lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250521212707.1767879-1-Jason@zx2c4.com>
Date: Wed, 21 May 2025 23:27:02 +0200
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: netdev@...r.kernel.org,
	kuba@...nel.org
Cc: "Jason A. Donenfeld" <Jason@...c4.com>
Subject: [PATCH net-next 0/5] wireguard updates for 6.16

Hi Jakub,

This small series contains mostly cleanups and one new feature:

1) Kees' __nonstring annotation comes to wireguard.

2) Two selftest fixes, one to help with compilation on gcc 15, and one
   removing stale config options.

3) Adoption of NLA_POLICY_MASK.

4) Jordan has added the ability to run:

    # wg set ... peer ... allowed-ips -192.168.1.0/24

  Which will remove the allowed IP for that peer. Previously you had to
  replace all the IPs non-atomically, or move it to a dummy peer
  atomically, which wasn't very clean.

Please pull!

Thanks,
Jason


Jason A. Donenfeld (2):
  wireguard: netlink: use NLA_POLICY_MASK where possible
  wireguard: selftests: specify -std=gnu17 for bash

Jordan Rife (1):
  wireguard: allowedips: add WGALLOWEDIP_F_REMOVE_ME flag

Kees Cook (1):
  wireguard: global: add __nonstring annotations for unterminated
    strings

WangYuli (1):
  wireguard: selftests: cleanup CONFIG_UBSAN_SANITIZE_ALL

 drivers/net/wireguard/allowedips.c            | 102 ++++++++++++------
 drivers/net/wireguard/allowedips.h            |   4 +
 drivers/net/wireguard/cookie.c                |   4 +-
 drivers/net/wireguard/netlink.c               |  47 ++++----
 drivers/net/wireguard/noise.c                 |   4 +-
 drivers/net/wireguard/selftest/allowedips.c   |  48 +++++++++
 include/uapi/linux/wireguard.h                |   9 ++
 tools/testing/selftests/wireguard/netns.sh    |  29 +++++
 .../testing/selftests/wireguard/qemu/Makefile |   3 +-
 .../selftests/wireguard/qemu/debug.config     |   1 -
 10 files changed, 194 insertions(+), 57 deletions(-)

-- 
2.48.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ