aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/src
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2017-07-28 00:27:16 +0200
committerJason A. Donenfeld <Jason@zx2c4.com>2017-07-28 00:27:16 +0200
commitc8d669fd508f354bc51435d050bc144af748cd9b (patch)
tree50c9bb15e4c784bb6e854e0f945d058a0eb87486 /src
parentcompat: work around odd kernels that backport kv[mz]alloc (diff)
downloadwireguard-monolithic-historical-c8d669fd508f354bc51435d050bc144af748cd9b.tar.xz
wireguard-monolithic-historical-c8d669fd508f354bc51435d050bc144af748cd9b.zip
recieve: cleanup variable usage
Diffstat (limited to 'src')
-rw-r--r--src/receive.c18
1 files changed, 7 insertions, 11 deletions
diff --git a/src/receive.c b/src/receive.c
index 3d7a330..867703c 100644
--- a/src/receive.c
+++ b/src/receive.c
@@ -180,16 +180,12 @@ static void keep_key_fresh(struct wireguard_peer *peer)
void packet_consume_data_done(struct sk_buff *skb, struct wireguard_peer *peer, struct endpoint *endpoint, bool used_new_key)
{
- struct net_device *dev;
+ struct net_device *dev = peer->device->dev;
struct wireguard_peer *routed_peer;
- struct wireguard_device *wg;
unsigned int len;
socket_set_peer_endpoint(peer, endpoint);
- wg = peer->device;
- dev = wg->dev;
-
if (unlikely(used_new_key)) {
peer->sent_lastminute_handshake = false;
packet_send_queue(peer);
@@ -200,7 +196,7 @@ void packet_consume_data_done(struct sk_buff *skb, struct wireguard_peer *peer,
/* A packet with length 0 is a keepalive packet */
if (unlikely(!skb->len)) {
- net_dbg_ratelimited("%s: Receiving keepalive packet from peer %Lu (%pISpfsc)\n", peer->device->dev->name, peer->internal_id, &peer->endpoint.addr);
+ net_dbg_ratelimited("%s: Receiving keepalive packet from peer %Lu (%pISpfsc)\n", dev->name, peer->internal_id, &peer->endpoint.addr);
goto packet_processed;
}
@@ -234,7 +230,7 @@ void packet_consume_data_done(struct sk_buff *skb, struct wireguard_peer *peer,
timers_data_received(peer);
- routed_peer = routing_table_lookup_src(&wg->peer_routing_table, skb);
+ routed_peer = routing_table_lookup_src(&peer->device->peer_routing_table, skb);
peer_put(routed_peer); /* We don't need the extra reference. */
if (unlikely(routed_peer != peer))
@@ -245,22 +241,22 @@ void packet_consume_data_done(struct sk_buff *skb, struct wireguard_peer *peer,
rx_stats(peer, len);
else {
++dev->stats.rx_dropped;
- net_dbg_ratelimited("%s: Failed to give packet to userspace from peer %Lu (%pISpfsc)\n", peer->device->dev->name, peer->internal_id, &peer->endpoint.addr);
+ net_dbg_ratelimited("%s: Failed to give packet to userspace from peer %Lu (%pISpfsc)\n", dev->name, peer->internal_id, &peer->endpoint.addr);
}
goto continue_processing;
dishonest_packet_peer:
- net_dbg_skb_ratelimited("%s: Packet has unallowed src IP (%pISc) from peer %Lu (%pISpfsc)\n", peer->device->dev->name, skb, peer->internal_id, &peer->endpoint.addr);
+ net_dbg_skb_ratelimited("%s: Packet has unallowed src IP (%pISc) from peer %Lu (%pISpfsc)\n", dev->name, skb, peer->internal_id, &peer->endpoint.addr);
++dev->stats.rx_errors;
++dev->stats.rx_frame_errors;
goto packet_processed;
dishonest_packet_type:
- net_dbg_ratelimited("%s: Packet is neither ipv4 nor ipv6 from peer %Lu (%pISpfsc)\n", peer->device->dev->name, peer->internal_id, &peer->endpoint.addr);
+ net_dbg_ratelimited("%s: Packet is neither ipv4 nor ipv6 from peer %Lu (%pISpfsc)\n", dev->name, peer->internal_id, &peer->endpoint.addr);
++dev->stats.rx_errors;
++dev->stats.rx_frame_errors;
goto packet_processed;
dishonest_packet_size:
- net_dbg_ratelimited("%s: Packet has incorrect size from peer %Lu (%pISpfsc)\n", peer->device->dev->name, peer->internal_id, &peer->endpoint.addr);
+ net_dbg_ratelimited("%s: Packet has incorrect size from peer %Lu (%pISpfsc)\n", dev->name, peer->internal_id, &peer->endpoint.addr);
++dev->stats.rx_errors;
++dev->stats.rx_length_errors;
goto packet_processed;