Received: by 10.223.176.5 with SMTP id f5csp1137175wra; Wed, 7 Feb 2018 13:22:58 -0800 (PST) X-Google-Smtp-Source: AH8x2270BTRvN8EYd//y8TRcFfDEfazvaHV56qVvLYp5nFgFkqUh2jSfzytdXpjNGE0UBSTC08xe X-Received: by 10.101.86.137 with SMTP id v9mr5954796pgs.353.1518038578144; Wed, 07 Feb 2018 13:22:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518038578; cv=none; d=google.com; s=arc-20160816; b=ZYT5lMMvVhqHfNQYT0431BoOmvMVXoraSx/u8bZ3OPa/ukMJ33OJJIrUCdjYzmCQsK GoXTB9QaZqdCpb2qIueEKJkIrE5mvlRWtieEeRgeQMIxwTFeAeJ9KQ1ot+/ESzemT78s MVZQPNicJygho1AhfFnW24N72mdkSYs4gCZY47YfqQ0baAkSpkAtIDyd/rMjeSAA1d35 IEue5Llgw4ksMbWAqKj5Boz8NIOyJC2KEnrE1CnVjc5QoTbSmXlpkvRDW8XoH8ZJIOHB lsRkd5NXUGtYHQCYzaqkQIUW3Ef1mCgMfCUH1CLmbyogBnu9NVqpuSZA9oXyg7EN6ac9 ZvRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Kz8Jlf0poOhGeyT4nj7KLAVfUpMhsMXJA76pBnFEwYM=; b=qLf28Ad1lFF9KneEe8DP66F5pRgdkPCgc4PxJUVi9qjrz4xyDx2g3xJna1H3Yqjyky 2jsU62Uerjj683/r0YbsSvPITm9Fz0v9Qqb0yLZ7M02c3oBLVaMLgJZGifgAVKi9Puzy cRJbeE819ED1DjqV4iwmUdLrU4m8Uys9aOZ2c8oDrl8pJP8GgQSBVCbicjmCqJfgZf47 15OyBcvSlhnYGb/4JaMulahWIcw5Jow4fW33yko8q3dJMhNIzeE0E1xacAYATxZJqFyz SzE+B6973/TTWFAeIh28ELbR7HpG40sWen6GTM0K5bQJ3uazP0Nsbc0eJMn0px/kddVN FOhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=samsung.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z33-v6si420213plb.663.2018.02.07.13.22.44; Wed, 07 Feb 2018 13:22:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=samsung.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932230AbeBGVU6 (ORCPT + 99 others); Wed, 7 Feb 2018 16:20:58 -0500 Received: from osg.samsung.com ([64.30.133.232]:57051 "EHLO osg.samsung.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755087AbeBGVU4 (ORCPT ); Wed, 7 Feb 2018 16:20:56 -0500 Received: from localhost (localhost [127.0.0.1]) by osg.samsung.com (Postfix) with ESMTP id 4D6121B274; Wed, 7 Feb 2018 13:20:56 -0800 (PST) X-Virus-Scanned: Debian amavisd-new at dev.s-opensource.com Received: from osg.samsung.com ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WSyKu6YyCBRK; Wed, 7 Feb 2018 13:20:55 -0800 (PST) Received: from localhost.localdomain (c-24-9-64-241.hsd1.co.comcast.net [24.9.64.241]) by osg.samsung.com (Postfix) with ESMTPSA id A8F2C1B260; Wed, 7 Feb 2018 13:20:54 -0800 (PST) From: Shuah Khan To: valentina.manea.m@gmail.com, shuah@kernel.org, gregkh@linuxfoundation.org Cc: Shuah Khan , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: [PATCH 3.18 0/9] Backports for security and critical bug fixes Date: Wed, 7 Feb 2018 14:20:23 -0700 Message-Id: X-Mailer: git-send-email 2.14.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As I started backporting security fixes, found a few problems that prevent tools to build on newer gcc releases, deadlock bug, and another bug that prevents client from being able to use imported devices. This patch series consists of security fixes and fixes to critical bugs. Andrew Goodbody (1): usb: usbip: Fix possible deadlocks reported by lockdep Shuah Khan (8): usbip: fix stub_rx: get_pipe() to validate endpoint number usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input usbip: prevent vhci_hcd driver from leaking a socket pointer address usbip: Fix potential format overflow in userspace tools usbip: vhci_hcd: clear just the USB_PORT_STAT_POWER bit usbip: prevent leaking socket pointer address in messages usbip: stub: stop printing kernel pointer addresses in messages usbip: vhci: stop printing kernel pointer addresses in messages drivers/usb/usbip/stub_dev.c | 3 +- drivers/usb/usbip/stub_main.c | 5 +- drivers/usb/usbip/stub_rx.c | 53 +++++++++++---- drivers/usb/usbip/stub_tx.c | 4 +- drivers/usb/usbip/usbip_common.c | 15 ++--- drivers/usb/usbip/usbip_common.h | 1 + drivers/usb/usbip/usbip_event.c | 5 +- drivers/usb/usbip/vhci_hcd.c | 102 +++++++++++++++-------------- drivers/usb/usbip/vhci_rx.c | 53 ++++++++------- drivers/usb/usbip/vhci_sysfs.c | 45 +++++++------ drivers/usb/usbip/vhci_tx.c | 17 +++-- tools/usb/usbip/libsrc/usbip_common.c | 9 ++- tools/usb/usbip/libsrc/usbip_host_driver.c | 27 ++++++-- tools/usb/usbip/libsrc/vhci_driver.c | 8 +-- 14 files changed, 205 insertions(+), 142 deletions(-) -- 2.14.1