-and-tested-by: Geert Uytterhoeven
Link:
https://lore.kernel.org/lkml/CAMuHMdUKo_Sf7TjKzcNDa8Ve+6QrK+P8nSQrSQ=6ltrmcbk...@mail.gmail.com/
Reported-by: Vernon Yang
Link: https://lore.kernel.org/lkml/20230306160651.2016767-1-vernon...@gmail.com/
Cc: Yury Norov
Cc: Jason A. Donenfeld
Signed-off-by:
On Sun, Jul 17, 2022 at 07:01:21PM -0400, Sasha Levin wrote:
On Thu, Jul 14, 2022 at 09:08:49AM +0200, Geert Uytterhoeven wrote:
Hi Sasha,
On Thu, Jul 14, 2022 at 6:29 AM Sasha Levin wrote:
From: "Jason A. Donenfeld"
[ Upstream commit 1f2f341a62639c7066ee4c76b7d9ebe867e0a1d5 ]
T
On Thu, Jul 14, 2022 at 09:08:49AM +0200, Geert Uytterhoeven wrote:
Hi Sasha,
On Thu, Jul 14, 2022 at 6:29 AM Sasha Levin wrote:
From: "Jason A. Donenfeld"
[ Upstream commit 1f2f341a62639c7066ee4c76b7d9ebe867e0a1d5 ]
This should be a bit more stable hopefully.
Signed-off
tree, per usual.
Signed-off-by: Jason A. Donenfeld
Signed-off-by: Jakub Kicinski
Signed-off-by: Sasha Levin
---
tools/testing/selftests/wireguard/qemu/Makefile | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/tools/testing/selftests/wireguard/qemu/Makefile
b/tools/testing
From: "Jason A. Donenfeld"
[ Upstream commit 1f2f341a62639c7066ee4c76b7d9ebe867e0a1d5 ]
This should be a bit more stable hopefully.
Signed-off-by: Jason A. Donenfeld
Signed-off-by: Jakub Kicinski
Signed-off-by: Sasha Levin
---
tools/testing/selftests/wireguard/qemu/Makefile
b Kicinski
Signed-off-by: Sasha Levin
---
.../testing/selftests/wireguard/qemu/arch/arm.config | 1 +
.../selftests/wireguard/qemu/arch/armeb.config| 1 +
.../testing/selftests/wireguard/qemu/arch/i686.config | 1 +
.../testing/selftests/wireguard/qemu/arch/m68k.config | 1 +
.../testing
oop when used with
tunnels. With the next change fixing this issue in netfilter, test for
the relevant condition inside our test suite, since wireguard was where
the bug was discovered.
Reported-by: Chen Minqiang
Signed-off-by: Jason A. Donenfeld
Signed-off-by: Pablo Neira Ayuso
Signed-off-by
From: "Jason A. Donenfeld"
[ Upstream commit a9e90d9931f3a474f04bab782ccd9d77904941e9 ]
In "wireguard: queueing: preserve flow hash across packet scrubbing", we
were required to slightly increase the size of the receive replay
counter to something still fairly small, but an increase
From: "Jason A. Donenfeld"
[ Upstream commit c78a0b4a78839d572d8a80f6a62221c0d7843135 ]
It's important that we clear most header fields during encapsulation and
decapsulation, because the packet is substantially changed, and we don't
want any info leak or logic bug due to an accidental
From: "Jason A. Donenfeld"
[ Upstream commit bc67d371256f5c47d824e2eec51e46c8d62d022e ]
Prior we read the preshared key after dropping the handshake lock, which
isn't an actual crypto issue if it races, but it's still not quite
correct. So copy that part of the state into a temporary like we do
We silence this warning by setting the variables to NULL as the warning
suggests.
Reported-by: Arnd Bergmann
Signed-off-by: Jason A. Donenfeld
Signed-off-by: David S. Miller
Signed-off-by: Sasha Levin
---
drivers/net/wireguard/selftest/ratelimiter.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletion
11 matches
Mail list logo