View | Details | Raw Unified | Return to bug 277456 | Differences between
and this patch

Collapse All | Expand All

(-)b/sys/netipsec/key_debug.c (-4 / +4 lines)
Lines 189-201 kdebug_sadb(struct sadb_msg *base) Link Here
189
		    ext->sadb_ext_len, ext->sadb_ext_type,
189
		    ext->sadb_ext_len, ext->sadb_ext_type,
190
		    kdebug_sadb_exttype(ext->sadb_ext_type));
190
		    kdebug_sadb_exttype(ext->sadb_ext_type));
191
191
192
		if (ext->sadb_ext_len == 0) {
192
		extlen = PFKEY_UNUNIT64(ext->sadb_ext_len);
193
		if (extlen == 0) {
193
			printf("%s: invalid ext_len=0 was passed.\n", __func__);
194
			printf("%s: invalid ext_len=0 was passed.\n", __func__);
194
			return;
195
			return;
195
		}
196
		}
196
		if (ext->sadb_ext_len > tlen) {
197
		if (extlen > tlen) {
197
			printf("%s: ext_len too big (%u > %u).\n",
198
			printf("%s: ext_len too big (%u > %u).\n",
198
				__func__, ext->sadb_ext_len, tlen);
199
			    __func__, extlen, tlen);
199
			return;
200
			return;
200
		}
201
		}
201
202
Lines 257-263 kdebug_sadb(struct sadb_msg *base) Link Here
257
			return;
258
			return;
258
		}
259
		}
259
260
260
		extlen = PFKEY_UNUNIT64(ext->sadb_ext_len);
261
		tlen -= extlen;
261
		tlen -= extlen;
262
		ext = (struct sadb_ext *)((caddr_t)ext + extlen);
262
		ext = (struct sadb_ext *)((caddr_t)ext + extlen);
263
	}
263
	}

Return to bug 277456