Skip to content

Commit 359e54a

Browse files
tomparkinPaolo Abeni
authored andcommitted
l2tp: pass correct message length to ip6_append_data
l2tp_ip6_sendmsg needs to avoid accounting for the transport header twice when splicing more data into an already partially-occupied skbuff. To manage this, we check whether the skbuff contains data using skb_queue_empty when deciding how much data to append using ip6_append_data. However, the code which performed the calculation was incorrect: ulen = len + skb_queue_empty(&sk->sk_write_queue) ? transhdrlen : 0; ...due to C operator precedence, this ends up setting ulen to transhdrlen for messages with a non-zero length, which results in corrupted packets on the wire. Add parentheses to correct the calculation in line with the original intent. Fixes: 9d4c758 ("ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()") Cc: David Howells <[email protected]> Cc: [email protected] Signed-off-by: Tom Parkin <[email protected]> Reviewed-by: Simon Horman <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Paolo Abeni <[email protected]>
1 parent 9ff2794 commit 359e54a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

net/l2tp/l2tp_ip6.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -627,7 +627,7 @@ static int l2tp_ip6_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
627627

628628
back_from_confirm:
629629
lock_sock(sk);
630-
ulen = len + skb_queue_empty(&sk->sk_write_queue) ? transhdrlen : 0;
630+
ulen = len + (skb_queue_empty(&sk->sk_write_queue) ? transhdrlen : 0);
631631
err = ip6_append_data(sk, ip_generic_getfrag, msg,
632632
ulen, transhdrlen, &ipc6,
633633
&fl6, (struct rt6_info *)dst,

0 commit comments

Comments
 (0)