2025-01-13, 10:31:28 +0100, Antonio Quartulli wrote: > static bool ovpn_encrypt_one(struct ovpn_peer *peer, struct sk_buff *skb) > { > - ovpn_skb_cb(skb)->peer = peer; > + struct ovpn_crypto_key_slot *ks; > + > + if (unlikely(skb->ip_summed == CHECKSUM_PARTIAL && > + skb_checksum_help(skb))) { > + net_warn_ratelimited("%s: cannot compute checksum for outgoing packet for peer %u\n", > + netdev_name(peer->ovpn->dev), peer->id); > + return false; > + } > + > + /* get primary key to be used for encrypting data */ > + ks = ovpn_crypto_key_slot_primary(&peer->crypto); > + if (unlikely(!ks)) > + return false; > > /* take a reference to the peer because the crypto code may run async. > * ovpn_encrypt_post() will release it upon completion > @@ -118,7 +244,8 @@ static bool ovpn_encrypt_one(struct ovpn_peer *peer, struct sk_buff *skb) Adding in the few lines that got snipped: /* take a reference to the peer because the crypto code may run async. * ovpn_encrypt_post() will release it upon completion */ if (unlikely(!ovpn_peer_hold(peer))) { DEBUG_NET_WARN_ON_ONCE(1); return false; } This should never happen, but just in case, we'd want ovpn_crypto_key_slot_put() here. > return false; > } -- Sabrina