From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 458D63203BE; Mon, 18 Aug 2025 13:28:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755523696; cv=none; b=iqnYf+WI6N5oC1mtdYWotIJC5R2VQLY7TFZxp3W+Hw8onYQM15Tdy9UGkFY4Z7SVFkvP+OmR5K/kyl5+dbPQ4XuX13iURe+E1Mh892BX2KYdnDRpnW07O3w2WTPzFwEZZQL4EECfxcEGe/x2MW5C46P/7TOf6JHdcRDlADssXQk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755523696; c=relaxed/simple; bh=rztUob9sXHVa3KlDlN5zXU1JgnngtIvLB5fBO4Ax3ds=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=twl3BCmnu7p0pzXRnbU3zoeenqXT5b1YkuieD2JX6OlAmazWtplvaCJO1CW5l/jZwsIbdbyVOPM7xjdRSdvVRQzrfEi6oa6dgunzLajwNV3WcFvDuUWoZbFUU4T8atIaCIy4hXznsPymh9KoM3lX+wxWiL3AvxOPPYeVdUh5Sc4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=n3Ahaxaq; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="n3Ahaxaq" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7E752C4CEEB; Mon, 18 Aug 2025 13:28:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1755523696; bh=rztUob9sXHVa3KlDlN5zXU1JgnngtIvLB5fBO4Ax3ds=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=n3AhaxaqocEG8wJOc8esXTLJd3jiviOYVayrMnYjxR+bKvoniEg58Rmmp3bjVHy5Z anRjadBFx9KZAv+YwNDAXjg1HPKHhjIBZOQTgwFrUhosd2+LQSqxGYDv9XOcUa3tDK kZvj0xLICUBi0y7qrYix4ZWxLgHscN+2a0hcvbLE= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Matt Johnston , Paolo Abeni , Sasha Levin Subject: [PATCH 6.15 223/515] net: mctp: Prevent duplicate binds Date: Mon, 18 Aug 2025 14:43:29 +0200 Message-ID: <20250818124506.950004580@linuxfoundation.org> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20250818124458.334548733@linuxfoundation.org> References: <20250818124458.334548733@linuxfoundation.org> User-Agent: quilt/0.68 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Matt Johnston [ Upstream commit 3954502377ec05a1b37e2dc9bef0bacd4bbd71b2 ] Disallow bind() calls that have the same arguments as existing bound sockets. Previously multiple sockets could bind() to the same type/local address, with an arbitrary socket receiving matched messages. This is only a partial fix, a future commit will define precedence order for MCTP_ADDR_ANY versus specific EID bind(), which are allowed to exist together. Signed-off-by: Matt Johnston Link: https://patch.msgid.link/20250710-mctp-bind-v4-2-8ec2f6460c56@codeconstruct.com.au Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- net/mctp/af_mctp.c | 26 +++++++++++++++++++++++--- 1 file changed, 23 insertions(+), 3 deletions(-) diff --git a/net/mctp/af_mctp.c b/net/mctp/af_mctp.c index 9b12ca97f412..9d5db3feedec 100644 --- a/net/mctp/af_mctp.c +++ b/net/mctp/af_mctp.c @@ -73,7 +73,6 @@ static int mctp_bind(struct socket *sock, struct sockaddr *addr, int addrlen) lock_sock(sk); - /* TODO: allow rebind */ if (sk_hashed(sk)) { rc = -EADDRINUSE; goto out_release; @@ -629,15 +628,36 @@ static void mctp_sk_close(struct sock *sk, long timeout) static int mctp_sk_hash(struct sock *sk) { struct net *net = sock_net(sk); + struct sock *existing; + struct mctp_sock *msk; + int rc; + + msk = container_of(sk, struct mctp_sock, sk); /* Bind lookup runs under RCU, remain live during that. */ sock_set_flag(sk, SOCK_RCU_FREE); mutex_lock(&net->mctp.bind_lock); + + /* Prevent duplicate binds. */ + sk_for_each(existing, &net->mctp.binds) { + struct mctp_sock *mex = + container_of(existing, struct mctp_sock, sk); + + if (mex->bind_type == msk->bind_type && + mex->bind_addr == msk->bind_addr && + mex->bind_net == msk->bind_net) { + rc = -EADDRINUSE; + goto out; + } + } + sk_add_node_rcu(sk, &net->mctp.binds); - mutex_unlock(&net->mctp.bind_lock); + rc = 0; - return 0; +out: + mutex_unlock(&net->mctp.bind_lock); + return rc; } static void mctp_sk_unhash(struct sock *sk) -- 2.39.5