Skip to content

Commit

Permalink
[IPSEC] xfrm_user: Kill PAGE_SIZE check in verify_sec_ctx_len()
Browse files Browse the repository at this point in the history
First, it warns when PAGE_SIZE >= 64K because the ctx_len
field is 16-bits.

Secondly, if there are any real length limitations it can
be verified by the security layer security_xfrm_state_alloc()
call.

Signed-off-by: David S. Miller <davem@davemloft.net>
  • Loading branch information
David S. Miller committed Mar 21, 2006
1 parent 50bf3e2 commit 253aa11
Showing 1 changed file with 0 additions and 3 deletions.
3 changes: 0 additions & 3 deletions net/xfrm/xfrm_user.c
Original file line number Diff line number Diff line change
Expand Up @@ -101,9 +101,6 @@ static inline int verify_sec_ctx_len(struct rtattr **xfrma)

uctx = RTA_DATA(rt);

if (uctx->ctx_len > PAGE_SIZE)
return -EINVAL;

len += sizeof(struct xfrm_user_sec_ctx);
len += uctx->ctx_len;

Expand Down

0 comments on commit 253aa11

Please sign in to comment.