Received: by 10.223.176.5 with SMTP id f5csp3423058wra; Mon, 29 Jan 2018 12:59:12 -0800 (PST) X-Google-Smtp-Source: AH8x225tyg4SXkmrJTQGqNFXLo2sEp4YrgjHgty5sXgkHAdz7+WEkQv3aj7o9mPnPJ8Aqf+5B5Pj X-Received: by 2002:a17:902:658f:: with SMTP id c15-v6mr22754193plk.412.1517259552197; Mon, 29 Jan 2018 12:59:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517259552; cv=none; d=google.com; s=arc-20160816; b=bjFIEY8NaTtgcnnPV3UKfDmplS1X4fSFM3j7WNSyyDWzE3IRv/VzIBgspOizfzuGfV mx5b1I6zsY2Opj4TVbvSvJDi7bURnWnZ+Zl2tmF/Jgs34OyhnpOHecIQ/jwfCkyiwo4e 4ZIP8iqiVML13JmjEv2JEnrn/pqR1I7x/H4BUG/vsV5yF0ai0dkeAEMIo3F0Jpwkch1K lJJvFH9fRs75FNgvF6ZPmbTHslUVFsR6gLR74W5nSXBPM158qQZWwMMqYmT6RGeALa8H PZvp1Si5xxLwb57C9MsgxqHJMHECGgeRf3/p2H2i8GSpQq60qInShYtIHDbLqx6qGobU 5JSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=qc1N9tOC3xC5/QxaFcTVKW/5MD5i9qKcs/XvZD4cyHs=; b=QbiV6PZkZYbnLiIO9F5IIwbb/+MOkOJ2S3M27nBZfH1Q9smQXIvZCeD6dp/uuDj7+X 7Uuf37dGRdJ00c0iFltPe0rm0qW6orulW4+HMsDW0FSyRrYHPxHo/GSxI8YVY3qle6V3 XHNqKMj5zZLfjPdK74XCEtM7brWt3GCr9SFYWaD8cUx9nZJSNMPbveLTlxNW9WMsqS9U 3PKxQNAspStSRVCCRw0IOkU/SD93+fUCuhW+zX2hwjPAZ399dHnuYO6tqOAq5JNa2Lfa ewKK6JM2yPxOh+z71oo0rZVIZmw3q4MFEHqGNcJyqYYOAftTUMHzQJ9CaXdDnQf1R/sz d+8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i135si7954980pgc.459.2018.01.29.12.58.57; Mon, 29 Jan 2018 12:59:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751949AbeA2U5Q (ORCPT + 99 others); Mon, 29 Jan 2018 15:57:16 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:55046 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752126AbeA2UJ2 (ORCPT ); Mon, 29 Jan 2018 15:09:28 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id D8D472F32; Mon, 29 Jan 2018 13:03:08 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Shuah Khan Subject: [PATCH 4.4 52/74] usbip: prevent leaking socket pointer address in messages Date: Mon, 29 Jan 2018 13:56:57 +0100 Message-Id: <20180129123849.928797046@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180129123847.507563674@linuxfoundation.org> References: <20180129123847.507563674@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Shuah Khan commit 90120d15f4c397272aaf41077960a157fc4212bf upstream. usbip driver is leaking socket pointer address in messages. Remove the messages that aren't useful and print sockfd in the ones that are useful for debugging. Signed-off-by: Shuah Khan Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/stub_dev.c | 3 +-- drivers/usb/usbip/usbip_common.c | 15 ++++----------- drivers/usb/usbip/vhci_hcd.c | 2 +- 3 files changed, 6 insertions(+), 14 deletions(-) --- a/drivers/usb/usbip/stub_dev.c +++ b/drivers/usb/usbip/stub_dev.c @@ -163,8 +163,7 @@ static void stub_shutdown_connection(str * step 1? */ if (ud->tcp_socket) { - dev_dbg(&sdev->udev->dev, "shutdown tcp_socket %p\n", - ud->tcp_socket); + dev_dbg(&sdev->udev->dev, "shutdown sockfd %d\n", ud->sockfd); kernel_sock_shutdown(ud->tcp_socket, SHUT_RDWR); } --- a/drivers/usb/usbip/usbip_common.c +++ b/drivers/usb/usbip/usbip_common.c @@ -317,18 +317,14 @@ int usbip_recv(struct socket *sock, void struct msghdr msg; struct kvec iov; int total = 0; - /* for blocks of if (usbip_dbg_flag_xmit) */ char *bp = buf; int osize = size; - usbip_dbg_xmit("enter\n"); - - if (!sock || !buf || !size) { - pr_err("invalid arg, sock %p buff %p size %d\n", sock, buf, - size); + if (!sock || !buf || !size) return -EINVAL; - } + + usbip_dbg_xmit("enter\n"); do { sock->sk->sk_allocation = GFP_NOIO; @@ -341,11 +337,8 @@ int usbip_recv(struct socket *sock, void msg.msg_flags = MSG_NOSIGNAL; result = kernel_recvmsg(sock, &msg, &iov, 1, size, MSG_WAITALL); - if (result <= 0) { - pr_debug("receive sock %p buf %p size %u ret %d total %d\n", - sock, buf, size, result, total); + if (result <= 0) goto err; - } size -= result; buf += result; --- a/drivers/usb/usbip/vhci_hcd.c +++ b/drivers/usb/usbip/vhci_hcd.c @@ -778,7 +778,7 @@ static void vhci_shutdown_connection(str /* need this? see stub_dev.c */ if (ud->tcp_socket) { - pr_debug("shutdown tcp_socket %p\n", ud->tcp_socket); + pr_debug("shutdown sockfd %d\n", ud->sockfd); kernel_sock_shutdown(ud->tcp_socket, SHUT_RDWR); }