From nobody Fri Oct 3 06:37:15 2025 Received: from mail1.fiberby.net (mail1.fiberby.net [193.104.135.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 800352E7635; Thu, 4 Sep 2025 22:03:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=193.104.135.124 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757023413; cv=none; b=D64ghI92RsJiYlm1rviF+C4pQFemncNh2H4URhgzdt+ftFyonm9iBA+/6tuwz/8e4AibI7bFCmxI3paTdJRnmon+lnil+ApAKIEG4/+/iLKOWndYVUokIMtlf324czehPt2tQA0kKOXQnFRhbxU9AXXP2bBdH52NGHaRDcsEH/I= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1757023413; c=relaxed/simple; bh=HDjLGdakeEgBxhxtRpsEM7x1k+CfKJ0/LjGVCRNwVuo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=SNAmPw69J21f5jRadH+0AZoblTYP1p5yMQ94IQaCVPZ7Ac0YULXYL4n8zqU0ZyMgs1LsbIM6BOOXjDQPr0PmK0le61YTxI6/btQ49kPewlN6fqjBOcmdlmIoW/ltrDsVhFjOvxrxmcKvXs0nnMFp1+kDqUq+re/6+Pxr/qBq764= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=fiberby.net; spf=pass smtp.mailfrom=fiberby.net; dkim=pass (2048-bit key) header.d=fiberby.net header.i=@fiberby.net header.b=Rd0yVeHH; arc=none smtp.client-ip=193.104.135.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=fiberby.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=fiberby.net Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=fiberby.net header.i=@fiberby.net header.b="Rd0yVeHH" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fiberby.net; s=202008; t=1757023398; bh=HDjLGdakeEgBxhxtRpsEM7x1k+CfKJ0/LjGVCRNwVuo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Rd0yVeHHooiX9mtR4bNKHCb5VbHlFdLXERrpDO1WVmzK6rTuTCs7d7nMw+ZJWxqhE HLftjA3sWz+fx3cjz2UDkwKWc5v8I7McEXT0dC3OQhasQTHzWh15Eun2Is8crv2FVY KudLfhvKtmLm+puR97UJO5zeoevDjRbZbkHnOwbkq0VyJwxRfSHxKb7/bRuPx/KnTa uy0pSwG2VhmDP8EZyRHMch+yzpGpMD4QugqfGjrA6avViSzt334Xo7UNvSgmNwy3cR t041XDKolPHUAHpxQvjSSpYEIfc2zuIm1xUD0B/7+FvoApnig7vaBF37N/BV7B0snS Zu/xlvLf1B/HQ== Received: from x201s (193-104-135-243.ip4.fiberby.net [193.104.135.243]) by mail1.fiberby.net (Postfix) with ESMTPSA id B4507601B9; Thu, 4 Sep 2025 22:03:18 +0000 (UTC) Received: by x201s (Postfix, from userid 1000) id 4C32A202886; Thu, 04 Sep 2025 22:02:58 +0000 (UTC) From: =?UTF-8?q?Asbj=C3=B8rn=20Sloth=20T=C3=B8nnesen?= To: "Jason A. Donenfeld" , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni Cc: =?UTF-8?q?Asbj=C3=B8rn=20Sloth=20T=C3=B8nnesen?= , Donald Hunter , Simon Horman , Jacob Keller , Andrew Lunn , wireguard@lists.zx2c4.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC net-next 02/14] wireguard: netlink: validate nested arrays in policy Date: Thu, 4 Sep 2025 22:02:36 +0000 Message-ID: <20250904220255.1006675-2-ast@fiberby.net> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20250904-wg-ynl-rfc@fiberby.net> References: <20250904-wg-ynl-rfc@fiberby.net> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Use NLA_POLICY_NESTED_ARRAY() to add nested array validation. No behavioural changes intended, as the nested policy is already enforced through nla_parse_nested(). This patch is an incremental step towards adopting a policy generated by ynl-gen. Signed-off-by: Asbj=C3=B8rn Sloth T=C3=B8nnesen --- drivers/net/wireguard/netlink.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/net/wireguard/netlink.c b/drivers/net/wireguard/netlin= k.c index 086edd4bb33b..742d3f88d132 100644 --- a/drivers/net/wireguard/netlink.c +++ b/drivers/net/wireguard/netlink.c @@ -27,7 +27,7 @@ static const struct nla_policy device_policy[WGDEVICE_A_M= AX + 1] =3D { [WGDEVICE_A_FLAGS] =3D NLA_POLICY_MASK(NLA_U32, __WGDEVICE_F_ALL), [WGDEVICE_A_LISTEN_PORT] =3D { .type =3D NLA_U16 }, [WGDEVICE_A_FWMARK] =3D { .type =3D NLA_U32 }, - [WGDEVICE_A_PEERS] =3D { .type =3D NLA_NESTED } + [WGDEVICE_A_PEERS] =3D NLA_POLICY_NESTED_ARRAY(peer_policy), }; =20 static const struct nla_policy peer_policy[WGPEER_A_MAX + 1] =3D { @@ -39,7 +39,7 @@ static const struct nla_policy peer_policy[WGPEER_A_MAX += 1] =3D { [WGPEER_A_LAST_HANDSHAKE_TIME] =3D NLA_POLICY_EXACT_LEN(sizeof(struct _= _kernel_timespec)), [WGPEER_A_RX_BYTES] =3D { .type =3D NLA_U64 }, [WGPEER_A_TX_BYTES] =3D { .type =3D NLA_U64 }, - [WGPEER_A_ALLOWEDIPS] =3D { .type =3D NLA_NESTED }, + [WGPEER_A_ALLOWEDIPS] =3D NLA_POLICY_NESTED_ARRAY(allowedip_policy), [WGPEER_A_PROTOCOL_VERSION] =3D { .type =3D NLA_U32 } }; =20 --=20 2.51.0