valid for regular files; on a socket fd it\n> returns ESPIPE, causing SAFE_POSIX_FADVISE to call tst_brk(TBROK) in\n> the child and the test never actually exercises the corruption path.\n> Replace with SAFE_POSIX_FADVISE(file_fd, 0, DATA_SIZE, POSIX_FADV_DONTNEED).\n\nAh, yes. As the AI correctly notes, the first argument here should be \nfile_fd instead. Please fix that during merge. The rest of AI review is \nnonsense, except for the missing CVE number.","headers":{"Return-Path":"<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>","X-Original-To":["incoming@patchwork.ozlabs.org","ltp@lists.linux.it"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ltp@picard.linux.it"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256\n header.s=susede2_rsa header.b=QybMfpC+;\n\tdkim=fail reason=\"signature verification failed\" header.d=suse.cz\n header.i=@suse.cz header.a=ed25519-sha256 header.s=susede2_ed25519\n header.b=glBDVkjj;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256 header.s=susede2_rsa\n header.b=QybMfpC+;\n\tdkim=neutral header.d=suse.cz header.i=@suse.cz header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=glBDVkjj;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=2001:1418:10:5::2; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)","smtp-out2.suse.de;\n dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=QybMfpC+;\n dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=glBDVkjj"],"Received":["from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gFzm94B8dz1yKH\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 14 May 2026 02:43:05 +1000 (AEST)","from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id 32AC03C305F\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 13 May 2026 18:43:03 +0200 (CEST)","from in-7.smtp.seeweb.it (in-7.smtp.seeweb.it\n [IPv6:2001:4b78:1:20::7])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id 2402F3C2161\n for <ltp@lists.linux.it>; Wed, 13 May 2026 18:42:59 +0200 (CEST)","from smtp-out2.suse.de (smtp-out2.suse.de\n [IPv6:2a07:de40:b251:101:10:150:64:2])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-7.smtp.seeweb.it (Postfix) with ESMTPS id 8A5692005F3\n for <ltp@lists.linux.it>; Wed, 13 May 2026 18:42:58 +0200 (CEST)","from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org\n [IPv6:2a07:de40:b281:104:10:150:64:97])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-out2.suse.de (Postfix) with ESMTPS id BADE15C880;\n Wed, 13 May 2026 16:42:56 +0000 (UTC)","from imap1.dmz-prg2.suse.org (localhost [127.0.0.1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id AE05D593A9;\n Wed, 13 May 2026 16:42:56 +0000 (UTC)","from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167])\n by imap1.dmz-prg2.suse.org with ESMTPSA id 1wobKhCqBGrCIwAAD6G6ig\n (envelope-from <mdoucha@suse.cz>); Wed, 13 May 2026 16:42:56 +0000"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1778690576;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=Rf2NwZJjyCNAmoKuUja0d9hYv0+ntie32f+NFu8HI/Q=;\n b=QybMfpC+x6+9/1SMXSn3aWDUyQPtpCDJhzCIoIaOOIE1jf7w+Xln4/CIQZOf1gs5IgDDRF\n 4ZiqiRJiUt7dm9fz1e9R4ILD7gski4NvGUYuraEqhC1GvMQEdn1tOCING9roP+9vIDKkuw\n bpzT3NXPAAcFFFBQhBAQOSEZAJ+jeHA=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1778690576;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=Rf2NwZJjyCNAmoKuUja0d9hYv0+ntie32f+NFu8HI/Q=;\n b=glBDVkjjLWXXqp3qCNTN9EBW/qFe2ZXAD1TJkLMO+AJHNWhb/RVt7n0EU/qwighoiHrDQY\n uoGC0bCrTzD9EmBg==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1778690576;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=Rf2NwZJjyCNAmoKuUja0d9hYv0+ntie32f+NFu8HI/Q=;\n b=QybMfpC+x6+9/1SMXSn3aWDUyQPtpCDJhzCIoIaOOIE1jf7w+Xln4/CIQZOf1gs5IgDDRF\n 4ZiqiRJiUt7dm9fz1e9R4ILD7gski4NvGUYuraEqhC1GvMQEdn1tOCING9roP+9vIDKkuw\n bpzT3NXPAAcFFFBQhBAQOSEZAJ+jeHA=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1778690576;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=Rf2NwZJjyCNAmoKuUja0d9hYv0+ntie32f+NFu8HI/Q=;\n b=glBDVkjjLWXXqp3qCNTN9EBW/qFe2ZXAD1TJkLMO+AJHNWhb/RVt7n0EU/qwighoiHrDQY\n uoGC0bCrTzD9EmBg=="],"Message-ID":"<9472388a-1314-4c19-b945-b1aa35aa109c@suse.cz>","Date":"Wed, 13 May 2026 18:42:56 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"linuxtestproject.agent@gmail.com,\n Andrea Cervesato <andrea.cervesato@suse.de>","References":"<20260513-fragnesia-v2-1-07a822c66cbd@suse.com>\n <20260513162925.4072-1-linuxtestproject.agent@gmail.com>","Content-Language":"en-US","From":"Martin Doucha <mdoucha@suse.cz>","Autocrypt":"addr=mdoucha@suse.cz; keydata=\n xsFNBGaqVbgBEACpipjj9sTO/5/DFIIYr/HiC9GEAHpmU+jzRraYh7Lcx11XDVZ00nWN5AlO\n GL+UxpvYs9cInmLGVav2gK36FxAUsxl99OCQjM45OrQHVkyDPbeZzw7NSvEblv1gaydu/YKk\n ktwuO3yzjtb5X1hiDLYULorpCYGz8CXnkkoYm79fa0g+rTivJLMaMSnO2rDcp4EsSofBE/is\n UcG4e2BIUKQE2d+ogrbHYkmbt9jQZnyipCDm61yEiNZSKR9ktbQ8IvevCpoZJu+2EFRRhDsv\n 3lvNKmlJpa+MkZ/18u/OX5zZwyP5wS9SYGIAW9236R4qoFinYYlA1LeHjJtVLq2cVjIyo9Wm\n ZG5BPsKLC31H4dzGUcvBTU0D/V5dowb5Qnt0kPAb7cmKC3vNrVBgWjEwk8mwrzNj/6wUxugR\n OnFvuUljDT48su9MFsSCQtygR0qQNnuaSr1S+a0Mzd5NgOdQ3rgWV/T1YnlSjSQQAjykom2a\n nwVKhToJSFYBezItmE2raMUpToraDXa3we48HBibs7JH1PjUGMyX1ADwHg7oIQbRGLWtWWiS\n Dy9jL7rw46lEnRHm4KIvUC1jvBM1DPz5LHHRLsA0QmzmBbDMTGTKEuuUaIo9FclwNjhiSybb\n qWGF5JQZcihg/SSpTWcjucyeDyI/x6drNz/qpXSQz6Yk00MBDQARAQABzR9NYXJ0aW4gRG91\n Y2hhIDxtZG91Y2hhQHN1c2UuY3o+wsGaBBMBCABEAhsDBQkJZgGABQsJCAcCAiICBhUKCQgL\n AgQWAgMBAh4HAheAFiEEMmUpXLa1dxYwexErBwUVKaC6qJsFAmaqWFUCGQEACgkQBwUVKaC6\n qJv+WA//btgD9l5FyfsQW4qriE1nntpyuJ+rVSL/rICYOh5rK2zdpOikNdtqQ0XOQew4AuMB\n ZSONHn5GkmCTsIjLDIiGn1v88OHJ9P+FNtfdZmMyYUYRed3tgYqlIdTjAkUy/gzNuKQl26fU\n v4Yl50MIqhm/ILmlb2s+iA5W8IZSDwy4xZo886oRGYS8/ix23HuLXTMlHNZV1a1ty62tRLyq\n pIA4kX6ymLxlXoM6G3+Ie/DOSJuaa25dlSXNQhhcFYp0ytiLdr3vByKdUpPO+Cjct601+a3w\n HS/Xzt24hlMqhvtic8EPmNhNFDMosqJBTote/sTSsiUjgSAC8h2nm91+sPyr+U5c9Bdzcytl\n ZnCJOkm5iSSHQqpP/LxdRU1AiibK+BQUqAt7WjAWmneeFUskqC4Ss3GHr2yOoEro2Nbo8i1b\n RXG8F4H4GZB+osgGIDm3zejUdZ59701E4X3KEtmz8+m4hg37nudl2hIPjop/vS7wyah7J17i\n ujM/DQQflrorbv9xmcx0z/rgtwf73gYX48O3AQmh3HlpTQ2tnIojoteYujgwxMEToyBgRG7Y\n bDB40+umKnWLqN3QtKoPP9RUynWv7bTjXtwn0I7/ATw50yJqatP1dGXP/FY7zWEVyYNB5qUi\n ZpuUX95g3qtlSIqhBrR61phpu1bYaWB/IMKstSTwdCPOwU0EZqpVuAEQALHeH9zmpNzV8E3V\n SWffDMJRGeFjcJuha0wpHMUrXGmz7Mld6o8/ZXu8QXT5gM6r6UpXytN6dUfRdllgQoj2uSjg\n ZgoaDJ8HkLYjdrcipkX6IkAe8Q9i/sZvoekuwfqVgTMfwtGyl3vfgyQkX1NiNIU967MDewcT\n Krv+5qUFnnx67qLdcd2XfIo9dsxv9nqyp4AwHtZ6Sj40KCefuaVl7YpYM3H9AnfVusr56OQC\n 9VBPex98OzEGsROcijVvhdIChMkZazYdy643xhJ9i5fjdg7Lxwg7IbyjlpVn8gZ2CQ4BupjT\n wLgvEi2O1yZlNWNk3JJMgZ29O/qbZYmsSXkCmuUj1GcZm+mvVdc/GFlq4d9Eb9BItYCCiMlJ\n LFWhFghaaqv/tHgBPcx+vmxO6iZhl07mw+mv3VohlCyWrbM2mb9uwpOYmVZcNxsRHAXSUthx\n 9sG4Bv9Szg37D7C4pX5T5Q4OO29ss4VZflvgE3vRHQd373oxdhM5jcOCEbUKw7tTpiVRUhko\n lTvQScZMR1FletK5ieHnA06qrKCZpB+WP7xr3rYYYRVTW8qhdo7p+UnfVSzdErT6Sz35tlxg\n 0wQGWbTYsBw6mk0hjaqvUS7ffRFuoVVaVQJVXLscE/nv7b+3NtK0LCFDACsZX5A2Ee0AfpKw\n WM7PJAbuI4GHc1MhhLubABEBAAHCwXwEGAEIACYWIQQyZSlctrV3FjB7ESsHBRUpoLqomwUC\n ZqpVuAIbDAUJCWYBgAAKCRAHBRUpoLqom4RUD/4xLZz0ahnRPA7Y6IRX4/bB3fDMfMlxG0Dv\n Y6USpubfUqxG61Q6P/DfOLvp5iC5OYct7Id7arA/FsQs2g2L875pNefPLzuuG/XXujJ6Vokr\n WzMy/3gnBrvcUKTiVr+wLifenDDBImQzOTsjcTBpTzX8edGMrb2jnT1+M6VEWP8bMadbTMyE\n uVTsRqzKKRPPhp8dQX7DnPzfFixvBoSbodNaBL+R432Ljl9CvXkDDLymuLyzxPdhrQ3mf02T\n jq1nHXCXFm8zC3bRvCv7k8m/PLBY956/8OPRt3ePxSFgO/Pf3FKFTKIqHDiV3dAxAO7Ibuii\n Zr5AzfbRpdA7Gt8afL/yTujen+skhuVentxwhoLw/WqqgZefK9CUXTv5A9HzXuhsgTQPPzBn\n qsL+5eFNf1QBdRa6lInbwbH0vgHZEF04mK7Ac4dsXGU+cMsHEUaNhrEBoR0cu/NFfmlwpWqO\n sOf6M5s7RKNzreVXkrlArE+x29swkXZbxFoXuahA2iykPyyCAgPz0ikRI+374jXVAtbZAAut\n HD1KfuCahogFT4upYpOUl26KquywYOGciSan4jHuqXIVCQzjYd/zOzsL7hTJiteae/oOg4m5\n i8BUUzanmo3FPwFBcjEn4nDvkw/YEo5gtQZmrxOHQAdSHdyqtFgRxu4+w3JFmnQvkResUgm3 ag==","In-Reply-To":"<20260513162925.4072-1-linuxtestproject.agent@gmail.com>","X-Spam-Score":"-4.51","X-Rspamd-Action":"no action","X-Spamd-Result":"default: False [-4.51 / 50.00]; BAYES_HAM(-3.00)[99.99%];\n NEURAL_HAM_LONG(-1.00)[-1.000];\n R_DKIM_ALLOW(-0.20)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519];\n NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain];\n MX_GOOD(-0.01)[];\n DKIM_SIGNED(0.00)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519];\n FREEMAIL_TO(0.00)[gmail.com,suse.de];\n FUZZY_RATELIMITED(0.00)[rspamd.com];\n RBL_SPAMHAUS_BLOCKED_OPENRESOLVER(0.00)[2a07:de40:b281:104:10:150:64:97:from];\n TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[];\n MIME_TRACE(0.00)[0:+]; ARC_NA(0.00)[];\n FREEMAIL_ENVRCPT(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[];\n DKIM_TRACE(0.00)[suse.cz:+]; RCVD_COUNT_TWO(0.00)[2];\n FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[];\n SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from];\n MID_RHS_MATCH_FROM(0.00)[]; TAGGED_RCPT(0.00)[];\n RECEIVED_SPAMHAUS_BLOCKED_OPENRESOLVER(0.00)[2a07:de40:b281:106:10:150:64:167:received];\n RCPT_COUNT_THREE(0.00)[3]; RCVD_VIA_SMTP_AUTH(0.00)[];\n DBL_BLOCKED_OPENRESOLVER(0.00)[suse.cz:email, suse.cz:dkim, suse.cz:mid,\n imap1.dmz-prg2.suse.org:rdns, imap1.dmz-prg2.suse.org:helo]","X-Rspamd-Server":"rspamd1.dmz-prg2.suse.org","X-Rspamd-Queue-Id":"BADE15C880","X-Spam-Level":"","X-Spam-Status":"No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on in-7.smtp.seeweb.it","X-Virus-Scanned":"clamav-milter 1.0.9 at in-7.smtp.seeweb.it","X-Virus-Status":"Clean","Subject":"Re: [LTP] sockets/xfrm02: Add ESP-in-TCP page cache corruption test","X-BeenThere":"ltp@lists.linux.it","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"Linux Test Project <ltp.lists.linux.it>","List-Unsubscribe":"<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>","List-Archive":"<http://lists.linux.it/pipermail/ltp/>","List-Post":"<mailto:ltp@lists.linux.it>","List-Help":"<mailto:ltp-request@lists.linux.it?subject=help>","List-Subscribe":"<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>","Cc":"ltp@lists.linux.it","Content-Transfer-Encoding":"7bit","Content-Type":"text/plain; charset=\"us-ascii\"; Format=\"flowed\"","Errors-To":"ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it","Sender":"\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"}}]