kernel-aes67/drivers/net/wireguard
Jason A. Donenfeld 71cbd32e3d wireguard: netlink: access device through ctx instead of peer
The previous commit fixed a bug that led to a NULL peer->device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx->wg. This semantically makes more sense
too, since ctx->wg->peer_allowedips.seq is compared with
ctx->allowedips_seq, basing them both in ctx. This also acts as a
defence in depth provision against freed peers.

Cc: stable@vger.kernel.org
Fixes: e7096c131e ("net: WireGuard secure network tunnel")
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Reviewed-by: Jiri Pirko <jiri@nvidia.com>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
2024-03-19 11:22:50 +01:00
..
selftest
Makefile
allowedips.c
allowedips.h
cookie.c
cookie.h
device.c wireguard: device: remove generic .ndo_get_stats64 2024-03-19 11:22:49 +01:00
device.h
main.c
messages.h
netlink.c wireguard: netlink: access device through ctx instead of peer 2024-03-19 11:22:50 +01:00
netlink.h
noise.c
noise.h
peer.c
peer.h
peerlookup.c
peerlookup.h
queueing.c
queueing.h
ratelimiter.c
ratelimiter.h
receive.c wireguard: receive: annotate data-race around receiving_counter.counter 2024-03-19 11:22:49 +01:00
send.c wireguard: use DEV_STATS_INC() 2023-11-19 19:48:25 +00:00
socket.c
socket.h
timers.c
timers.h
version.h