[ANNOUNCE] wireguard-linux-compat v1.0.20200506 released
Jason A. Donenfeld
Jason at zx2c4.com
Thu May 7 00:15:37 CEST 2020
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hello,
A new version, v1.0.20200506, of the backported WireGuard kernel module for
3.10 <= Linux <= 5.5.y has been tagged in the git repository.
== Changes ==
This release corresponds with the patches I just sent Dave for 5.7-rc5:
https://lore.kernel.org/netdev/20200506213306.1344212-1-Jason@zx2c4.com/T/
* compat: timeconst.h is a generated artifact
Before we were trying to check for timeconst.h by looking in the kernel
source directory. This isn't quite correct on configurations in which
the object directory is separate from the kernel source directory, for
example when using O="elsewhere" as a make option when building the
kernel. The correct fix is to use $(CURDIR), which should point to
where we want.
* qemu: loop entropy adding until getrandom doesn't block
Before the 256 was just a guess, which was made wrong by qemu 5.0, so
instead actually query whether or not we're all set.
* compat: detect Debian's backport of ip6_dst_lookup_flow into 4.19.118
Debian took a 4.19.119 patch into their 4.19.118, so for the first time we're
forced to detect Debian as a distro kernel, which is unfortunate.
* compat: use bash instead of bc for HZ-->USEC calculation
This should make packaging somewhat easier, as bash is generally already
available (at least for dkms), whereas bc isn't provided by distros by
default in their build meta packages.
* qemu: use normal kernel stack size on ppc64
While at some point it might have made sense to be running these tests
on ppc64 with 4k stacks, the kernel hasn't actually used 4k stacks on
64-bit powerpc in a long time, and more interesting things that we test
don't really work when we deviate from the default (16k). So, we stop
pushing our luck in this commit, and return to the default instead of
the minimum.
* socket: remove errant restriction on looping to self
It's already possible to create two different interfaces and loop
packets between them. This has always been possible with tunnels in the
kernel, and isn't specific to wireguard. Therefore, the networking stack
already needs to deal with that. At the very least, the packet winds up
exceeding the MTU and is discarded at that point. So, since this is
already something that happens, there's no need to forbid the not very
exceptional case of routing a packet back to the same interface; this
loop is no different than others, and we shouldn't special case it, but
rather rely on generic handling of loops in general. This also makes it
easier to do interesting things with wireguard such as onion routing.
At the same time, we add a selftest for this, ensuring that both onion
routing works and infinite routing loops do not crash the kernel. We
also add a test case for wireguard interfaces nesting packets and
sending traffic between each other, as well as the loop in this case
too. We make sure to send some throughput-heavy traffic for this use
case, to stress out any possible recursion issues with the locks around
workqueues.
* send: cond_resched() when processing tx ringbuffers
Users with pathological hardware reported CPU stalls on CONFIG_
PREEMPT_VOLUNTARY=y, because the ringbuffers would stay full, meaning
these workers would never terminate. That turned out not to be okay on
systems without forced preemption. This commit adds a cond_resched() to
the bottom of each loop iteration, so that these workers don't hog the
core. We don't do this on encryption/decryption because the compat
module here uses simd_relax, which already includes a call to schedule
in preempt_enable.
* compat: Ubuntu 19.10 and 18.04-hwe backported skb_reset_redirect
This patch makes this release work with kernels that are presently in
-proposed but not yet in -updates. Hopefully the newer kernels will migrate
soon. Current status as of writing:
19.10 - https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874752:
zx2c4 at thinkpad ~ $ curl -s http://archive.ubuntu.com/ubuntu/dists/eoan-updates/main/binary-amd64/Packages.xz | unxz | grep -A2 '^Package: linux-image-generic' | grep ^Version:
Version: 5.3.0.51.42
zx2c4 at thinkpad ~ $ curl -s http://archive.ubuntu.com/ubuntu/dists/eoan-proposed/main/binary-amd64/Packages.xz | unxz | grep -A2 '^Package: linux-image-generic' | grep ^Version:
Version: 5.3.0.52.44
18.04 hwe - https://bugs.launchpad.net/kernel-sru-workflow/+bug/1874751:
zx2c4 at thinkpad ~ $ curl -s http://archive.ubuntu.com/ubuntu/dists/bionic-updates/main/binary-amd64/Packages.xz | unxz | grep -A2 '^Package: linux-image-generic-hwe-18.04$' | grep ^Version:
Version: 5.3.0.51.104
zx2c4 at thinkpad ~ $ curl -s http://archive.ubuntu.com/ubuntu/dists/bionic-proposed/main/binary-amd64/Packages.xz | unxz | grep -A2 '^Package: linux-image-generic-hwe-18.04$' | grep ^Version:
Version: 5.3.0.52.106
In this case, we're waiting on the .52 kernels to migrate.
* selftests: initalize ipv6 members to NULL to squelch clang warning
This fixes a worthless warning from clang.
* send/receive: use explicit unlikely branch instead of implicit coalescing
Some code readibility cleanups.
This release contains commits from: Jason A. Donenfeld.
As always, the source is available at https://git.zx2c4.com/wireguard-linux-compat/
and information about the project is available at https://www.wireguard.com/ .
This version is available in compressed tarball form here:
https://git.zx2c4.com/wireguard-linux-compat/snapshot/wireguard-linux-compat-1.0.20200506.tar.xz
SHA2-256: 98a99f2b825a82d57a7213e666f1ee4f7cc02bddb09bf4908b4b09447a8f121e
A PGP signature of that file decompressed is available here:
https://git.zx2c4.com/wireguard-linux-compat/snapshot/wireguard-linux-compat-1.0.20200506.tar.asc
Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE
Remember to unxz the tarball before verifying the signature.
If you're a package maintainer, please bump your package version. If you're a
user, the WireGuard team welcomes any and all feedback on this latest version.
Finally, WireGuard development thrives on donations. By popular demand, we
have a webpage for this: https://www.wireguard.com/donations/
Thank you,
Jason Donenfeld
-----BEGIN PGP SIGNATURE-----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=XsJJ
-----END PGP SIGNATURE-----
More information about the WireGuard
mailing list