summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorAndrea Mayer <andrea.mayer@uniroma2.it>2022-07-12 19:58:37 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2022-07-21 21:09:29 +0200
commit6d6c8b40ab84cc038b24759ec67176179b19afe2 (patch)
tree5db97de5b79bd65e74143e4512447f54b8f95dde /net
parentd14d475326082d8764b7275dac52580a48a93c92 (diff)
downloadlinux-stable-6d6c8b40ab84cc038b24759ec67176179b19afe2.tar.gz
linux-stable-6d6c8b40ab84cc038b24759ec67176179b19afe2.tar.bz2
linux-stable-6d6c8b40ab84cc038b24759ec67176179b19afe2.zip
seg6: bpf: fix skb checksum in bpf_push_seg6_encap()
[ Upstream commit 4889fbd98deaf243c3baadc54e296d71c6af1eb0 ] Both helper functions bpf_lwt_seg6_action() and bpf_lwt_push_encap() use the bpf_push_seg6_encap() to encapsulate the packet in an IPv6 with Segment Routing Header (SRH) or insert an SRH between the IPv6 header and the payload. To achieve this result, such helper functions rely on bpf_push_seg6_encap() which, in turn, leverages seg6_do_srh_{encap,inline}() to perform the required operation (i.e. encap/inline). This patch removes the initialization of the IPv6 header payload length from bpf_push_seg6_encap(), as it is now handled properly by seg6_do_srh_{encap,inline}() to prevent corruption of the skb checksum. Fixes: fe94cc290f53 ("bpf: Add IPv6 Segment Routing helpers") Signed-off-by: Andrea Mayer <andrea.mayer@uniroma2.it> Signed-off-by: Paolo Abeni <pabeni@redhat.com> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'net')
-rw-r--r--net/core/filter.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/net/core/filter.c b/net/core/filter.c
index c1310c9d1b90..5129e89f52bb 100644
--- a/net/core/filter.c
+++ b/net/core/filter.c
@@ -4570,7 +4570,6 @@ static int bpf_push_seg6_encap(struct sk_buff *skb, u32 type, void *hdr, u32 len
if (err)
return err;
- ipv6_hdr(skb)->payload_len = htons(skb->len - sizeof(struct ipv6hdr));
skb_set_transport_header(skb, sizeof(struct ipv6hdr));
return seg6_lookup_nexthop(skb, NULL, 0);