diff options
author | Jakub Audykowicz <jakub.audykowicz@gmail.com> | 2018-12-04 20:27:41 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2019-12-13 08:52:29 +0100 |
commit | f033651fba25689f1bfa87bed8140add1b5adeab (patch) | |
tree | 495f600b0b491424bf356f4dd19864ea9b2d3ac5 /include | |
parent | 253c617ea626cb569c91215b7bbdfb53f2205a2b (diff) | |
download | linux-stable-f033651fba25689f1bfa87bed8140add1b5adeab.tar.gz linux-stable-f033651fba25689f1bfa87bed8140add1b5adeab.tar.bz2 linux-stable-f033651fba25689f1bfa87bed8140add1b5adeab.zip |
sctp: frag_point sanity check
[ Upstream commit afd0a8006e98b1890908f81746c94ca5dae29d7c ]
If for some reason an association's fragmentation point is zero,
sctp_datamsg_from_user will try to endlessly try to divide a message
into zero-sized chunks. This eventually causes kernel panic due to
running out of memory.
Although this situation is quite unlikely, it has occurred before as
reported. I propose to add this simple last-ditch sanity check due to
the severity of the potential consequences.
Signed-off-by: Jakub Audykowicz <jakub.audykowicz@gmail.com>
Acked-by: Neil Horman <nhorman@tuxdriver.com>
Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'include')
-rw-r--r-- | include/net/sctp/sctp.h | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/include/net/sctp/sctp.h b/include/net/sctp/sctp.h index ab9242e51d9e..2abbc15824af 100644 --- a/include/net/sctp/sctp.h +++ b/include/net/sctp/sctp.h @@ -620,4 +620,9 @@ static inline bool sctp_transport_pmtu_check(struct sctp_transport *t) return false; } +static inline __u32 sctp_min_frag_point(struct sctp_sock *sp, __u16 datasize) +{ + return sctp_mtu_payload(sp, SCTP_DEFAULT_MINSEGMENT, datasize); +} + #endif /* __net_sctp_h__ */ |