[IPSEC] xfrm_user: Kill PAGE_SIZE check in verify_sec_ctx_len()
First, it warns when PAGE_SIZE >= 64K because the ctx_len field is 16-bits. Secondly, if there are any real length limitations it can be verified by the security layer security_xfrm_state_alloc() call. Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
50bf3e224a
commit
253aa11578
1 changed files with 0 additions and 3 deletions
|
@ -101,9 +101,6 @@ static inline int verify_sec_ctx_len(struct rtattr **xfrma)
|
|||
|
||||
uctx = RTA_DATA(rt);
|
||||
|
||||
if (uctx->ctx_len > PAGE_SIZE)
|
||||
return -EINVAL;
|
||||
|
||||
len += sizeof(struct xfrm_user_sec_ctx);
|
||||
len += uctx->ctx_len;
|
||||
|
||||
|
|
Loading…
Reference in a new issue