Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit f2b44c5c authored by Srinivasarao P's avatar Srinivasarao P
Browse files

staging: android: ion: fix ION_IOC_IMPORT use-after-free



The use-after-free issue can also occur with ION_IOC_IMPORT
just like in the commit 2c155709
("staging: android: ion: fix ION_IOC_{MAP,SHARE} use-after-free").
This is due to reacquiring client->lock in pass_to_user().

Change-Id: Ib5f3297504763c341b3ce343ef18538ce2c9c7d5
Signed-off-by: default avatarSrinivasarao P <spathi@codeaurora.org>
parent f1587d86
Loading
Loading
Loading
Loading
+4 −4
Original line number Diff line number Diff line
@@ -453,16 +453,14 @@ static struct ion_handle *user_ion_handle_get_check_overflow(
/* passes a kref to the user ref count.
 * We know we're holding a kref to the object before and
 * after this call, so no need to reverify handle.
 * Caller must hold the client lock, except for ION_IOC_ALLOC.
 */
static struct ion_handle *pass_to_user(struct ion_handle *handle)
{
	struct ion_client *client = handle->client;
	struct ion_handle *ret;

	mutex_lock(&client->lock);
	ret = user_ion_handle_get_check_overflow(handle);
	ion_handle_put_nolock(handle);
	mutex_unlock(&client->lock);
	return ret;
}

@@ -1700,7 +1698,8 @@ static long ion_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
	{
		struct ion_handle *handle;

		handle = ion_import_dma_buf(client, data.fd.fd);
		mutex_lock(&client->lock);
		handle = ion_import_dma_buf_nolock(client, data.fd.fd);
		if (IS_ERR(handle)) {
			ret = PTR_ERR(handle);
		} else {
@@ -1710,6 +1709,7 @@ static long ion_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
			else
				data.handle.handle = handle->id;
		}
		mutex_unlock(&client->lock);
		break;
	}
	case ION_IOC_SYNC: