Re: [PATCH CLEANUP] sctp: fix the comment of sctp_sf_violation_paramlen()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Wei Yongjun wrote, at 05/17/2010 02:14 PM:
> 
> 于 2010年05月17日 14:08, Shan Wei 写道:
>> The comment about sctp_sf_violation_paramlen() is wrong.
>>
>> Invalid length should be identified as it does not equal actual length
>> of a given parameter. The actual length of a given parameter is not including
>> the padding part.
>>   
> 
> Not right. If the param length is larger then what is request, we
> also treat it as correct. And for unkonw params, we just check
> the length larger then the minimal length.

>From the code of sctp_verify_asconf(), I saw that if length value of any parameter in chunk
is not equal true length, sctp_verify_asconf() return 0.

@@sctp_verify_asconf()
3045                 if (param.v > chunk_end - length ||
3046                     length < sizeof(sctp_paramhdr_t))
3047                         return 0;


-- 
Best Regards
-----
Shan Wei

--
To unsubscribe from this list: send the line "unsubscribe linux-sctp" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Networking Development]     [Linux OMAP]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux