lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <939720599f72cb9e4348a93d5b914e44ed6d3660.camel@perches.com>
Date:   Mon, 01 Jun 2020 12:50:33 -0700
From:   Joe Perches <joe@...ches.com>
To:     "Jason A. Donenfeld" <Jason@...c4.com>,
        David Miller <davem@...emloft.net>
Cc:     Netdev <netdev@...r.kernel.org>
Subject: Re: [PATCH net-next 0/1] wireguard column reformatting for end of
 cycle

On Mon, 2020-06-01 at 13:33 -0600, Jason A. Donenfeld wrote:
> Hi Dave,
> 
> On Mon, Jun 1, 2020 at 12:00 PM David Miller <davem@...emloft.net> wrote:
> > This is going to make nearly every -stable backport not apply cleanly,
> > which is a severe burdon for everyone having to maintain stable trees.
> 
> This possibility had occurred to me too, which is why I mentioned the
> project being sufficiently young that this can work out. It's not
> actually in any LTS yet, which means at the worst, this will apply
> temporarily for 5.6, and only then on the off chance that a patch is
> near code that this touches. Alternatively, it'd be easy enough to add
> a Fixes: to this, just in case. I'll be sad but will understand if you
> decide to n'ack this in the end, but please do consider first that
> practically speaking this won't be nearly as bad as this kind of thing
> normally is.

It seems just this handful of wireguard patches in
-next are missing from 5.6.9.

a9e90d9931f3a474f04bab782ccd9d77904941e9 wireguard: noise: separate receive counter from send counter
c78a0b4a78839d572d8a80f6a62221c0d7843135 wireguard: queueing: preserve flow hash across packet scrubbing
bc67d371256f5c47d824e2eec51e46c8d62d022e wireguard: noise: read preshared key while taking lock
243f2148937adc72bcaaa590d482d599c936efde wireguard: send/receive: use explicit unlikely branch instead of implicit coalescing
4fed818ef54b08d4b29200e416cce65546ad5312 wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning
4005f5c3c9d006157ba716594e0d70c88a235c5e wireguard: send/receive: cond_resched() when processing worker ringbuffers
b673e24aad36981f327a6570412ffa7754de8911 wireguard: socket: remove errant restriction on looping to self
eebabcb26ea1e3295704477c6cd4e772c96a9559 wireguard: receive: use tunnel helpers for decapsulating ECN markings
130c58606171326c81841a49cc913cd354113dd9 wireguard: queueing: cleanup ptr_ring in error path of packet_queue_init
d6833e42786e050e7522d6a91a9361e54085897d wireguard: send: remove errant newline from packet_encrypt_worker

It seems at least some of them fix defects.
Assuming they all get applied to 5.6.10, likely
it'd be reasonably simple to apply this cleanup.

The reformatting does make the code easier to read
and is a fair bit shorter.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ