Hello community,

here is the log from the commit of package wireguard for openSUSE:Factory 
checked in at 2020-02-26 15:07:59
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/wireguard (Old)
 and      /work/SRC/openSUSE:Factory/.wireguard.new.26092 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "wireguard"

Wed Feb 26 15:07:59 2020 rev:11 rq:779405 version:0.0.20200215

Changes:
--------
--- /work/SRC/openSUSE:Factory/wireguard/wireguard.changes      2020-02-15 
22:25:58.687327821 +0100
+++ /work/SRC/openSUSE:Factory/.wireguard.new.26092/wireguard.changes   
2020-02-26 15:09:03.737671934 +0100
@@ -1,0 +2,7 @@
+Wed Feb 26 12:28:36 UTC 2020 - Martin Hauke <[email protected]>
+
+- Update to version 0.0.20200215
+  * send: cleanup skb padding calculation
+  * socket: remove useless synchronize_net
+
+-------------------------------------------------------------------

Old:
----
  wireguard-linux-compat-0.0.20200214.tar.asc
  wireguard-linux-compat-0.0.20200214.tar.xz

New:
----
  wireguard-linux-compat-0.0.20200215.tar.asc
  wireguard-linux-compat-0.0.20200215.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ wireguard.spec ++++++
--- /var/tmp/diff_new_pack.lJ5NWF/_old  2020-02-26 15:09:05.925676300 +0100
+++ /var/tmp/diff_new_pack.lJ5NWF/_new  2020-02-26 15:09:05.929676307 +0100
@@ -18,7 +18,7 @@
 
 
 Name:           wireguard
-Version:        0.0.20200214
+Version:        0.0.20200215
 Release:        0
 Summary:        Fast, modern, secure kernel VPN tunnel
 License:        GPL-2.0-only


++++++ wireguard-linux-compat-0.0.20200214.tar.xz -> 
wireguard-linux-compat-0.0.20200215.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-linux-compat-0.0.20200214/src/dkms.conf 
new/wireguard-linux-compat-0.0.20200215/src/dkms.conf
--- old/wireguard-linux-compat-0.0.20200214/src/dkms.conf       2020-02-14 
14:33:05.000000000 +0100
+++ new/wireguard-linux-compat-0.0.20200215/src/dkms.conf       2020-02-15 
00:01:31.000000000 +0100
@@ -1,5 +1,5 @@
 PACKAGE_NAME="wireguard"
-PACKAGE_VERSION="0.0.20200214"
+PACKAGE_VERSION="0.0.20200215"
 AUTOINSTALL=yes
 
 BUILT_MODULE_NAME="wireguard"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-linux-compat-0.0.20200214/src/send.c 
new/wireguard-linux-compat-0.0.20200215/src/send.c
--- old/wireguard-linux-compat-0.0.20200214/src/send.c  2020-02-14 
14:33:05.000000000 +0100
+++ new/wireguard-linux-compat-0.0.20200215/src/send.c  2020-02-15 
00:01:31.000000000 +0100
@@ -144,17 +144,22 @@
 
 static unsigned int calculate_skb_padding(struct sk_buff *skb)
 {
+       unsigned int padded_size, last_unit = skb->len;
+
+       if (unlikely(!PACKET_CB(skb)->mtu))
+               return -last_unit % MESSAGE_PADDING_MULTIPLE;
+
        /* We do this modulo business with the MTU, just in case the networking
         * layer gives us a packet that's bigger than the MTU. In that case, we
         * wouldn't want the final subtraction to overflow in the case of the
-        * padded_size being clamped.
+        * padded_size being clamped. Fortunately, that's very rarely the case,
+        * so we optimize for that not happening.
         */
-       unsigned int last_unit = PACKET_CB(skb)->mtu ?
-                                skb->len % PACKET_CB(skb)->mtu : skb->len;
-       unsigned int padded_size = ALIGN(last_unit, MESSAGE_PADDING_MULTIPLE);
+       if (unlikely(last_unit > PACKET_CB(skb)->mtu))
+               last_unit %= PACKET_CB(skb)->mtu;
 
-       if (padded_size > PACKET_CB(skb)->mtu)
-               padded_size = PACKET_CB(skb)->mtu;
+       padded_size = min(PACKET_CB(skb)->mtu,
+                         ALIGN(last_unit, MESSAGE_PADDING_MULTIPLE));
        return padded_size - last_unit;
 }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-linux-compat-0.0.20200214/src/socket.c 
new/wireguard-linux-compat-0.0.20200215/src/socket.c
--- old/wireguard-linux-compat-0.0.20200214/src/socket.c        2020-02-14 
14:33:05.000000000 +0100
+++ new/wireguard-linux-compat-0.0.20200215/src/socket.c        2020-02-15 
00:01:31.000000000 +0100
@@ -432,7 +432,6 @@
                wg->incoming_port = ntohs(inet_sk(new4)->inet_sport);
        mutex_unlock(&wg->socket_update_lock);
        synchronize_rcu();
-       synchronize_net();
        sock_free(old4);
        sock_free(old6);
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/wireguard-linux-compat-0.0.20200214/src/version.h 
new/wireguard-linux-compat-0.0.20200215/src/version.h
--- old/wireguard-linux-compat-0.0.20200214/src/version.h       2020-02-14 
14:33:05.000000000 +0100
+++ new/wireguard-linux-compat-0.0.20200215/src/version.h       2020-02-15 
00:01:31.000000000 +0100
@@ -1,3 +1,3 @@
 #ifndef WIREGUARD_VERSION
-#define WIREGUARD_VERSION "0.0.20200214"
+#define WIREGUARD_VERSION "0.0.20200215"
 #endif


Reply via email to