linux-stable/drivers/net/wireguard
Jason A. Donenfeld 09c3fa70f6 wireguard: netlink: access device through ctx instead of peer
[ Upstream commit 71cbd32e3d ]

The previous commit fixed a bug that led to a NULL peer->device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx->wg. This semantically makes more sense
too, since ctx->wg->peer_allowedips.seq is compared with
ctx->allowedips_seq, basing them both in ctx. This also acts as a
defence in depth provision against freed peers.

Cc: stable@vger.kernel.org
Fixes: e7096c131e ("net: WireGuard secure network tunnel")
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Reviewed-by: Jiri Pirko <jiri@nvidia.com>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-04-03 15:19:38 +02:00
..
selftest wireguard: allowedips: expand maximum node depth 2023-08-16 18:27:20 +02:00
Makefile
allowedips.c wireguard: allowedips: expand maximum node depth 2023-08-16 18:27:20 +02:00
allowedips.h
cookie.c
cookie.h
device.c wireguard: use DEV_STATS_INC() 2023-12-03 07:32:07 +01:00
device.h
main.c
messages.h
netlink.c wireguard: netlink: access device through ctx instead of peer 2024-04-03 15:19:38 +02:00
netlink.h
noise.c
noise.h
peer.c
peer.h
peerlookup.c
peerlookup.h
queueing.c
queueing.h
ratelimiter.c
ratelimiter.h
receive.c wireguard: receive: annotate data-race around receiving_counter.counter 2024-03-26 18:21:00 -04:00
send.c wireguard: use DEV_STATS_INC() 2023-12-03 07:32:07 +01:00
socket.c
socket.h
timers.c
timers.h
version.h