Hello community,

here is the log from the commit of package wireguard-tools for openSUSE:Factory 
checked in at 2020-02-10 21:54:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/wireguard-tools (Old)
 and      /work/SRC/openSUSE:Factory/.wireguard-tools.new.26092 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "wireguard-tools"

Mon Feb 10 21:54:11 2020 rev:3 rq:772554 version:1.0.20200206

Changes:
--------
--- /work/SRC/openSUSE:Factory/wireguard-tools/wireguard-tools.changes  
2020-01-22 22:45:53.652564248 +0100
+++ 
/work/SRC/openSUSE:Factory/.wireguard-tools.new.26092/wireguard-tools.changes   
    2020-02-10 21:54:12.650217106 +0100
@@ -1,0 +2,11 @@
+Thu Feb  6 20:44:11 UTC 2020 - Martin Hauke <[email protected]>
+
+- Update to version 1.0.20200206
+  * man: document dynamic debug trick for Linux
+  * extract-{handshakes,keys}: rework for upstream kernel
+  * netlink: remove libmnl requirement
+  * embeddable-wg-library: use newer string_list
+  * netlink: don't pretend that sysconf isn't a function
+  * Small cleanups.
+
+-------------------------------------------------------------------

Old:
----
  wireguard-tools-1.0.20200121.tar.asc
  wireguard-tools-1.0.20200121.tar.xz

New:
----
  wireguard-tools-1.0.20200206.tar.asc
  wireguard-tools-1.0.20200206.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ wireguard-tools.spec ++++++
--- /var/tmp/diff_new_pack.x9QUxE/_old  2020-02-10 21:54:13.454217551 +0100
+++ /var/tmp/diff_new_pack.x9QUxE/_new  2020-02-10 21:54:13.458217553 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package wireguard-tools
 #
-# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2020 SUSE LLC
 # Copyright (c) 2020, Martin Hauke <[email protected]>
 #
 # All modifications and additions to the file contributed by third parties
@@ -18,7 +18,7 @@
 
 
 Name:           wireguard-tools
-Version:        1.0.20200121
+Version:        1.0.20200206
 Release:        0
 Summary:        WireGuard userspace tools
 License:        GPL-2.0-only
@@ -30,7 +30,6 @@
 Source2:        wireguard.target
 Patch1:         wireguard-fix-systemd-service.patch
 BuildRequires:  bash-completion
-BuildRequires:  libmnl-devel
 BuildRequires:  pkgconfig
 %systemd_requires
 
@@ -55,6 +54,7 @@
 contrib/dns-hatchet/apply.sh
 
 %build
+export CFLAGS="%{optflags}"
 make V=1 -C src %{?_smp_mflags}
 
 %install


++++++ wireguard-tools-1.0.20200121.tar.xz -> 
wireguard-tools-1.0.20200206.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/README.md 
new/wireguard-tools-1.0.20200206/README.md
--- old/wireguard-tools-1.0.20200121/README.md  2020-01-21 15:51:31.000000000 
+0100
+++ new/wireguard-tools-1.0.20200206/README.md  2020-02-06 16:19:47.000000000 
+0100
@@ -14,9 +14,7 @@
     $ cd src
     $ make
 
-On Linux, [`libmnl`](https://netfilter.org/projects/libmnl/index.html) is
-required. On Windows, the [MinGW](http://www.mingw.org/) compiler is required.
-On other platforms, only a sane libc is required.
+There are no dependencies other than a good C compiler and a sane libc.
 
 ## Installing
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/test.c 
new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/test.c
--- old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/test.c       
2020-01-21 15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/test.c       
2020-02-06 16:19:47.000000000 +0100
@@ -27,8 +27,11 @@
                        perror("Unable to get device");
                        continue;
                }
-               wg_key_to_base64(key, device->public_key);
-               printf("%s has public key %s\n", device_name, key);
+               if (device->flags & WGDEVICE_HAS_PUBLIC_KEY) {
+                       wg_key_to_base64(key, device->public_key);
+                       printf("%s has public key %s\n", device_name, key);
+               } else
+                       printf("%s has no public key\n", device_name);
                wg_for_each_peer(device, peer) {
                        wg_key_to_base64(key, peer->public_key);
                        printf(" - peer %s\n", key);
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/wireguard.c 
new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/wireguard.c
--- old/wireguard-tools-1.0.20200121/contrib/embeddable-wg-library/wireguard.c  
2020-01-21 15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/contrib/embeddable-wg-library/wireguard.c  
2020-02-06 16:19:47.000000000 +0100
@@ -856,85 +856,73 @@
 
 /* wireguard-specific parts: */
 
-struct inflatable_buffer {
+struct string_list {
        char *buffer;
-       char *next;
-       bool good;
        size_t len;
-       size_t pos;
+       size_t cap;
 };
 
-#define max(a, b) ((a) > (b) ? (a) : (b))
-
-static int add_next_to_inflatable_buffer(struct inflatable_buffer *buffer)
+static int string_list_add(struct string_list *list, const char *str)
 {
-       size_t len, expand_to;
-       char *new_buffer;
+       size_t len = strlen(str) + 1;
 
-       if (!buffer->good || !buffer->next) {
-               free(buffer->next);
-               buffer->good = false;
+       if (len == 1)
                return 0;
-       }
 
-       len = strlen(buffer->next) + 1;
-
-       if (len == 1) {
-               free(buffer->next);
-               buffer->good = false;
-               return 0;
-       }
-
-       if (buffer->len - buffer->pos <= len) {
-               expand_to = max(buffer->len * 2, buffer->len + len + 1);
-               new_buffer = realloc(buffer->buffer, expand_to);
-               if (!new_buffer) {
-                       free(buffer->next);
-                       buffer->good = false;
+       if (len >= list->cap - list->len) {
+               char *new_buffer;
+               size_t new_cap = list->cap * 2;
+
+               if (new_cap <  list->len +len + 1)
+                       new_cap = list->len + len + 1;
+               new_buffer = realloc(list->buffer, new_cap);
+               if (!new_buffer)
                        return -errno;
-               }
-               memset(&new_buffer[buffer->len], 0, expand_to - buffer->len);
-               buffer->buffer = new_buffer;
-               buffer->len = expand_to;
-       }
-       memcpy(&buffer->buffer[buffer->pos], buffer->next, len);
-       free(buffer->next);
-       buffer->good = false;
-       buffer->pos += len;
+               list->buffer = new_buffer;
+               list->cap = new_cap;
+       }
+       memcpy(list->buffer + list->len, str, len);
+       list->len += len;
+       list->buffer[list->len] = '\0';
        return 0;
 }
 
+struct interface {
+       const char *name;
+       bool is_wireguard;
+};
+
 static int parse_linkinfo(const struct nlattr *attr, void *data)
 {
-       struct inflatable_buffer *buffer = data;
+       struct interface *interface = data;
 
        if (mnl_attr_get_type(attr) == IFLA_INFO_KIND && !strcmp(WG_GENL_NAME, 
mnl_attr_get_str(attr)))
-               buffer->good = true;
+               interface->is_wireguard = true;
        return MNL_CB_OK;
 }
 
 static int parse_infomsg(const struct nlattr *attr, void *data)
 {
-       struct inflatable_buffer *buffer = data;
+       struct interface *interface = data;
 
        if (mnl_attr_get_type(attr) == IFLA_LINKINFO)
                return mnl_attr_parse_nested(attr, parse_linkinfo, data);
        else if (mnl_attr_get_type(attr) == IFLA_IFNAME)
-               buffer->next = strdup(mnl_attr_get_str(attr));
+               interface->name = mnl_attr_get_str(attr);
        return MNL_CB_OK;
 }
 
 static int read_devices_cb(const struct nlmsghdr *nlh, void *data)
 {
-       struct inflatable_buffer *buffer = data;
+       struct string_list *list = data;
+       struct interface interface = { 0 };
        int ret;
 
-       buffer->good = false;
-       buffer->next = NULL;
-       ret = mnl_attr_parse(nlh, sizeof(struct ifinfomsg), parse_infomsg, 
data);
+       ret = mnl_attr_parse(nlh, sizeof(struct ifinfomsg), parse_infomsg, 
&interface);
        if (ret != MNL_CB_OK)
                return ret;
-       ret = add_next_to_inflatable_buffer(buffer);
+       if (interface.name && interface.is_wireguard)
+               ret = string_list_add(list, interface.name);
        if (ret < 0)
                return ret;
        if (nlh->nlmsg_type != NLMSG_DONE)
@@ -942,7 +930,7 @@
        return MNL_CB_OK;
 }
 
-static int fetch_device_names(struct inflatable_buffer *buffer)
+static int fetch_device_names(struct string_list *list)
 {
        struct mnl_socket *nl = NULL;
        char *rtnl_buffer = NULL;
@@ -989,7 +977,7 @@
                ret = -errno;
                goto cleanup;
        }
-       if ((len = mnl_cb_run(rtnl_buffer, len, seq, portid, read_devices_cb, 
buffer)) < 0) {
+       if ((len = mnl_cb_run(rtnl_buffer, len, seq, portid, read_devices_cb, 
list)) < 0) {
                /* Netlink returns NLM_F_DUMP_INTR if the set of all tunnels 
changed
                 * during the dump. That's unfortunate, but is pretty common on 
busy
                 * systems that are adding and removing tunnels all the time. 
Rather
@@ -1463,22 +1451,15 @@
 /* first\0second\0third\0forth\0last\0\0 */
 char *wg_list_device_names(void)
 {
-       struct inflatable_buffer buffer = { .len = MNL_SOCKET_BUFFER_SIZE };
-       int ret;
-
-       ret = -ENOMEM;
-       buffer.buffer = calloc(1, buffer.len);
-       if (!buffer.buffer)
-               goto err;
+       struct string_list list = { 0 };
+       int ret = fetch_device_names(&list);
 
-       ret = fetch_device_names(&buffer);
-err:
        errno = -ret;
        if (errno) {
-               free(buffer.buffer);
+               free(list.buffer);
                return NULL;
        }
-       return buffer.buffer;
+       return list.buffer ?: strdup("\0");
 }
 
 int wg_add_device(const char *device_name)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/wireguard-tools-1.0.20200121/contrib/extract-handshakes/Makefile 
new/wireguard-tools-1.0.20200206/contrib/extract-handshakes/Makefile
--- old/wireguard-tools-1.0.20200121/contrib/extract-handshakes/Makefile        
2020-01-21 15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/contrib/extract-handshakes/Makefile        
2020-02-06 16:19:47.000000000 +0100
@@ -20,10 +20,5 @@
 
 .PHONY: clean
 else
-offset-finder-m := offset-finder.o
-oldsrc := $(src)
-src := $(src)/../../../src
-include $(src)/compat/Kbuild.include
-include $(src)/crypto/Kbuild.include
-src := $(oldsrc)
+obj-m := offset-finder.o
 endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/wireguard-tools-1.0.20200121/contrib/extract-handshakes/offset-finder.c 
new/wireguard-tools-1.0.20200206/contrib/extract-handshakes/offset-finder.c
--- old/wireguard-tools-1.0.20200121/contrib/extract-handshakes/offset-finder.c 
2020-01-21 15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/contrib/extract-handshakes/offset-finder.c 
2020-02-06 16:19:47.000000000 +0100
@@ -11,7 +11,7 @@
 extern const struct def defs[];
 
 #ifdef __KERNEL__
-#include "../../../src/noise.h"
+#include "../drivers/net/wireguard/noise.h"
 
 const struct def defs[] = {
        { "LOCAL_STATIC_PRIVATE_KEY", offsetof(struct noise_static_identity, 
static_private), offsetof(struct noise_handshake, static_identity) },
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/wireguard-tools-1.0.20200121/contrib/extract-keys/Makefile 
new/wireguard-tools-1.0.20200206/contrib/extract-keys/Makefile
--- old/wireguard-tools-1.0.20200121/contrib/extract-keys/Makefile      
2020-01-21 15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/contrib/extract-keys/Makefile      
2020-02-06 16:19:47.000000000 +0100
@@ -23,10 +23,5 @@
 
 .PHONY: clean
 else
-config-m := config.o
-oldsrc := $(src)
-src := $(src)/../../../src
-include $(src)/compat/Kbuild.include
-include $(src)/crypto/Kbuild.include
-src := $(oldsrc)
+obj-m := config.o
 endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/wireguard-tools-1.0.20200121/contrib/extract-keys/config.c 
new/wireguard-tools-1.0.20200206/contrib/extract-keys/config.c
--- old/wireguard-tools-1.0.20200121/contrib/extract-keys/config.c      
2020-01-21 15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/contrib/extract-keys/config.c      
2020-02-06 16:19:47.000000000 +0100
@@ -10,9 +10,9 @@
 extern const struct def defs[];
 
 #ifdef __KERNEL__
-#include "../../../src/device.h"
-#include "../../../src/peer.h"
-#include "../../../src/noise.h"
+#include "../drivers/net/wireguard/device.h"
+#include "../drivers/net/wireguard/peer.h"
+#include "../drivers/net/wireguard/noise.h"
 const struct def defs[] = {
        { "SOCK_DEVICE_OFFSET", offsetof(struct sock, sk_user_data) },
        { "DEVICE_NAME_OFFSET", -ALIGN(sizeof(struct net_device), NETDEV_ALIGN) 
+ offsetof(struct net_device, name) },
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/Makefile 
new/wireguard-tools-1.0.20200206/src/Makefile
--- old/wireguard-tools-1.0.20200121/src/Makefile       2020-01-21 
15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/Makefile       2020-02-06 
16:19:47.000000000 +0100
@@ -50,12 +50,6 @@
 ifneq ($(WIREGUARD_TOOLS_VERSION),)
 CFLAGS += -D'WIREGUARD_TOOLS_VERSION="$(WIREGUARD_TOOLS_VERSION)"'
 endif
-ifeq ($(PLATFORM),linux)
-LIBMNL_CFLAGS := $(shell $(PKG_CONFIG) --cflags libmnl 2>/dev/null)
-LIBMNL_LDLIBS := $(shell $(PKG_CONFIG) --libs libmnl 2>/dev/null || echo -lmnl)
-CFLAGS += $(LIBMNL_CFLAGS)
-LDLIBS += $(LIBMNL_LDLIBS)
-endif
 ifeq ($(PLATFORM),haiku)
 LDLIBS += -lnetwork -lbsd
 endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/fuzz/Makefile 
new/wireguard-tools-1.0.20200206/src/fuzz/Makefile
--- old/wireguard-tools-1.0.20200121/src/fuzz/Makefile  2020-01-21 
15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/fuzz/Makefile  2020-02-06 
16:19:47.000000000 +0100
@@ -20,13 +20,13 @@
        $(CC) $(CFLAGS) -o $@ $<
 
 cmd: cmd.c $(wildcard ../*.c)
-       $(CC) $(CFLAGS) -D'RUNSTATEDIR="/var/empty"' -D'main(a,b)=wg_main(a,b)' 
-o $@ $^ -lmnl
+       $(CC) $(CFLAGS) -D'RUNSTATEDIR="/var/empty"' -D'main(a,b)=wg_main(a,b)' 
-o $@ $^
 
-set: set.c ../set.c ../ipc.c ../encoding.c ../mnlg.c ../curve25519.c 
../config.c
-       $(CC) $(CFLAGS) -o $@ $< -lmnl
+set: set.c ../set.c ../ipc.c ../encoding.c ../curve25519.c ../config.c
+       $(CC) $(CFLAGS) -o $@ $<
 
-setconf: setconf.c ../setconf.c ../ipc.c ../encoding.c ../mnlg.c 
../curve25519.c ../config.c
-       $(CC) $(CFLAGS) -o $@ $< -lmnl
+setconf: setconf.c ../setconf.c ../ipc.c ../encoding.c ../curve25519.c 
../config.c
+       $(CC) $(CFLAGS) -o $@ $<
 
 clean:
        $(RM) $(FUZZERS)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/fuzz/set.c 
new/wireguard-tools-1.0.20200206/src/fuzz/set.c
--- old/wireguard-tools-1.0.20200121/src/fuzz/set.c     2020-01-21 
15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/fuzz/set.c     2020-02-06 
16:19:47.000000000 +0100
@@ -15,7 +15,6 @@
 static FILE *hacked_fopen(const char *pathname, const char *mode);
 #define fopen hacked_fopen
 #include "../config.c"
-#include "../mnlg.c"
 #include "../set.c"
 #undef stderr
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/fuzz/setconf.c 
new/wireguard-tools-1.0.20200206/src/fuzz/setconf.c
--- old/wireguard-tools-1.0.20200121/src/fuzz/setconf.c 2020-01-21 
15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/fuzz/setconf.c 2020-02-06 
16:19:47.000000000 +0100
@@ -13,7 +13,6 @@
 #undef parse_allowedips
 #include "../encoding.c"
 #include "../config.c"
-#include "../mnlg.c"
 static FILE *hacked_fopen(const char *pathname, const char *mode);
 #define fopen hacked_fopen
 #include "../setconf.c"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/ipc.c 
new/wireguard-tools-1.0.20200206/src/ipc.c
--- old/wireguard-tools-1.0.20200121/src/ipc.c  2020-01-21 15:51:31.000000000 
+0100
+++ new/wireguard-tools-1.0.20200206/src/ipc.c  2020-02-06 16:19:47.000000000 
+0100
@@ -4,13 +4,10 @@
  */
 
 #ifdef __linux__
-#include <libmnl/libmnl.h>
 #include <linux/if_link.h>
-#include <linux/netlink.h>
 #include <linux/rtnetlink.h>
-#include <linux/genetlink.h>
 #include <linux/wireguard.h>
-#include "mnlg.h"
+#include "netlink.h"
 #endif
 #include <netinet/in.h>
 #include <sys/socket.h>
@@ -43,7 +40,7 @@
 #define SOCK_PATH RUNSTATEDIR "/wireguard/"
 #define SOCK_SUFFIX ".sock"
 #ifdef __linux__
-#define SOCKET_BUFFER_SIZE MNL_SOCKET_BUFFER_SIZE
+#define SOCKET_BUFFER_SIZE (mnl_ideal_socket_buffer_size())
 #else
 #define SOCKET_BUFFER_SIZE 8192
 #endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/man/wg.8 
new/wireguard-tools-1.0.20200206/src/man/wg.8
--- old/wireguard-tools-1.0.20200121/src/man/wg.8       2020-01-21 
15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/man/wg.8       2020-02-06 
16:19:47.000000000 +0100
@@ -212,6 +212,15 @@
 .br
     AllowedIPs = 10.10.10.230/32
 
+.SH DEBUGGING INFORMATION
+Sometimes it is useful to have information on the current runtime state of a 
tunnel. When using the Linux kernel module on a kernel that supports dynamic 
debugging, debugging information can be written into
+.BR dmesg (1)
+by running as root:
+
+\fB    # modprobe wireguard && echo module wireguard +p > 
/sys/kernel/debug/dynamic_debug/control\fP
+
+On userspace implementations, it is customary to set the \fILOG_LEVEL\fP 
environment variable to \fIdebug\fP.
+
 .SH ENVIRONMENT VARIABLES
 .TP
 .I WG_COLOR_MODE
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/mnlg.c 
new/wireguard-tools-1.0.20200206/src/mnlg.c
--- old/wireguard-tools-1.0.20200121/src/mnlg.c 2020-01-21 15:51:31.000000000 
+0100
+++ new/wireguard-tools-1.0.20200206/src/mnlg.c 1970-01-01 01:00:00.000000000 
+0100
@@ -1,330 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-/*
- * Copyright (C) 2015-2020 Jason A. Donenfeld <[email protected]>. All Rights 
Reserved.
- *
- * Original author: Jiri Pirko <[email protected]>
- */
-
-#ifdef __linux__
-
-#include <stdlib.h>
-#include <stdbool.h>
-#include <string.h>
-#include <errno.h>
-#include <unistd.h>
-#include <time.h>
-#include <libmnl/libmnl.h>
-#include <linux/genetlink.h>
-
-#include "mnlg.h"
-
-struct mnlg_socket {
-       struct mnl_socket *nl;
-       char *buf;
-       uint16_t id;
-       uint8_t version;
-       unsigned int seq;
-       unsigned int portid;
-};
-
-static struct nlmsghdr *__mnlg_msg_prepare(struct mnlg_socket *nlg, uint8_t 
cmd,
-                                          uint16_t flags, uint16_t id,
-                                          uint8_t version)
-{
-       struct nlmsghdr *nlh;
-       struct genlmsghdr *genl;
-
-       nlh = mnl_nlmsg_put_header(nlg->buf);
-       nlh->nlmsg_type = id;
-       nlh->nlmsg_flags = flags;
-       nlg->seq = time(NULL);
-       nlh->nlmsg_seq = nlg->seq;
-
-       genl = mnl_nlmsg_put_extra_header(nlh, sizeof(struct genlmsghdr));
-       genl->cmd = cmd;
-       genl->version = version;
-
-       return nlh;
-}
-
-struct nlmsghdr *mnlg_msg_prepare(struct mnlg_socket *nlg, uint8_t cmd,
-                                 uint16_t flags)
-{
-       return __mnlg_msg_prepare(nlg, cmd, flags, nlg->id, nlg->version);
-}
-
-int mnlg_socket_send(struct mnlg_socket *nlg, const struct nlmsghdr *nlh)
-{
-       return mnl_socket_sendto(nlg->nl, nlh, nlh->nlmsg_len);
-}
-
-static int mnlg_cb_noop(const struct nlmsghdr *nlh, void *data)
-{
-       (void)nlh;
-       (void)data;
-       return MNL_CB_OK;
-}
-
-static int mnlg_cb_error(const struct nlmsghdr *nlh, void *data)
-{
-       const struct nlmsgerr *err = mnl_nlmsg_get_payload(nlh);
-       (void)data;
-
-       if (nlh->nlmsg_len < mnl_nlmsg_size(sizeof(struct nlmsgerr))) {
-               errno = EBADMSG;
-               return MNL_CB_ERROR;
-       }
-       /* Netlink subsystems returns the errno value with different signess */
-       if (err->error < 0)
-               errno = -err->error;
-       else
-               errno = err->error;
-
-       return err->error == 0 ? MNL_CB_STOP : MNL_CB_ERROR;
-}
-
-static int mnlg_cb_stop(const struct nlmsghdr *nlh, void *data)
-{
-       (void)data;
-       if (nlh->nlmsg_flags & NLM_F_MULTI && nlh->nlmsg_len == 
mnl_nlmsg_size(sizeof(int))) {
-               int error = *(int *)mnl_nlmsg_get_payload(nlh);
-               /* Netlink subsystems returns the errno value with different 
signess */
-               if (error < 0)
-                       errno = -error;
-               else
-                       errno = error;
-
-               return error == 0 ? MNL_CB_STOP : MNL_CB_ERROR;
-       }
-       return MNL_CB_STOP;
-}
-
-static mnl_cb_t mnlg_cb_array[] = {
-       [NLMSG_NOOP]    = mnlg_cb_noop,
-       [NLMSG_ERROR]   = mnlg_cb_error,
-       [NLMSG_DONE]    = mnlg_cb_stop,
-       [NLMSG_OVERRUN] = mnlg_cb_noop,
-};
-
-int mnlg_socket_recv_run(struct mnlg_socket *nlg, mnl_cb_t data_cb, void *data)
-{
-       int err;
-
-       do {
-               err = mnl_socket_recvfrom(nlg->nl, nlg->buf,
-                                         MNL_SOCKET_BUFFER_SIZE);
-               if (err <= 0)
-                       break;
-               err = mnl_cb_run2(nlg->buf, err, nlg->seq, nlg->portid,
-                                 data_cb, data, mnlg_cb_array, 
MNL_ARRAY_SIZE(mnlg_cb_array));
-       } while (err > 0);
-
-       return err;
-}
-
-struct group_info {
-       bool found;
-       uint32_t id;
-       const char *name;
-};
-
-static int parse_mc_grps_cb(const struct nlattr *attr, void *data)
-{
-       const struct nlattr **tb = data;
-       int type = mnl_attr_get_type(attr);
-
-       if (mnl_attr_type_valid(attr, CTRL_ATTR_MCAST_GRP_MAX) < 0)
-               return MNL_CB_OK;
-
-       switch (type) {
-       case CTRL_ATTR_MCAST_GRP_ID:
-               if (mnl_attr_validate(attr, MNL_TYPE_U32) < 0)
-                       return MNL_CB_ERROR;
-               break;
-       case CTRL_ATTR_MCAST_GRP_NAME:
-               if (mnl_attr_validate(attr, MNL_TYPE_STRING) < 0)
-                       return MNL_CB_ERROR;
-               break;
-       }
-       tb[type] = attr;
-       return MNL_CB_OK;
-}
-
-static void parse_genl_mc_grps(struct nlattr *nested,
-                              struct group_info *group_info)
-{
-       struct nlattr *pos;
-       const char *name;
-
-       mnl_attr_for_each_nested(pos, nested) {
-               struct nlattr *tb[CTRL_ATTR_MCAST_GRP_MAX + 1] = {};
-
-               mnl_attr_parse_nested(pos, parse_mc_grps_cb, tb);
-               if (!tb[CTRL_ATTR_MCAST_GRP_NAME] ||
-                   !tb[CTRL_ATTR_MCAST_GRP_ID])
-                       continue;
-
-               name = mnl_attr_get_str(tb[CTRL_ATTR_MCAST_GRP_NAME]);
-               if (strcmp(name, group_info->name) != 0)
-                       continue;
-
-               group_info->id = mnl_attr_get_u32(tb[CTRL_ATTR_MCAST_GRP_ID]);
-               group_info->found = true;
-       }
-}
-
-static int get_group_id_attr_cb(const struct nlattr *attr, void *data)
-{
-       const struct nlattr **tb = data;
-       int type = mnl_attr_get_type(attr);
-
-       if (mnl_attr_type_valid(attr, CTRL_ATTR_MAX) < 0)
-               return MNL_CB_ERROR;
-
-       if (type == CTRL_ATTR_MCAST_GROUPS &&
-           mnl_attr_validate(attr, MNL_TYPE_NESTED) < 0)
-               return MNL_CB_ERROR;
-       tb[type] = attr;
-       return MNL_CB_OK;
-}
-
-static int get_group_id_cb(const struct nlmsghdr *nlh, void *data)
-{
-       struct group_info *group_info = data;
-       struct nlattr *tb[CTRL_ATTR_MAX + 1] = { 0 };
-
-       mnl_attr_parse(nlh, sizeof(struct genlmsghdr), get_group_id_attr_cb, 
tb);
-       if (!tb[CTRL_ATTR_MCAST_GROUPS])
-               return MNL_CB_ERROR;
-       parse_genl_mc_grps(tb[CTRL_ATTR_MCAST_GROUPS], group_info);
-       return MNL_CB_OK;
-}
-
-int mnlg_socket_group_add(struct mnlg_socket *nlg, const char *group_name)
-{
-       struct nlmsghdr *nlh;
-       struct group_info group_info;
-       int err;
-
-       nlh = __mnlg_msg_prepare(nlg, CTRL_CMD_GETFAMILY,
-                                NLM_F_REQUEST | NLM_F_ACK, GENL_ID_CTRL, 1);
-       mnl_attr_put_u16(nlh, CTRL_ATTR_FAMILY_ID, nlg->id);
-
-       err = mnlg_socket_send(nlg, nlh);
-       if (err < 0)
-               return err;
-
-       group_info.found = false;
-       group_info.name = group_name;
-       err = mnlg_socket_recv_run(nlg, get_group_id_cb, &group_info);
-       if (err < 0)
-               return err;
-
-       if (!group_info.found) {
-               errno = ENOENT;
-               return -1;
-       }
-
-       err = mnl_socket_setsockopt(nlg->nl, NETLINK_ADD_MEMBERSHIP,
-                                   &group_info.id, sizeof(group_info.id));
-       if (err < 0)
-               return err;
-
-       return 0;
-}
-
-static int get_family_id_attr_cb(const struct nlattr *attr, void *data)
-{
-       const struct nlattr **tb = data;
-       int type = mnl_attr_get_type(attr);
-
-       if (mnl_attr_type_valid(attr, CTRL_ATTR_MAX) < 0)
-               return MNL_CB_ERROR;
-
-       if (type == CTRL_ATTR_FAMILY_ID &&
-           mnl_attr_validate(attr, MNL_TYPE_U16) < 0)
-               return MNL_CB_ERROR;
-       tb[type] = attr;
-       return MNL_CB_OK;
-}
-
-static int get_family_id_cb(const struct nlmsghdr *nlh, void *data)
-{
-       uint16_t *p_id = data;
-       struct nlattr *tb[CTRL_ATTR_MAX + 1] = { 0 };
-
-       mnl_attr_parse(nlh, sizeof(struct genlmsghdr), get_family_id_attr_cb, 
tb);
-       if (!tb[CTRL_ATTR_FAMILY_ID])
-               return MNL_CB_ERROR;
-       *p_id = mnl_attr_get_u16(tb[CTRL_ATTR_FAMILY_ID]);
-       return MNL_CB_OK;
-}
-
-struct mnlg_socket *mnlg_socket_open(const char *family_name, uint8_t version)
-{
-       struct mnlg_socket *nlg;
-       struct nlmsghdr *nlh;
-       int err;
-
-       nlg = malloc(sizeof(*nlg));
-       if (!nlg)
-               return NULL;
-
-       err = -ENOMEM;
-       nlg->buf = malloc(MNL_SOCKET_BUFFER_SIZE);
-       if (!nlg->buf)
-               goto err_buf_alloc;
-
-       nlg->nl = mnl_socket_open(NETLINK_GENERIC);
-       if (!nlg->nl) {
-               err = -errno;
-               goto err_mnl_socket_open;
-       }
-
-       if (mnl_socket_bind(nlg->nl, 0, MNL_SOCKET_AUTOPID) < 0) {
-               err = -errno;
-               goto err_mnl_socket_bind;
-       }
-
-       nlg->portid = mnl_socket_get_portid(nlg->nl);
-
-       nlh = __mnlg_msg_prepare(nlg, CTRL_CMD_GETFAMILY,
-                                NLM_F_REQUEST | NLM_F_ACK, GENL_ID_CTRL, 1);
-       mnl_attr_put_strz(nlh, CTRL_ATTR_FAMILY_NAME, family_name);
-
-       if (mnlg_socket_send(nlg, nlh) < 0) {
-               err = -errno;
-               goto err_mnlg_socket_send;
-       }
-
-       errno = 0;
-       if (mnlg_socket_recv_run(nlg, get_family_id_cb, &nlg->id) < 0) {
-               errno = errno == ENOENT ? EPROTONOSUPPORT : errno;
-               err = errno ? -errno : -ENOSYS;
-               goto err_mnlg_socket_recv_run;
-       }
-
-       nlg->version = version;
-       errno = 0;
-       return nlg;
-
-err_mnlg_socket_recv_run:
-err_mnlg_socket_send:
-err_mnl_socket_bind:
-       mnl_socket_close(nlg->nl);
-err_mnl_socket_open:
-       free(nlg->buf);
-err_buf_alloc:
-       free(nlg);
-       errno = -err;
-       return NULL;
-}
-
-void mnlg_socket_close(struct mnlg_socket *nlg)
-{
-       mnl_socket_close(nlg->nl);
-       free(nlg->buf);
-       free(nlg);
-}
-
-#endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/mnlg.h 
new/wireguard-tools-1.0.20200206/src/mnlg.h
--- old/wireguard-tools-1.0.20200121/src/mnlg.h 2020-01-21 15:51:31.000000000 
+0100
+++ new/wireguard-tools-1.0.20200206/src/mnlg.h 1970-01-01 01:00:00.000000000 
+0100
@@ -1,25 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-/*
- * Copyright (C) 2015-2020 Jason A. Donenfeld <[email protected]>. All Rights 
Reserved.
- *
- * Original author: Jiri Pirko <[email protected]>
- */
-
-#ifndef MNLG_H
-#define MNLG_H
-#ifdef __linux__
-
-#include <libmnl/libmnl.h>
-
-struct mnlg_socket;
-
-struct nlmsghdr *mnlg_msg_prepare(struct mnlg_socket *nlg, uint8_t cmd,
-                                 uint16_t flags);
-int mnlg_socket_send(struct mnlg_socket *nlg, const struct nlmsghdr *nlh);
-int mnlg_socket_recv_run(struct mnlg_socket *nlg, mnl_cb_t data_cb, void 
*data);
-int mnlg_socket_group_add(struct mnlg_socket *nlg, const char *group_name);
-struct mnlg_socket *mnlg_socket_open(const char *family_name, uint8_t version);
-void mnlg_socket_close(struct mnlg_socket *nlg);
-
-#endif
-#endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/netlink.h 
new/wireguard-tools-1.0.20200206/src/netlink.h
--- old/wireguard-tools-1.0.20200121/src/netlink.h      1970-01-01 
01:00:00.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/netlink.h      2020-02-06 
16:19:47.000000000 +0100
@@ -0,0 +1,796 @@
+// SPDX-License-Identifier: LGPL-2.1+
+/*
+ * Copyright (C) 2015-2020 Jason A. Donenfeld <[email protected]>. All Rights 
Reserved.
+ * Copyright (C) 2008-2012 Pablo Neira Ayuso <[email protected]>.
+ */
+
+/* This is a minimized version of libmnl meant to be #include'd */
+
+#include <unistd.h>
+#include <stdio.h>
+#include <string.h>
+#include <stdint.h>
+#include <stdbool.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <time.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <linux/netlink.h>
+#include <linux/genetlink.h>
+
+#define MNL_SOCKET_AUTOPID 0
+#define MNL_ALIGNTO 4
+#define MNL_ALIGN(len) (((len)+MNL_ALIGNTO-1) & ~(MNL_ALIGNTO-1))
+#define MNL_NLMSG_HDRLEN MNL_ALIGN(sizeof(struct nlmsghdr))
+#define MNL_ATTR_HDRLEN MNL_ALIGN(sizeof(struct nlattr))
+
+enum mnl_attr_data_type {
+       MNL_TYPE_UNSPEC,
+       MNL_TYPE_U8,
+       MNL_TYPE_U16,
+       MNL_TYPE_U32,
+       MNL_TYPE_U64,
+       MNL_TYPE_STRING,
+       MNL_TYPE_FLAG,
+       MNL_TYPE_MSECS,
+       MNL_TYPE_NESTED,
+       MNL_TYPE_NESTED_COMPAT,
+       MNL_TYPE_NUL_STRING,
+       MNL_TYPE_BINARY,
+       MNL_TYPE_MAX,
+};
+
+#define mnl_attr_for_each(attr, nlh, offset) \
+       for ((attr) = mnl_nlmsg_get_payload_offset((nlh), (offset)); \
+            mnl_attr_ok((attr), (char *)mnl_nlmsg_get_payload_tail(nlh) - 
(char *)(attr)); \
+            (attr) = mnl_attr_next(attr))
+
+#define mnl_attr_for_each_nested(attr, nest) \
+       for ((attr) = mnl_attr_get_payload(nest); \
+            mnl_attr_ok((attr), (char *)mnl_attr_get_payload(nest) + 
mnl_attr_get_payload_len(nest) - (char *)(attr)); \
+            (attr) = mnl_attr_next(attr))
+
+#define mnl_attr_for_each_payload(payload, payload_size) \
+       for ((attr) = (payload); \
+            mnl_attr_ok((attr), (char *)(payload) + payload_size - (char 
*)(attr)); \
+            (attr) = mnl_attr_next(attr))
+
+#define MNL_CB_ERROR   -1
+#define MNL_CB_STOP    0
+#define MNL_CB_OK      1
+
+typedef int (*mnl_attr_cb_t)(const struct nlattr *attr, void *data);
+typedef int (*mnl_cb_t)(const struct nlmsghdr *nlh, void *data);
+
+#ifndef MNL_ARRAY_SIZE
+#define MNL_ARRAY_SIZE(a) (sizeof(a)/sizeof((a)[0]))
+#endif
+
+static size_t mnl_ideal_socket_buffer_size(void)
+{
+       static size_t size = 0;
+
+       if (size)
+               return size;
+       size = (size_t)sysconf(_SC_PAGESIZE);
+       if (size > 8192)
+               size = 8192;
+       return size;
+}
+
+static size_t mnl_nlmsg_size(size_t len)
+{
+       return len + MNL_NLMSG_HDRLEN;
+}
+
+static struct nlmsghdr *mnl_nlmsg_put_header(void *buf)
+{
+       int len = MNL_ALIGN(sizeof(struct nlmsghdr));
+       struct nlmsghdr *nlh = buf;
+
+       memset(buf, 0, len);
+       nlh->nlmsg_len = len;
+       return nlh;
+}
+
+static void *mnl_nlmsg_put_extra_header(struct nlmsghdr *nlh, size_t size)
+{
+       char *ptr = (char *)nlh + nlh->nlmsg_len;
+       size_t len = MNL_ALIGN(size);
+       nlh->nlmsg_len += len;
+       memset(ptr, 0, len);
+       return ptr;
+}
+
+static void *mnl_nlmsg_get_payload(const struct nlmsghdr *nlh)
+{
+       return (void *)nlh + MNL_NLMSG_HDRLEN;
+}
+
+static void *mnl_nlmsg_get_payload_offset(const struct nlmsghdr *nlh, size_t 
offset)
+{
+       return (void *)nlh + MNL_NLMSG_HDRLEN + MNL_ALIGN(offset);
+}
+
+static bool mnl_nlmsg_ok(const struct nlmsghdr *nlh, int len)
+{
+       return len >= (int)sizeof(struct nlmsghdr) &&
+              nlh->nlmsg_len >= sizeof(struct nlmsghdr) &&
+              (int)nlh->nlmsg_len <= len;
+}
+
+static struct nlmsghdr *mnl_nlmsg_next(const struct nlmsghdr *nlh, int *len)
+{
+       *len -= MNL_ALIGN(nlh->nlmsg_len);
+       return (struct nlmsghdr *)((void *)nlh + MNL_ALIGN(nlh->nlmsg_len));
+}
+
+static void *mnl_nlmsg_get_payload_tail(const struct nlmsghdr *nlh)
+{
+       return (void *)nlh + MNL_ALIGN(nlh->nlmsg_len);
+}
+
+static bool mnl_nlmsg_seq_ok(const struct nlmsghdr *nlh, unsigned int seq)
+{
+       return nlh->nlmsg_seq && seq ? nlh->nlmsg_seq == seq : true;
+}
+
+static bool mnl_nlmsg_portid_ok(const struct nlmsghdr *nlh, unsigned int 
portid)
+{
+       return nlh->nlmsg_pid && portid ? nlh->nlmsg_pid == portid : true;
+}
+
+static uint16_t mnl_attr_get_type(const struct nlattr *attr)
+{
+       return attr->nla_type & NLA_TYPE_MASK;
+}
+
+static uint16_t mnl_attr_get_payload_len(const struct nlattr *attr)
+{
+       return attr->nla_len - MNL_ATTR_HDRLEN;
+}
+
+static void *mnl_attr_get_payload(const struct nlattr *attr)
+{
+       return (void *)attr + MNL_ATTR_HDRLEN;
+}
+
+static bool mnl_attr_ok(const struct nlattr *attr, int len)
+{
+       return len >= (int)sizeof(struct nlattr) &&
+              attr->nla_len >= sizeof(struct nlattr) &&
+              (int)attr->nla_len <= len;
+}
+
+static struct nlattr *mnl_attr_next(const struct nlattr *attr)
+{
+       return (struct nlattr *)((void *)attr + MNL_ALIGN(attr->nla_len));
+}
+
+static int mnl_attr_type_valid(const struct nlattr *attr, uint16_t max)
+{
+       if (mnl_attr_get_type(attr) > max) {
+               errno = EOPNOTSUPP;
+               return -1;
+       }
+       return 1;
+}
+
+static int __mnl_attr_validate(const struct nlattr *attr,
+                              enum mnl_attr_data_type type, size_t exp_len)
+{
+       uint16_t attr_len = mnl_attr_get_payload_len(attr);
+       const char *attr_data = mnl_attr_get_payload(attr);
+
+       if (attr_len < exp_len) {
+               errno = ERANGE;
+               return -1;
+       }
+       switch(type) {
+       case MNL_TYPE_FLAG:
+               if (attr_len > 0) {
+                       errno = ERANGE;
+                       return -1;
+               }
+               break;
+       case MNL_TYPE_NUL_STRING:
+               if (attr_len == 0) {
+                       errno = ERANGE;
+                       return -1;
+               }
+               if (attr_data[attr_len-1] != '\0') {
+                       errno = EINVAL;
+                       return -1;
+               }
+               break;
+       case MNL_TYPE_STRING:
+               if (attr_len == 0) {
+                       errno = ERANGE;
+                       return -1;
+               }
+               break;
+       case MNL_TYPE_NESTED:
+
+               if (attr_len == 0)
+                       break;
+
+               if (attr_len < MNL_ATTR_HDRLEN) {
+                       errno = ERANGE;
+                       return -1;
+               }
+               break;
+       default:
+
+               break;
+       }
+       if (exp_len && attr_len > exp_len) {
+               errno = ERANGE;
+               return -1;
+       }
+       return 0;
+}
+
+static const size_t mnl_attr_data_type_len[MNL_TYPE_MAX] = {
+       [MNL_TYPE_U8]           = sizeof(uint8_t),
+       [MNL_TYPE_U16]          = sizeof(uint16_t),
+       [MNL_TYPE_U32]          = sizeof(uint32_t),
+       [MNL_TYPE_U64]          = sizeof(uint64_t),
+       [MNL_TYPE_MSECS]        = sizeof(uint64_t),
+};
+
+static int mnl_attr_validate(const struct nlattr *attr, enum 
mnl_attr_data_type type)
+{
+       int exp_len;
+
+       if (type >= MNL_TYPE_MAX) {
+               errno = EINVAL;
+               return -1;
+       }
+       exp_len = mnl_attr_data_type_len[type];
+       return __mnl_attr_validate(attr, type, exp_len);
+}
+
+static int mnl_attr_parse(const struct nlmsghdr *nlh, unsigned int offset,
+                         mnl_attr_cb_t cb, void *data)
+{
+       int ret = MNL_CB_OK;
+       const struct nlattr *attr;
+
+       mnl_attr_for_each(attr, nlh, offset)
+               if ((ret = cb(attr, data)) <= MNL_CB_STOP)
+                       return ret;
+       return ret;
+}
+
+static int mnl_attr_parse_nested(const struct nlattr *nested, mnl_attr_cb_t cb,
+                                void *data)
+{
+       int ret = MNL_CB_OK;
+       const struct nlattr *attr;
+
+       mnl_attr_for_each_nested(attr, nested)
+               if ((ret = cb(attr, data)) <= MNL_CB_STOP)
+                       return ret;
+       return ret;
+}
+
+static uint8_t mnl_attr_get_u8(const struct nlattr *attr)
+{
+       return *((uint8_t *)mnl_attr_get_payload(attr));
+}
+
+static uint16_t mnl_attr_get_u16(const struct nlattr *attr)
+{
+       return *((uint16_t *)mnl_attr_get_payload(attr));
+}
+
+static uint32_t mnl_attr_get_u32(const struct nlattr *attr)
+{
+       return *((uint32_t *)mnl_attr_get_payload(attr));
+}
+
+static uint64_t mnl_attr_get_u64(const struct nlattr *attr)
+{
+       uint64_t tmp;
+       memcpy(&tmp, mnl_attr_get_payload(attr), sizeof(tmp));
+       return tmp;
+}
+
+static const char *mnl_attr_get_str(const struct nlattr *attr)
+{
+       return mnl_attr_get_payload(attr);
+}
+
+static void mnl_attr_put(struct nlmsghdr *nlh, uint16_t type, size_t len,
+                        const void *data)
+{
+       struct nlattr *attr = mnl_nlmsg_get_payload_tail(nlh);
+       uint16_t payload_len = MNL_ALIGN(sizeof(struct nlattr)) + len;
+       int pad;
+
+       attr->nla_type = type;
+       attr->nla_len = payload_len;
+       memcpy(mnl_attr_get_payload(attr), data, len);
+       nlh->nlmsg_len += MNL_ALIGN(payload_len);
+       pad = MNL_ALIGN(len) - len;
+       if (pad > 0)
+               memset(mnl_attr_get_payload(attr) + len, 0, pad);
+}
+
+static void mnl_attr_put_u16(struct nlmsghdr *nlh, uint16_t type, uint16_t 
data)
+{
+       mnl_attr_put(nlh, type, sizeof(uint16_t), &data);
+}
+
+static void mnl_attr_put_u32(struct nlmsghdr *nlh, uint16_t type, uint32_t 
data)
+{
+       mnl_attr_put(nlh, type, sizeof(uint32_t), &data);
+}
+
+static void mnl_attr_put_strz(struct nlmsghdr *nlh, uint16_t type, const char 
*data)
+{
+       mnl_attr_put(nlh, type, strlen(data)+1, data);
+}
+
+static struct nlattr *mnl_attr_nest_start(struct nlmsghdr *nlh, uint16_t type)
+{
+       struct nlattr *start = mnl_nlmsg_get_payload_tail(nlh);
+
+       start->nla_type = NLA_F_NESTED | type;
+       nlh->nlmsg_len += MNL_ALIGN(sizeof(struct nlattr));
+       return start;
+}
+
+static bool mnl_attr_put_check(struct nlmsghdr *nlh, size_t buflen,
+                              uint16_t type, size_t len, const void *data)
+{
+       if (nlh->nlmsg_len + MNL_ATTR_HDRLEN + MNL_ALIGN(len) > buflen)
+               return false;
+       mnl_attr_put(nlh, type, len, data);
+       return true;
+}
+
+static bool mnl_attr_put_u8_check(struct nlmsghdr *nlh, size_t buflen,
+                                 uint16_t type, uint8_t data)
+{
+       return mnl_attr_put_check(nlh, buflen, type, sizeof(uint8_t), &data);
+}
+
+static bool mnl_attr_put_u16_check(struct nlmsghdr *nlh, size_t buflen,
+                                  uint16_t type, uint16_t data)
+{
+       return mnl_attr_put_check(nlh, buflen, type, sizeof(uint16_t), &data);
+}
+
+static bool mnl_attr_put_u32_check(struct nlmsghdr *nlh, size_t buflen,
+                                  uint16_t type, uint32_t data)
+{
+       return mnl_attr_put_check(nlh, buflen, type, sizeof(uint32_t), &data);
+}
+
+static struct nlattr *mnl_attr_nest_start_check(struct nlmsghdr *nlh, size_t 
buflen,
+                                               uint16_t type)
+{
+       if (nlh->nlmsg_len + MNL_ATTR_HDRLEN > buflen)
+               return NULL;
+       return mnl_attr_nest_start(nlh, type);
+}
+
+static void mnl_attr_nest_end(struct nlmsghdr *nlh, struct nlattr *start)
+{
+       start->nla_len = mnl_nlmsg_get_payload_tail(nlh) - (void *)start;
+}
+
+static void mnl_attr_nest_cancel(struct nlmsghdr *nlh, struct nlattr *start)
+{
+       nlh->nlmsg_len -= mnl_nlmsg_get_payload_tail(nlh) - (void *)start;
+}
+
+static int mnl_cb_noop(__attribute__((unused)) const struct nlmsghdr *nlh, 
__attribute__((unused)) void *data)
+{
+       return MNL_CB_OK;
+}
+
+static int mnl_cb_error(const struct nlmsghdr *nlh, __attribute__((unused)) 
void *data)
+{
+       const struct nlmsgerr *err = mnl_nlmsg_get_payload(nlh);
+
+       if (nlh->nlmsg_len < mnl_nlmsg_size(sizeof(struct nlmsgerr))) {
+               errno = EBADMSG;
+               return MNL_CB_ERROR;
+       }
+
+       if (err->error < 0)
+               errno = -err->error;
+       else
+               errno = err->error;
+
+       return err->error == 0 ? MNL_CB_STOP : MNL_CB_ERROR;
+}
+
+static int mnl_cb_stop(__attribute__((unused)) const struct nlmsghdr *nlh, 
__attribute__((unused)) void *data)
+{
+       return MNL_CB_STOP;
+}
+
+static const mnl_cb_t default_cb_array[NLMSG_MIN_TYPE] = {
+       [NLMSG_NOOP]    = mnl_cb_noop,
+       [NLMSG_ERROR]   = mnl_cb_error,
+       [NLMSG_DONE]    = mnl_cb_stop,
+       [NLMSG_OVERRUN] = mnl_cb_noop,
+};
+
+static int __mnl_cb_run(const void *buf, size_t numbytes,
+                       unsigned int seq, unsigned int portid,
+                       mnl_cb_t cb_data, void *data,
+                       const mnl_cb_t *cb_ctl_array,
+                       unsigned int cb_ctl_array_len)
+{
+       int ret = MNL_CB_OK, len = numbytes;
+       const struct nlmsghdr *nlh = buf;
+
+       while (mnl_nlmsg_ok(nlh, len)) {
+
+               if (!mnl_nlmsg_portid_ok(nlh, portid)) {
+                       errno = ESRCH;
+                       return -1;
+               }
+
+               if (!mnl_nlmsg_seq_ok(nlh, seq)) {
+                       errno = EPROTO;
+                       return -1;
+               }
+
+               if (nlh->nlmsg_flags & NLM_F_DUMP_INTR) {
+                       errno = EINTR;
+                       return -1;
+               }
+
+               if (nlh->nlmsg_type >= NLMSG_MIN_TYPE) {
+                       if (cb_data){
+                               ret = cb_data(nlh, data);
+                               if (ret <= MNL_CB_STOP)
+                                       goto out;
+                       }
+               } else if (nlh->nlmsg_type < cb_ctl_array_len) {
+                       if (cb_ctl_array && cb_ctl_array[nlh->nlmsg_type]) {
+                               ret = cb_ctl_array[nlh->nlmsg_type](nlh, data);
+                               if (ret <= MNL_CB_STOP)
+                                       goto out;
+                       }
+               } else if (default_cb_array[nlh->nlmsg_type]) {
+                       ret = default_cb_array[nlh->nlmsg_type](nlh, data);
+                       if (ret <= MNL_CB_STOP)
+                               goto out;
+               }
+               nlh = mnl_nlmsg_next(nlh, &len);
+       }
+out:
+       return ret;
+}
+
+static int mnl_cb_run2(const void *buf, size_t numbytes, unsigned int seq,
+                      unsigned int portid, mnl_cb_t cb_data, void *data,
+                      const mnl_cb_t *cb_ctl_array, unsigned int 
cb_ctl_array_len)
+{
+       return __mnl_cb_run(buf, numbytes, seq, portid, cb_data, data,
+                           cb_ctl_array, cb_ctl_array_len);
+}
+
+static int mnl_cb_run(const void *buf, size_t numbytes, unsigned int seq,
+                     unsigned int portid, mnl_cb_t cb_data, void *data)
+{
+       return __mnl_cb_run(buf, numbytes, seq, portid, cb_data, data, NULL, 0);
+}
+
+struct mnl_socket {
+       int                     fd;
+       struct sockaddr_nl      addr;
+};
+
+static unsigned int mnl_socket_get_portid(const struct mnl_socket *nl)
+{
+       return nl->addr.nl_pid;
+}
+
+static struct mnl_socket *__mnl_socket_open(int bus, int flags)
+{
+       struct mnl_socket *nl;
+
+       nl = calloc(1, sizeof(struct mnl_socket));
+       if (nl == NULL)
+               return NULL;
+
+       nl->fd = socket(AF_NETLINK, SOCK_RAW | flags, bus);
+       if (nl->fd == -1) {
+               free(nl);
+               return NULL;
+       }
+
+       return nl;
+}
+
+static struct mnl_socket *mnl_socket_open(int bus)
+{
+       return __mnl_socket_open(bus, 0);
+}
+
+static int mnl_socket_bind(struct mnl_socket *nl, unsigned int groups, pid_t 
pid)
+{
+       int ret;
+       socklen_t addr_len;
+
+       nl->addr.nl_family = AF_NETLINK;
+       nl->addr.nl_groups = groups;
+       nl->addr.nl_pid = pid;
+
+       ret = bind(nl->fd, (struct sockaddr *) &nl->addr, sizeof (nl->addr));
+       if (ret < 0)
+               return ret;
+
+       addr_len = sizeof(nl->addr);
+       ret = getsockname(nl->fd, (struct sockaddr *) &nl->addr, &addr_len);
+       if (ret < 0)
+               return ret;
+
+       if (addr_len != sizeof(nl->addr)) {
+               errno = EINVAL;
+               return -1;
+       }
+       if (nl->addr.nl_family != AF_NETLINK) {
+               errno = EINVAL;
+               return -1;
+       }
+       return 0;
+}
+
+static ssize_t mnl_socket_sendto(const struct mnl_socket *nl, const void *buf,
+                                size_t len)
+{
+       static const struct sockaddr_nl snl = {
+               .nl_family = AF_NETLINK
+       };
+       return sendto(nl->fd, buf, len, 0,
+                     (struct sockaddr *) &snl, sizeof(snl));
+}
+
+static ssize_t mnl_socket_recvfrom(const struct mnl_socket *nl, void *buf,
+                                  size_t bufsiz)
+{
+       ssize_t ret;
+       struct sockaddr_nl addr;
+       struct iovec iov = {
+               .iov_base       = buf,
+               .iov_len        = bufsiz,
+       };
+       struct msghdr msg = {
+               .msg_name       = &addr,
+               .msg_namelen    = sizeof(struct sockaddr_nl),
+               .msg_iov        = &iov,
+               .msg_iovlen     = 1,
+               .msg_control    = NULL,
+               .msg_controllen = 0,
+               .msg_flags      = 0,
+       };
+       ret = recvmsg(nl->fd, &msg, 0);
+       if (ret == -1)
+               return ret;
+
+       if (msg.msg_flags & MSG_TRUNC) {
+               errno = ENOSPC;
+               return -1;
+       }
+       if (msg.msg_namelen != sizeof(struct sockaddr_nl)) {
+               errno = EINVAL;
+               return -1;
+       }
+       return ret;
+}
+
+static int mnl_socket_close(struct mnl_socket *nl)
+{
+       int ret = close(nl->fd);
+       free(nl);
+       return ret;
+}
+
+/* This is a wrapper for generic netlink, originally from Jiri Pirko 
<[email protected]>: */
+
+struct mnlg_socket {
+       struct mnl_socket *nl;
+       char *buf;
+       uint16_t id;
+       uint8_t version;
+       unsigned int seq;
+       unsigned int portid;
+};
+
+static struct nlmsghdr *__mnlg_msg_prepare(struct mnlg_socket *nlg, uint8_t 
cmd,
+                                          uint16_t flags, uint16_t id,
+                                          uint8_t version)
+{
+       struct nlmsghdr *nlh;
+       struct genlmsghdr *genl;
+
+       nlh = mnl_nlmsg_put_header(nlg->buf);
+       nlh->nlmsg_type = id;
+       nlh->nlmsg_flags = flags;
+       nlg->seq = time(NULL);
+       nlh->nlmsg_seq = nlg->seq;
+
+       genl = mnl_nlmsg_put_extra_header(nlh, sizeof(struct genlmsghdr));
+       genl->cmd = cmd;
+       genl->version = version;
+
+       return nlh;
+}
+
+static struct nlmsghdr *mnlg_msg_prepare(struct mnlg_socket *nlg, uint8_t cmd,
+                                        uint16_t flags)
+{
+       return __mnlg_msg_prepare(nlg, cmd, flags, nlg->id, nlg->version);
+}
+
+static int mnlg_socket_send(struct mnlg_socket *nlg, const struct nlmsghdr 
*nlh)
+{
+       return mnl_socket_sendto(nlg->nl, nlh, nlh->nlmsg_len);
+}
+
+static int mnlg_cb_noop(const struct nlmsghdr *nlh, void *data)
+{
+       (void)nlh;
+       (void)data;
+       return MNL_CB_OK;
+}
+
+static int mnlg_cb_error(const struct nlmsghdr *nlh, void *data)
+{
+       const struct nlmsgerr *err = mnl_nlmsg_get_payload(nlh);
+       (void)data;
+
+       if (nlh->nlmsg_len < mnl_nlmsg_size(sizeof(struct nlmsgerr))) {
+               errno = EBADMSG;
+               return MNL_CB_ERROR;
+       }
+       /* Netlink subsystems returns the errno value with different signess */
+       if (err->error < 0)
+               errno = -err->error;
+       else
+               errno = err->error;
+
+       return err->error == 0 ? MNL_CB_STOP : MNL_CB_ERROR;
+}
+
+static int mnlg_cb_stop(const struct nlmsghdr *nlh, void *data)
+{
+       (void)data;
+       if (nlh->nlmsg_flags & NLM_F_MULTI && nlh->nlmsg_len == 
mnl_nlmsg_size(sizeof(int))) {
+               int error = *(int *)mnl_nlmsg_get_payload(nlh);
+               /* Netlink subsystems returns the errno value with different 
signess */
+               if (error < 0)
+                       errno = -error;
+               else
+                       errno = error;
+
+               return error == 0 ? MNL_CB_STOP : MNL_CB_ERROR;
+       }
+       return MNL_CB_STOP;
+}
+
+static const mnl_cb_t mnlg_cb_array[] = {
+       [NLMSG_NOOP]    = mnlg_cb_noop,
+       [NLMSG_ERROR]   = mnlg_cb_error,
+       [NLMSG_DONE]    = mnlg_cb_stop,
+       [NLMSG_OVERRUN] = mnlg_cb_noop,
+};
+
+static int mnlg_socket_recv_run(struct mnlg_socket *nlg, mnl_cb_t data_cb, 
void *data)
+{
+       int err;
+
+       do {
+               err = mnl_socket_recvfrom(nlg->nl, nlg->buf,
+                                         mnl_ideal_socket_buffer_size());
+               if (err <= 0)
+                       break;
+               err = mnl_cb_run2(nlg->buf, err, nlg->seq, nlg->portid,
+                                 data_cb, data, mnlg_cb_array, 
MNL_ARRAY_SIZE(mnlg_cb_array));
+       } while (err > 0);
+
+       return err;
+}
+
+static int get_family_id_attr_cb(const struct nlattr *attr, void *data)
+{
+       const struct nlattr **tb = data;
+       int type = mnl_attr_get_type(attr);
+
+       if (mnl_attr_type_valid(attr, CTRL_ATTR_MAX) < 0)
+               return MNL_CB_ERROR;
+
+       if (type == CTRL_ATTR_FAMILY_ID &&
+           mnl_attr_validate(attr, MNL_TYPE_U16) < 0)
+               return MNL_CB_ERROR;
+       tb[type] = attr;
+       return MNL_CB_OK;
+}
+
+static int get_family_id_cb(const struct nlmsghdr *nlh, void *data)
+{
+       uint16_t *p_id = data;
+       struct nlattr *tb[CTRL_ATTR_MAX + 1] = { 0 };
+
+       mnl_attr_parse(nlh, sizeof(struct genlmsghdr), get_family_id_attr_cb, 
tb);
+       if (!tb[CTRL_ATTR_FAMILY_ID])
+               return MNL_CB_ERROR;
+       *p_id = mnl_attr_get_u16(tb[CTRL_ATTR_FAMILY_ID]);
+       return MNL_CB_OK;
+}
+
+static struct mnlg_socket *mnlg_socket_open(const char *family_name, uint8_t 
version)
+{
+       struct mnlg_socket *nlg;
+       struct nlmsghdr *nlh;
+       int err;
+
+       nlg = malloc(sizeof(*nlg));
+       if (!nlg)
+               return NULL;
+
+       err = -ENOMEM;
+       nlg->buf = malloc(mnl_ideal_socket_buffer_size());
+       if (!nlg->buf)
+               goto err_buf_alloc;
+
+       nlg->nl = mnl_socket_open(NETLINK_GENERIC);
+       if (!nlg->nl) {
+               err = -errno;
+               goto err_mnl_socket_open;
+       }
+
+       if (mnl_socket_bind(nlg->nl, 0, MNL_SOCKET_AUTOPID) < 0) {
+               err = -errno;
+               goto err_mnl_socket_bind;
+       }
+
+       nlg->portid = mnl_socket_get_portid(nlg->nl);
+
+       nlh = __mnlg_msg_prepare(nlg, CTRL_CMD_GETFAMILY,
+                                NLM_F_REQUEST | NLM_F_ACK, GENL_ID_CTRL, 1);
+       mnl_attr_put_strz(nlh, CTRL_ATTR_FAMILY_NAME, family_name);
+
+       if (mnlg_socket_send(nlg, nlh) < 0) {
+               err = -errno;
+               goto err_mnlg_socket_send;
+       }
+
+       errno = 0;
+       if (mnlg_socket_recv_run(nlg, get_family_id_cb, &nlg->id) < 0) {
+               errno = errno == ENOENT ? EPROTONOSUPPORT : errno;
+               err = errno ? -errno : -ENOSYS;
+               goto err_mnlg_socket_recv_run;
+       }
+
+       nlg->version = version;
+       errno = 0;
+       return nlg;
+
+err_mnlg_socket_recv_run:
+err_mnlg_socket_send:
+err_mnl_socket_bind:
+       mnl_socket_close(nlg->nl);
+err_mnl_socket_open:
+       free(nlg->buf);
+err_buf_alloc:
+       free(nlg);
+       errno = -err;
+       return NULL;
+}
+
+static void mnlg_socket_close(struct mnlg_socket *nlg)
+{
+       mnl_socket_close(nlg->nl);
+       free(nlg->buf);
+       free(nlg);
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/version.h 
new/wireguard-tools-1.0.20200206/src/version.h
--- old/wireguard-tools-1.0.20200121/src/version.h      2020-01-21 
15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/version.h      2020-02-06 
16:19:47.000000000 +0100
@@ -1,3 +1,3 @@
 #ifndef WIREGUARD_TOOLS_VERSION
-#define WIREGUARD_TOOLS_VERSION "1.0.20200121"
+#define WIREGUARD_TOOLS_VERSION "1.0.20200206"
 #endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-tools-1.0.20200121/src/wg-quick/android.c 
new/wireguard-tools-1.0.20200206/src/wg-quick/android.c
--- old/wireguard-tools-1.0.20200121/src/wg-quick/android.c     2020-01-21 
15:51:31.000000000 +0100
+++ new/wireguard-tools-1.0.20200206/src/wg-quick/android.c     2020-02-06 
16:19:47.000000000 +0100
@@ -785,6 +785,7 @@
 static void set_users(unsigned int netid, const char *excluded_applications)
 {
        _cleanup_free_ uid_t *excluded_uids = 
get_uid_list(excluded_applications);
+       unsigned int args_per_command = 0;
        _cleanup_free_ char *ranges = NULL;
        char range[22];
        uid_t start;
@@ -797,13 +798,19 @@
                else
                        snprintf(range, sizeof(range), "%u-%u", start, 
*excluded_uids - 1);
                ranges = concat_and_free(ranges, " ", range);
+               if (++args_per_command % 18 == 0) {
+                       cndc("network users add %u %s", netid, ranges);
+                       free(ranges);
+                       ranges = NULL;
+               }
        }
        if (start < 99999) {
                snprintf(range, sizeof(range), "%u-99999", start);
                ranges = concat_and_free(ranges, " ", range);
        }
 
-       cndc("network users add %u %s", netid, ranges);
+       if (ranges)
+               cndc("network users add %u %s", netid, ranges);
 }
 
 static void set_dnses(unsigned int netid, const char *dnses)


Reply via email to