linux-stable/drivers/net/wireguard
Jason A. Donenfeld d44bd323d8 wireguard: netlink: access device through ctx instead of peer
[ Upstream commit 71cbd32e3d ]

The previous commit fixed a bug that led to a NULL peer->device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx->wg. This semantically makes more sense
too, since ctx->wg->peer_allowedips.seq is compared with
ctx->allowedips_seq, basing them both in ctx. This also acts as a
defence in depth provision against freed peers.

Cc: stable@vger.kernel.org
Fixes: e7096c131e ("net: WireGuard secure network tunnel")
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Reviewed-by: Jiri Pirko <jiri@nvidia.com>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-04-03 15:32:26 +02:00
..
selftest wireguard: allowedips: expand maximum node depth 2023-08-07 12:26:57 -07:00
Makefile
allowedips.c wireguard: allowedips: expand maximum node depth 2023-08-07 12:26:57 -07:00
allowedips.h
cookie.c wireguard: do not include crypto/algapi.h 2023-09-15 18:29:44 +08:00
cookie.h
device.c wireguard: use DEV_STATS_INC() 2023-11-19 19:48:25 +00:00
device.h
main.c
messages.h
netlink.c wireguard: netlink: access device through ctx instead of peer 2024-04-03 15:32:26 +02:00
netlink.h
noise.c wireguard: do not include crypto/algapi.h 2023-09-15 18:29:44 +08:00
noise.h
peer.c net: drop the weight argument from netif_napi_add 2022-09-28 18:57:14 -07:00
peer.h
peerlookup.c
peerlookup.h
queueing.c wireguard: queueing: use saner cpu selection wrapping 2023-07-03 09:17:52 +01:00
queueing.h wireguard: queueing: use saner cpu selection wrapping 2023-07-03 09:17:52 +01:00
ratelimiter.c
ratelimiter.h
receive.c wireguard: receive: annotate data-race around receiving_counter.counter 2024-03-26 18:17:35 -04:00
send.c wireguard: use DEV_STATS_INC() 2023-11-19 19:48:25 +00:00
socket.c
socket.h
timers.c wireguard: timers: move to using timer_delete_sync 2023-07-03 09:17:52 +01:00
timers.h
version.h