2024-10-29, 11:47:22 +0100, Antonio Quartulli wrote:
+static int ovpn_udp_encap_recv(struct sock *sk, struct sk_buff *skb) +{
[...]
- opcode = ovpn_opcode_from_skb(skb, sizeof(struct udphdr));
- if (unlikely(opcode != OVPN_DATA_V2)) {
/* DATA_V1 is not supported */if (opcode == OVPN_DATA_V1)
The TCP encap code passes everything that's not V2 to userspace. Why not do that with UDP as well?
goto drop;/* unknown or control packet: let it bubble up to userspace */return 1;- }
- peer_id = ovpn_peer_id_from_skb(skb, sizeof(struct udphdr));
- /* some OpenVPN server implementations send data packets with the
* peer-id set to undef. In this case we skip the peer lookup by peer-id* and we try with the transport address*/- if (peer_id != OVPN_PEER_ID_UNDEF) {
peer = ovpn_peer_get_by_id(ovpn, peer_id);if (!peer) {net_err_ratelimited("%s: received data from unknown peer (id: %d)\n",__func__, peer_id);goto drop;}- }
- if (!peer) {
nit: that could be an "else" combined with the previous case?
/* data packet with undef peer-id */peer = ovpn_peer_get_by_transp_addr(ovpn, skb);if (unlikely(!peer)) {net_dbg_ratelimited("%s: received data with undef peer-id from unknown source\n",__func__);goto drop;}- }