forked from openwrt/openwrt
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
kernel-5.4: backport latest patches for wireguard
These are the latest patches that just landed upstream for 5.13, will be backported by Greg into 5.10 (because of stable@), and are now in the 5.4 backport branch of wireguard: https://git.zx2c4.com/wireguard-linux/log/?h=backport-5.4.y Cc: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Tested-by: Stijn Segers <foss@volatilesystems.org>
- Loading branch information
Showing
12 changed files
with
1,514 additions
and
0 deletions.
There are no files selected for viewing
60 changes: 60 additions & 0 deletions
60
...backport-5.4/080-wireguard-0124-crypto-mips-poly1305-enable-for-all-MIPS-processors.patch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 | ||
From: "Maciej W. Rozycki" <macro@orcam.me.uk> | ||
Date: Thu, 11 Mar 2021 21:50:47 -0700 | ||
Subject: [PATCH] crypto: mips/poly1305 - enable for all MIPS processors | ||
|
||
commit 6c810cf20feef0d4338e9b424ab7f2644a8b353e upstream. | ||
|
||
The MIPS Poly1305 implementation is generic MIPS code written such as to | ||
support down to the original MIPS I and MIPS III ISA for the 32-bit and | ||
64-bit variant respectively. Lift the current limitation then to enable | ||
code for MIPSr1 ISA or newer processors only and have it available for | ||
all MIPS processors. | ||
|
||
Signed-off-by: Maciej W. Rozycki <macro@orcam.me.uk> | ||
Fixes: a11d055e7a64 ("crypto: mips/poly1305 - incorporate OpenSSL/CRYPTOGAMS optimized implementation") | ||
Cc: stable@vger.kernel.org # v5.5+ | ||
Acked-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
Signed-off-by: Thomas Bogendoerfer <tsbogend@alpha.franken.de> | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
--- | ||
arch/mips/crypto/Makefile | 4 ++-- | ||
crypto/Kconfig | 2 +- | ||
drivers/net/Kconfig | 2 +- | ||
3 files changed, 4 insertions(+), 4 deletions(-) | ||
|
||
--- a/arch/mips/crypto/Makefile | ||
+++ b/arch/mips/crypto/Makefile | ||
@@ -12,8 +12,8 @@ AFLAGS_chacha-core.o += -O2 # needed to | ||
obj-$(CONFIG_CRYPTO_POLY1305_MIPS) += poly1305-mips.o | ||
poly1305-mips-y := poly1305-core.o poly1305-glue.o | ||
|
||
-perlasm-flavour-$(CONFIG_CPU_MIPS32) := o32 | ||
-perlasm-flavour-$(CONFIG_CPU_MIPS64) := 64 | ||
+perlasm-flavour-$(CONFIG_32BIT) := o32 | ||
+perlasm-flavour-$(CONFIG_64BIT) := 64 | ||
|
||
quiet_cmd_perlasm = PERLASM $@ | ||
cmd_perlasm = $(PERL) $(<) $(perlasm-flavour-y) $(@) | ||
--- a/crypto/Kconfig | ||
+++ b/crypto/Kconfig | ||
@@ -740,7 +740,7 @@ config CRYPTO_POLY1305_X86_64 | ||
|
||
config CRYPTO_POLY1305_MIPS | ||
tristate "Poly1305 authenticator algorithm (MIPS optimized)" | ||
- depends on CPU_MIPS32 || (CPU_MIPS64 && 64BIT) | ||
+ depends on MIPS | ||
select CRYPTO_ARCH_HAVE_LIB_POLY1305 | ||
|
||
config CRYPTO_MD4 | ||
--- a/drivers/net/Kconfig | ||
+++ b/drivers/net/Kconfig | ||
@@ -92,7 +92,7 @@ config WIREGUARD | ||
select CRYPTO_POLY1305_ARM if ARM | ||
select CRYPTO_CURVE25519_NEON if ARM && KERNEL_MODE_NEON | ||
select CRYPTO_CHACHA_MIPS if CPU_MIPS32_R2 | ||
- select CRYPTO_POLY1305_MIPS if CPU_MIPS32 || (CPU_MIPS64 && 64BIT) | ||
+ select CRYPTO_POLY1305_MIPS if MIPS | ||
help | ||
WireGuard is a secure, fast, and easy to use replacement for IPSec | ||
that uses modern cryptography and clever networking tricks. It's |
24 changes: 24 additions & 0 deletions
24
...neric/backport-5.4/080-wireguard-0125-crypto-mips-add-poly1305-core.S-to-.gitignore.patch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 | ||
From: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com> | ||
Date: Sat, 27 Mar 2021 19:39:43 -0700 | ||
Subject: [PATCH] crypto: mips: add poly1305-core.S to .gitignore | ||
|
||
commit dc92d0df51dc61de88bf6f4884a17bf73d5c6326 upstream. | ||
|
||
poly1305-core.S is an auto-generated file, so it should be ignored. | ||
|
||
Fixes: a11d055e7a64 ("crypto: mips/poly1305 - incorporate OpenSSL/CRYPTOGAMS optimized implementation") | ||
Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com> | ||
Cc: Ard Biesheuvel <ardb@kernel.org> | ||
Signed-off-by: Thomas Bogendoerfer <tsbogend@alpha.franken.de> | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
--- | ||
arch/mips/crypto/.gitignore | 2 ++ | ||
1 file changed, 2 insertions(+) | ||
create mode 100644 arch/mips/crypto/.gitignore | ||
|
||
--- /dev/null | ||
+++ b/arch/mips/crypto/.gitignore | ||
@@ -0,0 +1,2 @@ | ||
+# SPDX-License-Identifier: GPL-2.0-only | ||
+poly1305-core.S |
172 changes: 172 additions & 0 deletions
172
...ackport-5.4/080-wireguard-0126-crypto-poly1305-fix-poly1305_core_setkey-declaration.patch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,172 @@ | ||
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 | ||
From: Arnd Bergmann <arnd@arndb.de> | ||
Date: Mon, 22 Mar 2021 18:05:15 +0100 | ||
Subject: [PATCH] crypto: poly1305 - fix poly1305_core_setkey() declaration | ||
MIME-Version: 1.0 | ||
Content-Type: text/plain; charset=UTF-8 | ||
Content-Transfer-Encoding: 8bit | ||
|
||
commit 8d195e7a8ada68928f2aedb2c18302a4518fe68e upstream. | ||
|
||
gcc-11 points out a mismatch between the declaration and the definition | ||
of poly1305_core_setkey(): | ||
|
||
lib/crypto/poly1305-donna32.c:13:67: error: argument 2 of type ‘const u8[16]’ {aka ‘const unsigned char[16]’} with mismatched bound [-Werror=array-parameter=] | ||
13 | void poly1305_core_setkey(struct poly1305_core_key *key, const u8 raw_key[16]) | ||
| ~~~~~~~~~^~~~~~~~~~~ | ||
In file included from lib/crypto/poly1305-donna32.c:11: | ||
include/crypto/internal/poly1305.h:21:68: note: previously declared as ‘const u8 *’ {aka ‘const unsigned char *’} | ||
21 | void poly1305_core_setkey(struct poly1305_core_key *key, const u8 *raw_key); | ||
|
||
This is harmless in principle, as the calling conventions are the same, | ||
but the more specific prototype allows better type checking in the | ||
caller. | ||
|
||
Change the declaration to match the actual function definition. | ||
The poly1305_simd_init() is a bit suspicious here, as it previously | ||
had a 32-byte argument type, but looks like it needs to take the | ||
16-byte POLY1305_BLOCK_SIZE array instead. | ||
|
||
Fixes: 1c08a104360f ("crypto: poly1305 - add new 32 and 64-bit generic versions") | ||
Signed-off-by: Arnd Bergmann <arnd@arndb.de> | ||
Reviewed-by: Ard Biesheuvel <ardb@kernel.org> | ||
Reviewed-by: Eric Biggers <ebiggers@google.com> | ||
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
--- | ||
arch/arm/crypto/poly1305-glue.c | 2 +- | ||
arch/arm64/crypto/poly1305-glue.c | 2 +- | ||
arch/mips/crypto/poly1305-glue.c | 2 +- | ||
arch/x86/crypto/poly1305_glue.c | 6 +++--- | ||
include/crypto/internal/poly1305.h | 3 ++- | ||
include/crypto/poly1305.h | 6 ++++-- | ||
lib/crypto/poly1305-donna32.c | 3 ++- | ||
lib/crypto/poly1305-donna64.c | 3 ++- | ||
lib/crypto/poly1305.c | 3 ++- | ||
9 files changed, 18 insertions(+), 12 deletions(-) | ||
|
||
--- a/arch/arm/crypto/poly1305-glue.c | ||
+++ b/arch/arm/crypto/poly1305-glue.c | ||
@@ -29,7 +29,7 @@ void __weak poly1305_blocks_neon(void *s | ||
|
||
static __ro_after_init DEFINE_STATIC_KEY_FALSE(have_neon); | ||
|
||
-void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 *key) | ||
+void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 key[POLY1305_KEY_SIZE]) | ||
{ | ||
poly1305_init_arm(&dctx->h, key); | ||
dctx->s[0] = get_unaligned_le32(key + 16); | ||
--- a/arch/arm64/crypto/poly1305-glue.c | ||
+++ b/arch/arm64/crypto/poly1305-glue.c | ||
@@ -25,7 +25,7 @@ asmlinkage void poly1305_emit(void *stat | ||
|
||
static __ro_after_init DEFINE_STATIC_KEY_FALSE(have_neon); | ||
|
||
-void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 *key) | ||
+void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 key[POLY1305_KEY_SIZE]) | ||
{ | ||
poly1305_init_arm64(&dctx->h, key); | ||
dctx->s[0] = get_unaligned_le32(key + 16); | ||
--- a/arch/mips/crypto/poly1305-glue.c | ||
+++ b/arch/mips/crypto/poly1305-glue.c | ||
@@ -17,7 +17,7 @@ asmlinkage void poly1305_init_mips(void | ||
asmlinkage void poly1305_blocks_mips(void *state, const u8 *src, u32 len, u32 hibit); | ||
asmlinkage void poly1305_emit_mips(void *state, u8 *digest, const u32 *nonce); | ||
|
||
-void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 *key) | ||
+void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 key[POLY1305_KEY_SIZE]) | ||
{ | ||
poly1305_init_mips(&dctx->h, key); | ||
dctx->s[0] = get_unaligned_le32(key + 16); | ||
--- a/arch/x86/crypto/poly1305_glue.c | ||
+++ b/arch/x86/crypto/poly1305_glue.c | ||
@@ -15,7 +15,7 @@ | ||
#include <asm/simd.h> | ||
|
||
asmlinkage void poly1305_init_x86_64(void *ctx, | ||
- const u8 key[POLY1305_KEY_SIZE]); | ||
+ const u8 key[POLY1305_BLOCK_SIZE]); | ||
asmlinkage void poly1305_blocks_x86_64(void *ctx, const u8 *inp, | ||
const size_t len, const u32 padbit); | ||
asmlinkage void poly1305_emit_x86_64(void *ctx, u8 mac[POLY1305_DIGEST_SIZE], | ||
@@ -80,7 +80,7 @@ static void convert_to_base2_64(void *ct | ||
state->is_base2_26 = 0; | ||
} | ||
|
||
-static void poly1305_simd_init(void *ctx, const u8 key[POLY1305_KEY_SIZE]) | ||
+static void poly1305_simd_init(void *ctx, const u8 key[POLY1305_BLOCK_SIZE]) | ||
{ | ||
poly1305_init_x86_64(ctx, key); | ||
} | ||
@@ -128,7 +128,7 @@ static void poly1305_simd_emit(void *ctx | ||
poly1305_emit_avx(ctx, mac, nonce); | ||
} | ||
|
||
-void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 *key) | ||
+void poly1305_init_arch(struct poly1305_desc_ctx *dctx, const u8 key[POLY1305_KEY_SIZE]) | ||
{ | ||
poly1305_simd_init(&dctx->h, key); | ||
dctx->s[0] = get_unaligned_le32(&key[16]); | ||
--- a/include/crypto/internal/poly1305.h | ||
+++ b/include/crypto/internal/poly1305.h | ||
@@ -18,7 +18,8 @@ | ||
* only the ε-almost-∆-universal hash function (not the full MAC) is computed. | ||
*/ | ||
|
||
-void poly1305_core_setkey(struct poly1305_core_key *key, const u8 *raw_key); | ||
+void poly1305_core_setkey(struct poly1305_core_key *key, | ||
+ const u8 raw_key[POLY1305_BLOCK_SIZE]); | ||
static inline void poly1305_core_init(struct poly1305_state *state) | ||
{ | ||
*state = (struct poly1305_state){}; | ||
--- a/include/crypto/poly1305.h | ||
+++ b/include/crypto/poly1305.h | ||
@@ -58,8 +58,10 @@ struct poly1305_desc_ctx { | ||
}; | ||
}; | ||
|
||
-void poly1305_init_arch(struct poly1305_desc_ctx *desc, const u8 *key); | ||
-void poly1305_init_generic(struct poly1305_desc_ctx *desc, const u8 *key); | ||
+void poly1305_init_arch(struct poly1305_desc_ctx *desc, | ||
+ const u8 key[POLY1305_KEY_SIZE]); | ||
+void poly1305_init_generic(struct poly1305_desc_ctx *desc, | ||
+ const u8 key[POLY1305_KEY_SIZE]); | ||
|
||
static inline void poly1305_init(struct poly1305_desc_ctx *desc, const u8 *key) | ||
{ | ||
--- a/lib/crypto/poly1305-donna32.c | ||
+++ b/lib/crypto/poly1305-donna32.c | ||
@@ -10,7 +10,8 @@ | ||
#include <asm/unaligned.h> | ||
#include <crypto/internal/poly1305.h> | ||
|
||
-void poly1305_core_setkey(struct poly1305_core_key *key, const u8 raw_key[16]) | ||
+void poly1305_core_setkey(struct poly1305_core_key *key, | ||
+ const u8 raw_key[POLY1305_BLOCK_SIZE]) | ||
{ | ||
/* r &= 0xffffffc0ffffffc0ffffffc0fffffff */ | ||
key->key.r[0] = (get_unaligned_le32(&raw_key[0])) & 0x3ffffff; | ||
--- a/lib/crypto/poly1305-donna64.c | ||
+++ b/lib/crypto/poly1305-donna64.c | ||
@@ -12,7 +12,8 @@ | ||
|
||
typedef __uint128_t u128; | ||
|
||
-void poly1305_core_setkey(struct poly1305_core_key *key, const u8 raw_key[16]) | ||
+void poly1305_core_setkey(struct poly1305_core_key *key, | ||
+ const u8 raw_key[POLY1305_BLOCK_SIZE]) | ||
{ | ||
u64 t0, t1; | ||
|
||
--- a/lib/crypto/poly1305.c | ||
+++ b/lib/crypto/poly1305.c | ||
@@ -12,7 +12,8 @@ | ||
#include <linux/module.h> | ||
#include <asm/unaligned.h> | ||
|
||
-void poly1305_init_generic(struct poly1305_desc_ctx *desc, const u8 *key) | ||
+void poly1305_init_generic(struct poly1305_desc_ctx *desc, | ||
+ const u8 key[POLY1305_KEY_SIZE]) | ||
{ | ||
poly1305_core_setkey(&desc->core_r, key); | ||
desc->s[0] = get_unaligned_le32(key + 16); |
29 changes: 29 additions & 0 deletions
29
...ackport-5.4/080-wireguard-0127-wireguard-selftests-remove-old-conntrack-kconfig-val.patch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 | ||
From: "Jason A. Donenfeld" <Jason@zx2c4.com> | ||
Date: Fri, 4 Jun 2021 17:17:30 +0200 | ||
Subject: [PATCH] wireguard: selftests: remove old conntrack kconfig value | ||
|
||
commit acf2492b51c9a3c4dfb947f4d3477a86d315150f upstream. | ||
|
||
On recent kernels, this config symbol is no longer used. | ||
|
||
Reported-by: Rui Salvaterra <rsalvaterra@gmail.com> | ||
Fixes: e7096c131e51 ("net: WireGuard secure network tunnel") | ||
Cc: stable@vger.kernel.org | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
Signed-off-by: David S. Miller <davem@davemloft.net> | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
--- | ||
tools/testing/selftests/wireguard/qemu/kernel.config | 1 - | ||
1 file changed, 1 deletion(-) | ||
|
||
--- a/tools/testing/selftests/wireguard/qemu/kernel.config | ||
+++ b/tools/testing/selftests/wireguard/qemu/kernel.config | ||
@@ -19,7 +19,6 @@ CONFIG_NETFILTER_XTABLES=y | ||
CONFIG_NETFILTER_XT_NAT=y | ||
CONFIG_NETFILTER_XT_MATCH_LENGTH=y | ||
CONFIG_NETFILTER_XT_MARK=y | ||
-CONFIG_NF_CONNTRACK_IPV4=y | ||
CONFIG_NF_NAT_IPV4=y | ||
CONFIG_IP_NF_IPTABLES=y | ||
CONFIG_IP_NF_FILTER=y |
31 changes: 31 additions & 0 deletions
31
...ackport-5.4/080-wireguard-0128-wireguard-selftests-make-sure-rp_filter-is-disabled-.patch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 | ||
From: "Jason A. Donenfeld" <Jason@zx2c4.com> | ||
Date: Fri, 4 Jun 2021 17:17:31 +0200 | ||
Subject: [PATCH] wireguard: selftests: make sure rp_filter is disabled on | ||
vethc | ||
|
||
commit f8873d11d4121aad35024f9379e431e0c83abead upstream. | ||
|
||
Some distros may enable strict rp_filter by default, which will prevent | ||
vethc from receiving the packets with an unrouteable reverse path address. | ||
|
||
Reported-by: Hangbin Liu <liuhangbin@gmail.com> | ||
Fixes: e7096c131e51 ("net: WireGuard secure network tunnel") | ||
Cc: stable@vger.kernel.org | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
Signed-off-by: David S. Miller <davem@davemloft.net> | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
--- | ||
tools/testing/selftests/wireguard/netns.sh | 1 + | ||
1 file changed, 1 insertion(+) | ||
|
||
--- a/tools/testing/selftests/wireguard/netns.sh | ||
+++ b/tools/testing/selftests/wireguard/netns.sh | ||
@@ -363,6 +363,7 @@ ip1 -6 rule add table main suppress_pref | ||
ip1 -4 route add default dev wg0 table 51820 | ||
ip1 -4 rule add not fwmark 51820 table 51820 | ||
ip1 -4 rule add table main suppress_prefixlength 0 | ||
+n1 bash -c 'printf 0 > /proc/sys/net/ipv4/conf/vethc/rp_filter' | ||
# Flood the pings instead of sending just one, to trigger routing table reference counting bugs. | ||
n1 ping -W 1 -c 100 -f 192.168.99.7 | ||
n1 ping -W 1 -c 100 -f abab::1111 |
33 changes: 33 additions & 0 deletions
33
target/linux/generic/backport-5.4/080-wireguard-0129-wireguard-do-not-use-O3.patch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 | ||
From: "Jason A. Donenfeld" <Jason@zx2c4.com> | ||
Date: Fri, 4 Jun 2021 17:17:32 +0200 | ||
Subject: [PATCH] wireguard: do not use -O3 | ||
|
||
commit cc5060ca0285efe2728bced399a1955a7ce808b2 upstream. | ||
|
||
Apparently, various versions of gcc have O3-related miscompiles. Looking | ||
at the difference between -O2 and -O3 for gcc 11 doesn't indicate | ||
miscompiles, but the difference also doesn't seem so significant for | ||
performance that it's worth risking. | ||
|
||
Link: https://lore.kernel.org/lkml/CAHk-=wjuoGyxDhAF8SsrTkN0-YfCx7E6jUN3ikC_tn2AKWTTsA@mail.gmail.com/ | ||
Link: https://lore.kernel.org/lkml/CAHmME9otB5Wwxp7H8bR_i2uH2esEMvoBMC8uEXBMH9p0q1s6Bw@mail.gmail.com/ | ||
Reported-by: Linus Torvalds <torvalds@linux-foundation.org> | ||
Fixes: e7096c131e51 ("net: WireGuard secure network tunnel") | ||
Cc: stable@vger.kernel.org | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
Signed-off-by: David S. Miller <davem@davemloft.net> | ||
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> | ||
--- | ||
drivers/net/wireguard/Makefile | 3 +-- | ||
1 file changed, 1 insertion(+), 2 deletions(-) | ||
|
||
--- a/drivers/net/wireguard/Makefile | ||
+++ b/drivers/net/wireguard/Makefile | ||
@@ -1,5 +1,4 @@ | ||
-ccflags-y := -O3 | ||
-ccflags-y += -D'pr_fmt(fmt)=KBUILD_MODNAME ": " fmt' | ||
+ccflags-y := -D'pr_fmt(fmt)=KBUILD_MODNAME ": " fmt' | ||
ccflags-$(CONFIG_WIREGUARD_DEBUG) += -DDEBUG | ||
wireguard-y := main.o | ||
wireguard-y += noise.o |
Oops, something went wrong.