summaryrefslogtreecommitdiff
path: root/drivers/uwb
diff options
context:
space:
mode:
authorValentine Barshak <vbarshak@mvista.com>2010-12-06 17:51:41 +0300
committerJiri Kosina <jkosina@suse.cz>2010-12-07 15:45:49 +0100
commit1a8e8fab790ea7af81b8f964fdec706ad1ec2271 (patch)
tree21dcfd0e58d2d4369481b8d7dfa2d13e0263c40a /drivers/uwb
parentce06b9d6d33fd2ed799b6e825d68fe95077da354 (diff)
downloadlinux-3.10-1a8e8fab790ea7af81b8f964fdec706ad1ec2271.tar.gz
linux-3.10-1a8e8fab790ea7af81b8f964fdec706ad1ec2271.tar.bz2
linux-3.10-1a8e8fab790ea7af81b8f964fdec706ad1ec2271.zip
HID: Fix race between disconnect and hiddev_ioctl
A USB HID device can be disconnected at any time. If this happens right before or while hiddev_ioctl is in progress, the hiddev_ioctl tries to access invalid hiddev->hid pointer. When the hid device is disconnected, the hiddev_disconnect() ends up with a call to hid_device_release() which frees hid_device, but doesn't set the hiddev->hid pointer to NULL. If the deallocated memory region has been re-used by the kernel, this can cause a crash or memory corruption. Since disconnect can happen at any time, we can't initialize struct hid_device *hid = hiddev->hid at the beginning of ioctl and then use it. This change checks hiddev->exist flag while holding the existancelock and uses hid_device only if it exists. Signed-off-by: Valentine Barshak <vbarshak@mvista.com> Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Diffstat (limited to 'drivers/uwb')
0 files changed, 0 insertions, 0 deletions