Skip to content

Commit 469689a

Browse files
Ursula Braundavem330
authored andcommitted
af_iucv: exploit target message class support of IUCV
The first 4 bytes of data to be sent are stored additionally into the message class field of the send request. A receiving target program (not an af_iucv socket program) can make use of this information to pre-screen incoming messages. Signed-off-by: Ursula Braun <braunu@de.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net>
1 parent 7b9d1b2 commit 469689a

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

net/iucv/af_iucv.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -644,6 +644,7 @@ static int iucv_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
644644
}
645645

646646
txmsg.class = 0;
647+
memcpy(&txmsg.class, skb->data, skb->len >= 4 ? 4 : skb->len);
647648
txmsg.tag = iucv->send_tag++;
648649
memcpy(skb->cb, &txmsg.tag, 4);
649650
skb_queue_tail(&iucv->send_skb_q, skb);

0 commit comments

Comments
 (0)