From patchwork Wed Dec 23 13:50:33 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Rui Salvaterra X-Patchwork-Id: 1420135 X-Patchwork-Delegate: hauke@hauke-m.de Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.openwrt.org (client-ip=2001:8b0:10b:1231::1; helo=merlin.infradead.org; envelope-from=openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=merlin.20170209 header.b=BHQcx2Ij; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=SUM6K4sv; dkim-atps=neutral Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4D1F8D48zhz9sVm for ; Thu, 24 Dec 2020 00:55:07 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:Message-Id:Date: Subject:To:From:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=ly1+vJkCF23JgUtRuioX8TlGVgJ37jqLjw5RN+lQB6w=; b=BHQcx2IjU+iHgdBKvMSnBvD4K CywKjov+VMJxsgQtEycV+1aCldwNK4achVK/j05TsVPzBsebVH/p3Owgx4LH+hVhlyXv+igInwyam W61Jum3fibOS370u3vTPJyiSTLGHD257YTwQF5cxFT1uLUouBogqb1kbq6uzNuEUXQfpQ/J5Ldpq/ p+v53asubvpvf5NxfEYwsYc4WILIbNfHkBIMfFAzSLCkRFxdGoObrNeWgKQ2mzLSswBPOSZHczFJ1 ktGPujieewjLy2KKvhAZ9n7VK3ZuR7dwoOaONfwaseLjqm14BmzMm/vkf8EnrrYDkWaFRVhUiKrRP ZOgXoZRsQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1ks4XR-0007uV-Vi; Wed, 23 Dec 2020 13:50:50 +0000 Received: from mail-qt1-x835.google.com ([2607:f8b0:4864:20::835]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1ks4XN-0007t2-3K for openwrt-devel@lists.openwrt.org; Wed, 23 Dec 2020 13:50:45 +0000 Received: by mail-qt1-x835.google.com with SMTP id g24so11214943qtq.12 for ; Wed, 23 Dec 2020 05:50:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=gt5xYOWrxnozIPwqXHVaOezI5oVecFWrcSHzhdWsyNk=; b=SUM6K4sv7U10isP7hGj+UCDHgr3DkFHtPJW5Uft/c9yrqhwYxyuuns0JmXNQGJFV/z xc+KWebPg6hA4I8YTbExSlCIFqmB1/QSN8G1ZijzyCcxVrOezCsgWdFCgiO+TqioJ7tf sWnePWvQNjiKGsQCJjBeNhJQEGKJRI9213NsJh/3R1ar4X1cY5yVupWWZAsfTuDQw82w pKLGpvHOkKPkJpzKajjqliJvB22uhhpdIlQSJbfcdssSJt5YDoEFk09mFy+jsdJwB7fz s7++UJRMjRXyWmLUBKZXx4Mat4s6virexvAPoavyRrfUO361QGX0MG1YPJeaUdNsVBmF Q64Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=gt5xYOWrxnozIPwqXHVaOezI5oVecFWrcSHzhdWsyNk=; b=REgMU2DkdQDa5ZRkXyWHusk3CYYyOR9SK4oKUTk/yetuN4moc9P8m5ur1LbP0eTfHv pD0Hyrda+ReuhxJ764aaFVJtF0EPZUyXrbZRnPwM79UiSkn3/P11NA6XYdS6Vz4dPeWi N0plrwzboDFXXT9r0S5xozUY4+gd7RX3apsEwGHtDSmslgzV4RtJltyZqX5vTaSF0Nc0 b3PsQLP50Pk5h/VQjizOHI9rD7SkG4++dsLMMp4O8FwiBMRSkHUa5avQowFqqIFepDqs epq20AznEivoP1gJ7xPajbjgHeu77biPB2I+l9eYjLDJd5jW2w5nGki8qI/nOdSEhH3Y lcLw== X-Gm-Message-State: AOAM530FpQ6EaFEmON9YFQdMX9ZPDTay8uFGI0zR8O42Dfwj2Xv0nWon QfD9UCGcK7CeCZC5dcZANgg2JV7ZIg== X-Google-Smtp-Source: ABdhPJyTGFNsSrKX0FwWE71qNnrzoFw4cTlbreMcnwhrebVVa3u4SHNNeN9/cSWReqKV21WAaQdsDQ== X-Received: by 2002:ac8:44a2:: with SMTP id a2mr25612730qto.91.1608731441845; Wed, 23 Dec 2020 05:50:41 -0800 (PST) Received: from presler.lan (a95-94-74-213.cpe.netcabo.pt. [95.94.74.213]) by smtp.gmail.com with ESMTPSA id j30sm15107208qtl.43.2020.12.23.05.50.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 23 Dec 2020 05:50:41 -0800 (PST) From: Rui Salvaterra To: daniel@makrotopia.org Subject: [PATCH 1/2] kernel/hack-5.4: make UDP tunneling user-selectable Date: Wed, 23 Dec 2020 13:50:33 +0000 Message-Id: <20201223135034.358561-2-rsalvaterra@gmail.com> X-Mailer: git-send-email 2.30.0.rc1 In-Reply-To: <20201223135034.358561-1-rsalvaterra@gmail.com> References: <20201223135034.358561-1-rsalvaterra@gmail.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201223_085045_209231_6ABC7AE7 X-CRM114-Status: GOOD ( 13.24 ) X-Spam-Score: -0.2 (/) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (-0.2 points) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [2607:f8b0:4864:20:0:0:0:835 listed in] [list.dnswl.org] 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider [rsalvaterra[at]gmail.com] 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.0 SPF_PASS SPF: sender matches SPF record -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain X-BeenThere: openwrt-devel@lists.openwrt.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: OpenWrt Development List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: openwrt-devel@lists.openwrt.org, Rui Salvaterra Sender: "openwrt-devel" Errors-To: openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org UDP tunneling support isn't user-selectable, but it's required by WireGuard which is, for the time being, an out-of-tree module. We currently work around this issue by selecting an unrelated module which depends on UDP tunnelling (VXLAN). This is inconvenient, as it implies this unrelated module needs to be built-in when doing a monolithic build. Fix this inconvenience by making UDP tunneling user-selectable in the kernel configuration. Signed-off-by: Rui Salvaterra --- .../generic/hack-5.4/249-udp-tunnel-selection.patch | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 target/linux/generic/hack-5.4/249-udp-tunnel-selection.patch diff --git a/target/linux/generic/hack-5.4/249-udp-tunnel-selection.patch b/target/linux/generic/hack-5.4/249-udp-tunnel-selection.patch new file mode 100644 index 0000000000..2c74298dfe --- /dev/null +++ b/target/linux/generic/hack-5.4/249-udp-tunnel-selection.patch @@ -0,0 +1,11 @@ +--- a/net/ipv4/Kconfig ++++ b/net/ipv4/Kconfig +@@ -315,7 +315,7 @@ config NET_IPVTI + on top. + + config NET_UDP_TUNNEL +- tristate ++ tristate "IP: UDP tunneling support" + select NET_IP_TUNNEL + default n +