diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2022-03-29 21:31:24 -0400 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2022-07-07 13:26:45 +0200 |
commit | 2b7d2f34567a8e30fce64c6de66b312d2601ab1d (patch) | |
tree | ef3944cb00fa93bb9702105c1000658f1c41e786 /drivers/net/wireguard/socket.c | |
parent | f703a54ccfbd5c15d52eb7d8e9f8e8723dc8bb3e (diff) | |
download | wireguard-linux-trimmed-2b7d2f34567a8e30fce64c6de66b312d2601ab1d.tar.gz wireguard-linux-trimmed-2b7d2f34567a8e30fce64c6de66b312d2601ab1d.zip |
wireguard: queueing: use CFI-safe ptr_ring cleanup function
commit ec59f128a9bd4255798abb1e06ac3b442f46ef68 upstream.
We make too nuanced use of ptr_ring to entirely move to the skb_array
wrappers, but we at least should avoid the naughty function pointer cast
when cleaning up skbs. Otherwise RAP/CFI will honk at us. This patch
uses the __skb_array_destroy_skb wrapper for the cleanup, rather than
directly providing kfree_skb, which is what other drivers in the same
situation do too.
Reported-by: PaX Team <pageexec@freemail.hu>
Fixes: 886fcee939ad ("wireguard: receive: use ring buffer for incoming handshakes")
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Diffstat (limited to 'drivers/net/wireguard/socket.c')
0 files changed, 0 insertions, 0 deletions