diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2020-06-29 19:06:20 -0600 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2020-06-30 17:17:01 -0600 |
commit | 6af810721785ecae09a50ebf28d4c8234f67b163 (patch) | |
tree | 77ae65e396d4296d7cd827c9c48c652dd6d13740 | |
parent | ae2212da560cffe0daec1878fefde46a83906f24 (diff) |
device: implement header_ops->parse_protocol for AF_PACKET
WireGuard uses skb->protocol to determine packet type, and bails out if
it's not set or set to something it's not expecting. For AF_PACKET
injection, we need to support its call chain of:
packet_sendmsg -> packet_snd -> packet_parse_headers ->
dev_parse_header_protocol -> parse_protocol
Without a valid parse_protocol, this returns zero, and wireguard then
rejects the skb. So, this wires up the ip_tunnel handler for layer 3
packets for that case.
Reported-by: Hans Wippel <ndev@hwipl.net>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
-rw-r--r-- | src/device.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/device.c b/src/device.c index e0f0c48..1155783 100644 --- a/src/device.c +++ b/src/device.c @@ -270,6 +270,7 @@ static void wg_setup(struct net_device *dev) max(sizeof(struct ipv6hdr), sizeof(struct iphdr)); dev->netdev_ops = &netdev_ops; + dev->header_ops = &ip_tunnel_header_ops; dev->hard_header_len = 0; dev->addr_len = 0; dev->needed_headroom = DATA_PACKET_HEAD_ROOM; |