diff options
author | 2025-05-07 09:58:31 +0200 | |
---|---|---|
committer | 2025-05-15 13:09:36 +0200 | |
commit | 4ca6438da45688dae5c5958f640560f9496f21a4 (patch) | |
tree | a76957a61e2ca1d0b4968ea1c8f5f4156ce22b4e /scripts/gdb/linux/vmalloc.py | |
parent | ovpn: set skb->ignore_df = 1 before sending IPv6 packets out (diff) | |
download | wireguard-linux-4ca6438da45688dae5c5958f640560f9496f21a4.tar.xz wireguard-linux-4ca6438da45688dae5c5958f640560f9496f21a4.zip |
ovpn: don't drop skb's dst when xmitting packet
When routing a packet to a LAN behind a peer, ovpn needs to
inspect the route entry that brought the packet there in the
first place.
If this packet is truly routable, the route entry provides the
GW to be used when looking up the VPN peer to send the packet to.
However, the route entry is currently dropped before entering
the ovpn xmit function, because the IFF_XMIT_DST_RELEASE priv_flag
is enabled by default.
Clear the IFF_XMIT_DST_RELEASE flag during interface setup to allow
the route entry (skb's dst) to survive and thus be inspected
by the ovpn routing logic.
Fixes: a3aaef8cd173 ("ovpn: implement peer lookup logic")
Reported-by: Gert Doering <gert@greenie.muc.de>
Closes: https://github.com/OpenVPN/ovpn-net-next/issues/2
Tested-by: Gert Doering <gert@greenie.muc.de>
Acked-by: Gert Doering <gert@greenie.muc.de> # as a primary user
Link: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg31583.html
Signed-off-by: Antonio Quartulli <antonio@openvpn.net>
Diffstat (limited to 'scripts/gdb/linux/vmalloc.py')
0 files changed, 0 insertions, 0 deletions