On Mon, Aug 19, 2019 at 10:02:46PM +0800, Xin Long wrote: > +static int sctp_setsockopt_asconf_supported(struct sock *sk, > + char __user *optval, > + unsigned int optlen) > +{ > + struct sctp_assoc_value params; > + struct sctp_association *asoc; > + struct sctp_endpoint *ep; > + int retval = -EINVAL; > + > + if (optlen != sizeof(params)) > + goto out; > + > + if (copy_from_user(¶ms, optval, optlen)) { > + retval = -EFAULT; > + goto out; > + } > + > + asoc = sctp_id2assoc(sk, params.assoc_id); > + if (!asoc && params.assoc_id != SCTP_FUTURE_ASSOC && > + sctp_style(sk, UDP)) > + goto out; > + > + ep = sctp_sk(sk)->ep; > + ep->asconf_enable = !!params.assoc_value; Considering this will be negotiated on handshake, shouldn't it deny changes to Established asocs? (Same for Auth) > + > + if (ep->asconf_enable && ep->auth_enable) { > + sctp_auth_ep_add_chunkid(ep, SCTP_CID_ASCONF); > + sctp_auth_ep_add_chunkid(ep, SCTP_CID_ASCONF_ACK); > + } > + > + retval = 0; > + > +out: > + return retval; > +}