On Thu, Nov 05, 2020 at 11:30:35PM -0800, Martin KaFai Lau wrote:
> [ ... ]
>
> > @@ -585,12 +571,11 @@ int _ipip6_set_tunnel(struct __sk_buff *skb)
> > struct bpf_tunnel_key key = {};
> > void *data = (void *)(long)skb->data;
> > struct iphdr *iph = data;
> v4 hdr here.
Ah, right, I didn't notice this. I will fix it, maybe by checking
skb->family and use different IPv4,v6 hdr.
> > -SEC("ip6ip6_set_tunnel")
> > -int _ip6ip6_set_tunnel(struct __sk_buff *skb)
> > -{
> > - struct bpf_tunnel_key key = {};
> > - void *data = (void *)(long)skb->data;
> > - struct ipv6hdr *iph = data;
> IIUC, the patch is to replace _ip6ip6_set_tunnel with _ipip6_set_tunnel.
>
> Are they testing the same thing? At least, _ip6ip6_set_tunnel()
> is expecting a v6 hdr here.
Yes, the v4/v6 hdr here is just to check the data length.
>
> > - struct tcphdr *tcp = data + sizeof(*iph);
> > - void *data_end = (void *)(long)skb->data_end;
> > - int ret;
> > -
> > - /* single length check */
> > - if (data + sizeof(*iph) + sizeof(*tcp) > data_end) {
> > - ERROR(1);
> > - return TC_ACT_SHOT;
> > - }
^^ here
> > -
> > - key.remote_ipv6[0] = bpf_htonl(0x2401db00);
> > - key.tunnel_ttl = 64;
The code logic is same. It set tunnel remote addr to dst IPv6 address, as
they are both testing IP(v4 or v6) over IPv6 tunnel.
Thanks
Hangbin