diff options
author | Andrea Mayer <andrea.mayer@uniroma2.it> | 2020-12-02 14:05:10 +0100 |
---|---|---|
committer | Jakub Kicinski <kuba@kernel.org> | 2020-12-04 13:30:50 -0800 |
commit | 048939088220278b8ee5bbf3769fd2f803ca9e3e (patch) | |
tree | f3c15ab5a6f961ef9b575e10856771ce26b27c23 /net/ipv6 | |
parent | 846c3c9cfe8a74021b246bc77a848507be225719 (diff) | |
download | linux-048939088220278b8ee5bbf3769fd2f803ca9e3e.tar.bz2 |
vrf: add mac header for tunneled packets when sniffer is attached
Before this patch, a sniffer attached to a VRF used as the receiving
interface of L3 tunneled packets detects them as malformed packets and
it complains about that (i.e.: tcpdump shows bogus packets).
The reason is that a tunneled L3 packet does not carry any L2
information and when the VRF is set as the receiving interface of a
decapsulated L3 packet, no mac header is currently set or valid.
Therefore, the purpose of this patch consists of adding a MAC header to
any packet which is directly received on the VRF interface ONLY IF:
i) a sniffer is attached on the VRF and ii) the mac header is not set.
In this case, the mac address of the VRF is copied in both the
destination and the source address of the ethernet header. The protocol
type is set either to IPv4 or IPv6, depending on which L3 packet is
received.
Signed-off-by: Andrea Mayer <andrea.mayer@uniroma2.it>
Reviewed-by: David Ahern <dsahern@kernel.org>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'net/ipv6')
0 files changed, 0 insertions, 0 deletions