Currently, when retrieving the L4 protocol from the L3 header,
the case of IPv6 with extension headers is not handled correctly.
This patch fixes it.

Fixes: 76730c7b9b5a ("app/testpmd: use packet type parsing API")
Cc: sta...@dpdk.org

Signed-off-by: Dengdui Huang <huangdeng...@huawei.com>
---
 app/test-pmd/csumonly.c | 39 ++++++++++++++++-----------------------
 1 file changed, 16 insertions(+), 23 deletions(-)

diff --git a/app/test-pmd/csumonly.c b/app/test-pmd/csumonly.c
index d355dbd8c0..a6e872e5a4 100644
--- a/app/test-pmd/csumonly.c
+++ b/app/test-pmd/csumonly.c
@@ -525,20 +525,8 @@ get_tunnel_ol_flags_by_ptype(uint32_t ptype)
        }
 }
 
-static void
-parse_inner_l4_proto(void *outer_l3_hdr,
-                       struct testpmd_offload_info *info)
-{
-       struct rte_ipv4_hdr *ipv4_hdr = outer_l3_hdr;
-       struct rte_ipv6_hdr *ipv6_hdr = outer_l3_hdr;
-       if (info->ethertype == _htons(RTE_ETHER_TYPE_IPV4))
-               info->l4_proto = ipv4_hdr->next_proto_id;
-       else
-               info->l4_proto = ipv6_hdr->proto;
-}
-
 static uint8_t
-parse_l4_proto(const struct rte_mbuf *m, uint32_t off, uint32_t ptype)
+parse_l4_proto(const struct rte_mbuf *m, uint32_t off, uint32_t ptype, bool 
parse_inner)
 {
        int frag = 0, ret;
 
@@ -557,16 +545,19 @@ parse_l4_proto(const struct rte_mbuf *m, uint32_t off, 
uint32_t ptype)
                if (unlikely(ip6h == NULL))
                        return 0;
 
-               if ((ptype & RTE_PTYPE_INNER_L3_MASK) ==
-                               RTE_PTYPE_INNER_L3_IPV6_EXT) {
-                       ret = rte_net_skip_ip6_ext(ip6h->proto, m, &off, &frag);
-                       if (ret < 0)
-                               return 0;
-                       return ret;
-               }
+               if (!parse_inner && (ptype & RTE_PTYPE_L3_MASK) != 
RTE_PTYPE_L3_IPV6_EXT)
+                       return ip6h->proto;
+
+               if (parse_inner && (ptype & RTE_PTYPE_INNER_L3_MASK) != 
RTE_PTYPE_INNER_L3_IPV6_EXT)
+                       return ip6h->proto;
 
-               return ip6h->proto;
+               off += sizeof(struct rte_ipv6_hdr);
+               ret = rte_net_skip_ip6_ext(ip6h->proto, m, &off, &frag);
+               if (ret < 0)
+                       return 0;
+               return ret;
        }
+
        return 0;
 }
 
@@ -705,7 +696,7 @@ pkt_burst_checksum_forward(struct fwd_stream *fs)
                info.l4_len = hdr_lens.l4_len;
                info.ethertype = get_ethertype_by_ptype(eth_hdr,
                                        ptype & RTE_PTYPE_L3_MASK);
-               info.l4_proto = parse_l4_proto(m, info.l2_len, ptype);
+               info.l4_proto = parse_l4_proto(m, info.l2_len, ptype, false);
 
                l3_hdr = (char *)eth_hdr + info.l2_len;
                /* check if it's a supported tunnel */
@@ -723,9 +714,11 @@ pkt_burst_checksum_forward(struct fwd_stream *fs)
                }
                /* update l3_hdr and outer_l3_hdr if a tunnel was parsed */
                if (info.is_tunnel) {
+                       uint16_t l3_off = info.outer_l2_len +  
info.outer_l3_len + info.l2_len;
+
                        outer_l3_hdr = l3_hdr;
                        l3_hdr = (char *)l3_hdr + info.outer_l3_len + 
info.l2_len;
-                       parse_inner_l4_proto(l3_hdr, &info);
+                       info.l4_proto = parse_l4_proto(m, l3_off, ptype, true);
                }
                /* step 2: depending on user command line configuration,
                 * recompute checksum either in software or flag the
-- 
2.33.0

Reply via email to