Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp4308862pxu; Tue, 1 Dec 2020 01:31:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJzanm0T7o/zqjKmirvrIOjuYfUp2Gq0cO9TybSYhJ39oFysXzhYg4o7XMPTfTq74bLZB7T7 X-Received: by 2002:a05:6402:1701:: with SMTP id y1mr2064039edu.209.1606815108921; Tue, 01 Dec 2020 01:31:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606815108; cv=none; d=google.com; s=arc-20160816; b=w1i2XaUYy2CRURvelgnYIieJW/gffInm7DEP+cqRTU0ZrF3K0qvEgc2rFWLUoP7ua6 7rv6QLi2x1Y6KHASp1E+pCyy4FBt3NHzRxZjkZYCTWZ/WObuY2xMDNXdOhso68QQ6oSk XSBLFsHsU3vqz0DdMyV5SaCh6AGbkR+FkBTqHLcQT8xJt6wUkGKDvkvVY1fm2Zj5Pnir kyxxnITMj39RC661XZAi6xkxRDy2dnYB5ObxlTcipqupx6auXRGuNaGcGyqqSk2kSCSC axEOa6g9mLkbSjBqKTLCTOvenYQhBSsSZ4ljr9/7xzrNJhbxsglLZGby69Pf9r1ZJ+eJ aK7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=C0yxe25nIp4QU3DnUlxLo8kNBGlCzboaeE3m8fhHISQ=; b=E6CxOb8bhuNYcQde5sOwaztTvXMdjaSHMATHi14YaWARDVA4syd4oshG3pitL/MQH6 p4qZoK5hu/lIeCCsOSG+vHrbTwhgyUxiEvKvxCVd6RydP9Tz59NqPXsUnU6z8CAv7rbO oti1PqIYDM/bVQjT4fK9Z3pjBKkbgfDSAQWmFBvPvRPVxGxNUS6FvRzZ/ufojCsvNzMp 2c0e04j79qpUrmUxqFHOTQm94L4aSVscwp4qZ2jc5JVYa4GnweCZy+KGx/I4zU7j62Nw qjRusgDTaIqGxBo69rVgx72/nXwjkIy+DNiaPdFx6K+HI9gUm4/Z/oYGXl/luwLjAo3G 4Qpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=iqUJW287; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p23si877701edw.81.2020.12.01.01.31.26; Tue, 01 Dec 2020 01:31:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=iqUJW287; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729307AbgLAJ1f (ORCPT + 99 others); Tue, 1 Dec 2020 04:27:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:39316 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729254AbgLAJC3 (ORCPT ); Tue, 1 Dec 2020 04:02:29 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3752520809; Tue, 1 Dec 2020 09:01:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1606813301; bh=7Ue//Zng0WP0KW0pSdTtBSWbvhT1XT/7/kSp4eyX0n8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=iqUJW287jqFODTNx0ozNk0Rd+MCHLIAqkvGULBx7BKnUgysFSa0nbwRkCTg/zfbqz OTy/ntzK6W3tdlRNYpTBrOFbiNWKGLaLuN1Lc6bzxFzMOSQZI6c2GPj+rrMTLrtyIc AOn98oFh60DhTJqI/mOkXuCe8Zp+rPKhrSAgRJJI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vamsi Krishna Samavedam , Alan Stern Subject: [PATCH 4.19 50/57] USB: core: Change %pK for __user pointers to %px Date: Tue, 1 Dec 2020 09:53:55 +0100 Message-Id: <20201201084651.570228911@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201201084647.751612010@linuxfoundation.org> References: <20201201084647.751612010@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alan Stern commit f3bc432aa8a7a2bfe9ebb432502be5c5d979d7fe upstream. Commit 2f964780c03b ("USB: core: replace %p with %pK") used the %pK format specifier for a bunch of __user pointers. But as the 'K' in the specifier indicates, it is meant for kernel pointers. The reason for the %pK specifier is to avoid leaks of kernel addresses, but when the pointer is to an address in userspace the security implications are minimal. In particular, no kernel information is leaked. This patch changes the __user %pK specifiers (used in a bunch of debugging output lines) to %px, which will always print the actual address with no mangling. (Notably, there is no printk format specifier particularly intended for __user pointers.) Fixes: 2f964780c03b ("USB: core: replace %p with %pK") CC: Vamsi Krishna Samavedam CC: Signed-off-by: Alan Stern Link: https://lore.kernel.org/r/20201119170228.GB576844@rowland.harvard.edu Signed-off-by: Greg Kroah-Hartman --- drivers/usb/core/devio.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) --- a/drivers/usb/core/devio.c +++ b/drivers/usb/core/devio.c @@ -463,11 +463,11 @@ static void snoop_urb(struct usb_device if (userurb) { /* Async */ if (when == SUBMIT) - dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, " + dev_info(&udev->dev, "userurb %px, ep%d %s-%s, " "length %u\n", userurb, ep, t, d, length); else - dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, " + dev_info(&udev->dev, "userurb %px, ep%d %s-%s, " "actual_length %u status %d\n", userurb, ep, t, d, length, timeout_or_status); @@ -1927,7 +1927,7 @@ static int proc_reapurb(struct usb_dev_s if (as) { int retval; - snoop(&ps->dev->dev, "reap %pK\n", as->userurb); + snoop(&ps->dev->dev, "reap %px\n", as->userurb); retval = processcompl(as, (void __user * __user *)arg); free_async(as); return retval; @@ -1944,7 +1944,7 @@ static int proc_reapurbnonblock(struct u as = async_getcompleted(ps); if (as) { - snoop(&ps->dev->dev, "reap %pK\n", as->userurb); + snoop(&ps->dev->dev, "reap %px\n", as->userurb); retval = processcompl(as, (void __user * __user *)arg); free_async(as); } else { @@ -2070,7 +2070,7 @@ static int proc_reapurb_compat(struct us if (as) { int retval; - snoop(&ps->dev->dev, "reap %pK\n", as->userurb); + snoop(&ps->dev->dev, "reap %px\n", as->userurb); retval = processcompl_compat(as, (void __user * __user *)arg); free_async(as); return retval; @@ -2087,7 +2087,7 @@ static int proc_reapurbnonblock_compat(s as = async_getcompleted(ps); if (as) { - snoop(&ps->dev->dev, "reap %pK\n", as->userurb); + snoop(&ps->dev->dev, "reap %px\n", as->userurb); retval = processcompl_compat(as, (void __user * __user *)arg); free_async(as); } else { @@ -2512,7 +2512,7 @@ static long usbdev_do_ioctl(struct file #endif case USBDEVFS_DISCARDURB: - snoop(&dev->dev, "%s: DISCARDURB %pK\n", __func__, p); + snoop(&dev->dev, "%s: DISCARDURB %px\n", __func__, p); ret = proc_unlinkurb(ps, p); break;