Received: by 10.223.185.116 with SMTP id b49csp2393520wrg; Thu, 15 Feb 2018 10:56:38 -0800 (PST) X-Google-Smtp-Source: AH8x224u7T9AAbj7mn6PesvrGnRiXOb6Kf/lVJDZKjD97nvSlXMxHnJlaWgsdgjmv9n06i8dYaZ2 X-Received: by 10.99.129.66 with SMTP id t63mr2908869pgd.376.1518720997926; Thu, 15 Feb 2018 10:56:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518720997; cv=none; d=google.com; s=arc-20160816; b=ylUXeIHjmTUTMWHq0/geFY1JbUEbAawINHtkk43KzfHYL9Be7ryPtYSeLxmUT1vTIE i/Iz4lXTjAWu3bgmtrkQzXyZPHzIIA08ABhYJEsXmjdC7kSZp06AuM7uRDje+7xrPq11 GblnmfSjmKD2eQqJWTWzF7/L2Wygk4YgHu2CQZjk3T0m5VGiXomhlpRqADzgDyjbQ+to mdq1Es82jxnccLXSSGGN0w8LXVZKjj/VmyoAbV+MAGZZL6lKX5dDmFPPImccBV0qmB0B Xt4yqde+4PHClary9CN1DjozZFyvkTz5ZtG8RG+IXFdgfN5ZSFAYLJ5txxhzLW6TohLo E55A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=lfAV6lBuj7e/vusqT6KnFq+gflGO9h8tKGFhIngZZ2U=; b=bkUgPp29paLfSjF/mA9tX2sUJTVcj8CPgwGuZNoD06Bk3VZ0hjv70YVPv3qYT9bxYM ZX3p5AJpaS11Y/9H/kwAT7nMEz6uBKMur9LxLZBNLpvE5b1EyhkjsoUNql0UCvGcYEP5 K76tg4x9Jn3uj2DWEPtDnbLp4e8mspoYP4S7IvbwNAjb+N+52pfQBsMrGAxxzbG+DAJM PxuPaHsyJiIKBTQmHanE9St2aRlTxmVhJICAB8epQxxf2ZSlO/pj1EV/307WXhCHcyIq NAh/NfY58s7xT+QyV9hz/Kyoz5uTmzZCF4+BzlIwRBAdtJU/XMbZfSPx/zwtgGocFwgV qJTA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y7-v6si1422556plk.707.2018.02.15.10.56.23; Thu, 15 Feb 2018 10:56:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1167018AbeBOSzI (ORCPT + 99 others); Thu, 15 Feb 2018 13:55:08 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:48398 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161816AbeBOPUi (ORCPT ); Thu, 15 Feb 2018 10:20:38 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 3A39810FF; Thu, 15 Feb 2018 15:20:38 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Shuah Khan Subject: [PATCH 3.18 21/45] usbip: prevent leaking socket pointer address in messages Date: Thu, 15 Feb 2018 16:17:12 +0100 Message-Id: <20180215144120.421046542@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180215144115.863307741@linuxfoundation.org> References: <20180215144115.863307741@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Shuah Khan commit 90120d15f4c397272aaf41077960a157fc4212bf upstream. usbip driver is leaking socket pointer address in messages. Remove the messages that aren't useful and print sockfd in the ones that are useful for debugging. Signed-off-by: Shuah Khan Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/stub_dev.c | 3 +-- drivers/usb/usbip/usbip_common.c | 15 ++++----------- drivers/usb/usbip/vhci_hcd.c | 2 +- 3 files changed, 6 insertions(+), 14 deletions(-) --- a/drivers/usb/usbip/stub_dev.c +++ b/drivers/usb/usbip/stub_dev.c @@ -163,8 +163,7 @@ static void stub_shutdown_connection(str * step 1? */ if (ud->tcp_socket) { - dev_dbg(&sdev->udev->dev, "shutdown tcp_socket %p\n", - ud->tcp_socket); + dev_dbg(&sdev->udev->dev, "shutdown sockfd %d\n", ud->sockfd); kernel_sock_shutdown(ud->tcp_socket, SHUT_RDWR); } --- a/drivers/usb/usbip/usbip_common.c +++ b/drivers/usb/usbip/usbip_common.c @@ -317,18 +317,14 @@ int usbip_recv(struct socket *sock, void struct msghdr msg; struct kvec iov; int total = 0; - /* for blocks of if (usbip_dbg_flag_xmit) */ char *bp = buf; int osize = size; - usbip_dbg_xmit("enter\n"); - - if (!sock || !buf || !size) { - pr_err("invalid arg, sock %p buff %p size %d\n", sock, buf, - size); + if (!sock || !buf || !size) return -EINVAL; - } + + usbip_dbg_xmit("enter\n"); do { sock->sk->sk_allocation = GFP_NOIO; @@ -341,11 +337,8 @@ int usbip_recv(struct socket *sock, void msg.msg_flags = MSG_NOSIGNAL; result = kernel_recvmsg(sock, &msg, &iov, 1, size, MSG_WAITALL); - if (result <= 0) { - pr_debug("receive sock %p buf %p size %u ret %d total %d\n", - sock, buf, size, result, total); + if (result <= 0) goto err; - } size -= result; buf += result; --- a/drivers/usb/usbip/vhci_hcd.c +++ b/drivers/usb/usbip/vhci_hcd.c @@ -782,7 +782,7 @@ static void vhci_shutdown_connection(str /* need this? see stub_dev.c */ if (ud->tcp_socket) { - pr_debug("shutdown tcp_socket %p\n", ud->tcp_socket); + pr_debug("shutdown sockfd %d\n", ud->sockfd); kernel_sock_shutdown(ud->tcp_socket, SHUT_RDWR); }