Date: Fri, 19 Feb 2016 09:26:44 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 207312] Useless check in netipsec/key.c Message-ID: <bug-207312-8-IXHkvQ4GA3@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-207312-8@https.bugs.freebsd.org/bugzilla/> References: <bug-207312-8@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207312 --- Comment #1 from Andrey V. Elsukov <ae@FreeBSD.org> --- (In reply to Mikhail Teterin from comment #0) > @@ -7245,9 +7245,8 @@ key_parse(struct mbuf *m, struct socket > orglen = PFKEY_UNUNIT64(msg->sadb_msg_len); > target = KEY_SENDUP_ONE; > > - if ((m->m_flags & M_PKTHDR) == 0 || > - m->m_pkthdr.len != m->m_pkthdr.len) { > - ipseclog((LOG_DEBUG, "%s: invalid message > length.\n",__func__)); The log message says about invalid length, probably, comparison should be done with orglen. I need some time to create the testing environment for this, can you test this by self? -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-207312-8-IXHkvQ4GA3>
