Hello:
This patch was applied to bpf/bpf.git (master) by Daniel Borkmann daniel@iogearbox.net:
On Wed, 20 Apr 2022 19:52:19 +0300 you wrote:
xmit_check_hhlen() observes the dst for getting the device hard header length to make sure a modified packet can fit. When a helper which changes the dst - such as bpf_skb_set_tunnel_key() - is called as part of the xmit program the accessed dst is no longer valid.
This leads to the following splat:
[...]
Here is the summary with links: - [bpf] lwt_bpf: fix crash when using bpf_skb_set_tunnel_key() from bpf_xmit lwt hook https://git.kernel.org/bpf/bpf/c/b02d196c44ea
You are awesome, thank you!