diff options
author | Axel Neumann <neumann@cgws.de> | 2018-05-21 20:32:09 +0200 |
---|---|---|
committer | Hans Dedecker <dedeckeh@gmail.com> | 2018-06-23 09:47:05 +0200 |
commit | 65c05301c2d1ef4b27a8cac8fea4815b969e0f1f (patch) | |
tree | 4515e78e8dcd14f9352ff2f5d78be8a6dd879526 /target/linux/generic/pending-4.9 | |
parent | 333e609703ff40a272b8f8832a8af682826fb572 (diff) | |
download | upstream-65c05301c2d1ef4b27a8cac8fea4815b969e0f1f.tar.gz upstream-65c05301c2d1ef4b27a8cac8fea4815b969e0f1f.tar.bz2 upstream-65c05301c2d1ef4b27a8cac8fea4815b969e0f1f.zip |
Re-enable arbitrary IPv6 addresses as outer ip4-in-ip6 tunnel source address
The 666-Add-support-for-MAP-E-FMRs-mesh-mode.patch kernel patches
break the possibility for using an ip4ip6 tunnel interface as a fall
back interface accepting ip4-in-ip6 tunneled packets from any remote
address. This works out of the box with any normal (non-666-patched)
kernel and can be configured by setting up an 'ip -6 tunnel' with type
'any' or 'ip4ip6' and a remote address of '::'.
The misbehavior comes with line 290 the patch which discards all packets
that do not show the expected saddr, even if no single fmr rule was
defined and despite the validity of the saddr was already approved earlier.
Signed-off-by: Axel Neumann <neumann@cgws.de>
Acked-by: Hans Dedecker <dedeckeh@gmail.com>
Diffstat (limited to 'target/linux/generic/pending-4.9')
-rw-r--r-- | target/linux/generic/pending-4.9/666-Add-support-for-MAP-E-FMRs-mesh-mode.patch | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/target/linux/generic/pending-4.9/666-Add-support-for-MAP-E-FMRs-mesh-mode.patch b/target/linux/generic/pending-4.9/666-Add-support-for-MAP-E-FMRs-mesh-mode.patch index 99d1fb2e53..76b38c5fb9 100644 --- a/target/linux/generic/pending-4.9/666-Add-support-for-MAP-E-FMRs-mesh-mode.patch +++ b/target/linux/generic/pending-4.9/666-Add-support-for-MAP-E-FMRs-mesh-mode.patch @@ -268,7 +268,7 @@ Signed-off-by: Steven Barth <cyrus@openwrt.org> skb_reset_network_header(skb); memset(skb->cb, 0, sizeof(struct inet6_skb_parm)); -+ if (tpi->proto == htons(ETH_P_IP) && ++ if (tpi->proto == htons(ETH_P_IP) && tunnel->parms.fmrs && + !ipv6_addr_equal(&ipv6h->saddr, &tunnel->parms.raddr)) { + /* Packet didn't come from BR, so lookup FMR */ + struct __ip6_tnl_fmr *fmr; |