diff options
author | David S. Miller <davem@davemloft.net> | 2006-03-21 01:23:35 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2006-03-21 01:23:35 -0500 |
commit | 253aa11578c1b89757282430891bb66ae5300092 (patch) | |
tree | 00ff3d18c1a7ead1bca4602385e85b65f012823c | |
parent | 50bf3e224a2963c6dd5098f77bd7233222ebfbd2 (diff) |
[IPSEC] xfrm_user: Kill PAGE_SIZE check in verify_sec_ctx_len()
First, it warns when PAGE_SIZE >= 64K because the ctx_len
field is 16-bits.
Secondly, if there are any real length limitations it can
be verified by the security layer security_xfrm_state_alloc()
call.
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/xfrm/xfrm_user.c | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index 07b71680cde0..7b1acd995168 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c | |||
@@ -101,9 +101,6 @@ static inline int verify_sec_ctx_len(struct rtattr **xfrma) | |||
101 | 101 | ||
102 | uctx = RTA_DATA(rt); | 102 | uctx = RTA_DATA(rt); |
103 | 103 | ||
104 | if (uctx->ctx_len > PAGE_SIZE) | ||
105 | return -EINVAL; | ||
106 | |||
107 | len += sizeof(struct xfrm_user_sec_ctx); | 104 | len += sizeof(struct xfrm_user_sec_ctx); |
108 | len += uctx->ctx_len; | 105 | len += uctx->ctx_len; |
109 | 106 | ||