diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2024-03-14 16:49:10 -0600 |
---|---|---|
committer | Paolo Abeni <pabeni@redhat.com> | 2024-03-19 11:22:50 +0100 |
commit | 71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f (patch) | |
tree | 5031286bc7301b86688e44053c9ae8a3c2349f5c /drivers/net | |
parent | 55b6c738673871c9b0edae05d0c97995c1ff08c4 (diff) | |
download | linux-71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f.tar.gz linux-71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f.tar.bz2 linux-71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f.zip |
wireguard: netlink: access device through ctx instead of peer
The previous commit fixed a bug that led to a NULL peer->device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx->wg. This semantically makes more sense
too, since ctx->wg->peer_allowedips.seq is compared with
ctx->allowedips_seq, basing them both in ctx. This also acts as a
defence in depth provision against freed peers.
Cc: stable@vger.kernel.org
Fixes: e7096c131e51 ("net: WireGuard secure network tunnel")
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Reviewed-by: Jiri Pirko <jiri@nvidia.com>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Diffstat (limited to 'drivers/net')
-rw-r--r-- | drivers/net/wireguard/netlink.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/drivers/net/wireguard/netlink.c b/drivers/net/wireguard/netlink.c index c17aee454fa3..f7055180ba4a 100644 --- a/drivers/net/wireguard/netlink.c +++ b/drivers/net/wireguard/netlink.c @@ -164,8 +164,8 @@ get_peer(struct wg_peer *peer, struct sk_buff *skb, struct dump_ctx *ctx) if (!allowedips_node) goto no_allowedips; if (!ctx->allowedips_seq) - ctx->allowedips_seq = peer->device->peer_allowedips.seq; - else if (ctx->allowedips_seq != peer->device->peer_allowedips.seq) + ctx->allowedips_seq = ctx->wg->peer_allowedips.seq; + else if (ctx->allowedips_seq != ctx->wg->peer_allowedips.seq) goto no_allowedips; allowedips_nest = nla_nest_start(skb, WGPEER_A_ALLOWEDIPS); |