Re: [Openvpn-devel] [PATCH ovpn-net-next v2] ovpn: ensure sk is still valid during cleanup

2025-05-06 Thread Antonio Quartulli
Hi, On 06/05/2025 00:55, Antonio Quartulli wrote: From: Antonio Quartulli [...] Signed-off-by: Antonio Quartulli This is v2 for "[PATCH ovpn-net-next 1/2] ovpn: don't access sk after release". --- drivers/net/ovpn/socket.c | 21 - 1 file changed, 12 insertions

[Openvpn-devel] [PATCH ovpn-net-next] ovpn: set skb->ignore_df = 1 before sending IPv6 packets out

2025-05-06 Thread Antonio Quartulli
From: Antonio Quartulli IPv6 user packets (sent over the tunnel) may be larger than the outgoing interface MTU after encapsulation. When this happens ovpn should allow the kernel to fragment them because they are "locally generated". To achieve the above, we must set skb->ignore_df = 1 so that i

Re: [Openvpn-devel] [PATCH ovpn-net-next] ovpn: set skb->ignore_df = 1 before sending IPv6 packets out

2025-05-06 Thread Gert Doering
Hi, On Tue, May 06, 2025 at 11:08:53PM +0200, Antonio Quartulli wrote: > From: Antonio Quartulli > > IPv6 user packets (sent over the tunnel) may be larger than > the outgoing interface MTU after encapsulation. > When this happens ovpn should allow the kernel to fragment > them because they are

Re: [Openvpn-devel] [PATCH ovpn-net-next] ovpn: set skb->ignore_df = 1 before sending IPv6 packets out

2025-05-06 Thread Antonio Quartulli
Hi, On 07/05/2025 08:45, Gert Doering wrote: so: Tested-By: Gert Doering Acked-By: Gert Doering Sending your tags this way is definitely the way to go. I'll add them when pushing the patch to my tree. Thanks! -- Antonio Quartulli ___ Openvpn

Re: [Openvpn-devel] [PATCH ovpn-net-next] ovpn: set skb->ignore_df = 1 before sending IPv6 packets out

2025-05-06 Thread Gert Doering
Hi, On Tue, May 06, 2025 at 11:08:53PM +0200, Antonio Quartulli wrote: > From: Antonio Quartulli > > IPv6 user packets (sent over the tunnel) may be larger than > the outgoing interface MTU after encapsulation. > When this happens ovpn should allow the kernel to fragment > them because they are