On 12/2/24 16:07, Antonio Quartulli wrote:
> diff --git a/drivers/net/ovpn/io.c b/drivers/net/ovpn/io.c
> index 
> 2a3dbc723813a14070159318097755cc7ea3f216..1bbbaae8639477b67626731c3bd14810a65dfdcd
>  100644
> --- a/drivers/net/ovpn/io.c
> +++ b/drivers/net/ovpn/io.c
> @@ -9,15 +9,78 @@
>  
>  #include <linux/netdevice.h>
>  #include <linux/skbuff.h>
> +#include <net/gro_cells.h>
>  #include <net/gso.h>
>  
> -#include "io.h"
>  #include "ovpnstruct.h"
>  #include "peer.h"
> +#include "io.h"
> +#include "netlink.h"
> +#include "proto.h"
>  #include "udp.h"
>  #include "skb.h"
>  #include "socket.h"
>  
> +/* Called after decrypt to write the IP packet to the device.
> + * This method is expected to manage/free the skb.
> + */
> +static void ovpn_netdev_write(struct ovpn_peer *peer, struct sk_buff *skb)
> +{
> +     unsigned int pkt_len;
> +     int ret;
> +
> +     /* we can't guarantee the packet wasn't corrupted before entering the
> +      * VPN, therefore we give other layers a chance to check that
> +      */
> +     skb->ip_summed = CHECKSUM_NONE;
> +
> +     /* skb hash for transport packet no longer valid after decapsulation */
> +     skb_clear_hash(skb);
> +
> +     /* post-decrypt scrub -- prepare to inject encapsulated packet onto the
> +      * interface, based on __skb_tunnel_rx() in dst.h
> +      */
> +     skb->dev = peer->ovpn->dev;
> +     skb_set_queue_mapping(skb, 0);
> +     skb_scrub_packet(skb, true);
> +
> +     skb_reset_network_header(skb);
> +     skb_reset_transport_header(skb);
> +     skb_probe_transport_header(skb);

This is a no-op after the previous call. You should drop it.

Thanks,

Paolo


Reply via email to