Re: kernel warning with 0.0.20170223: entered softirq 3 NET_RX net_rx_action+0x0/0x760 with preempt_count 00000101, exited with 00000100?

2017-02-26 Thread Jason A. Donenfeld
Hey Pipacs, I've been receiving reports of strange bugs from grsec users with WireGuard. The first set of bugs was a heisenbug crash, and I never found the root cause, but it seemed to happen in the rx path. Then today Timothée emailed another different bug from a grsec box, also along the rx path

kernel warning with 0.0.20170223: entered softirq 3 NET_RX net_rx_action+0x0/0x760 with preempt_count 00000101, exited with 00000100?

2017-02-26 Thread Timothée Ravier
Hi, With the following setup, both client & server running: * Arch Linux * kernel 4.9.11.r20170257-1-grsec * wireguard-dkms & wireguard-tools 0.0.20170223 Server: interface: wg0 public key: ... private key: ... listening port: 51820 peer: ... endpoint: ...:51820 allowed ips: 192.16

wg-quick rule bypasses [Was: Re: Announcement: Public Wireguard server for testing]

2017-02-26 Thread Jason A. Donenfeld
Hey Jorg, Moving this to a new thread. On Sun, Feb 26, 2017 at 7:25 PM, Jörg Thalheim wrote: > In this context, I found the following rules useful to bypass the vpn for > some routes: > > #!/usr/bin/env bash > # /etc/wireguard/.sh > > if [ "${1:-down}" = "up" ]; then > action="add" > else >

Re: Announcement: Public Wireguard server for testing

2017-02-26 Thread Jörg Thalheim
In this context, I found the following rules useful to bypass the vpn for some routes: #!/usr/bin/env bash # /etc/wireguard/.sh if [ "${1:-down}" = "up" ]; then action="add" else action="del" fi ip rule $action priority 32763 to 192.168.0.0/16 lookup main ip rule $action priority 32763 to 1