Received: by 2002:a05:7412:da14:b0:e2:908c:2ebd with SMTP id fe20csp1182371rdb; Sat, 7 Oct 2023 16:38:20 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEC64JyPUH9Z3jZ4ECgBD+bYj77p1Z3/GPj2Zrdtknymv+mAqVZgXPiJjNOtjn+RJXHhUrM X-Received: by 2002:a9d:6f15:0:b0:6b7:518a:1672 with SMTP id n21-20020a9d6f15000000b006b7518a1672mr12923892otq.34.1696721900449; Sat, 07 Oct 2023 16:38:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696721900; cv=none; d=google.com; s=arc-20160816; b=NiDaNFnuG8c32cICZUFsKGScfQloJjoi0s5DTE7YDwVsKdl6Zddcd+Q1ewAKlzSfj0 htCKzJPYAHOMIrwtwMFaZCDPl23jz0mBVleUl5XOX/xgYs6nAC29umh2iUVNPhFh0E8/ wi9xZakq0IMCwQBxlMd3PbTXc4ka6bAvhKZuY0S1AbfuU+AUIRYznJLTG9cpMzpAM2Bf 3/P5eZWaoykmjtVX9FFi0jE05/EbFGEh0ofIwiAoCncS8xxv3gGL1pde3opsy3yRWNko 92M4a0k2WWlX+lwAdufAvhaWVJEvI8n6dHzDYAkI3Ief61InHlmGO8F0psHlqz5wNhJd R+qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=RdaS1Ku58oT7hBQj2wy7aqzyQXwY2IDqg0TDApGz+Gg=; fh=l6vKG1SzMWLPrznXQCGuCBQA+utI+d1olUCjmCYOSoQ=; b=i5ytyArQ1tZCp9soLUQiqq57XOVUgKZiXVeQAx97vZ2WmVrxUjdqBgyM2cBQiE9Ubx UqnJOeM55AI3Sx4QpfviRL/oYg8X9EiBbAEeQasKHsAujbymNmRH5No7hNLCJwN5VPNC Cts2+WjbBB8qMjm3X0LbMKqcRfm1yL35ptq/IX9CePVNKzZlyGoltvIlngLMpj+b9Jg7 uBw9DacSd9FCDHk2RUTpi7ZBFKG+FsKtRT353id7MTesoOzzLQ4XonpgMYFQAsyNhunV c/sxoOGkExs81/5AyDMLNMpXjXuhHP8N+nl5plDiCJNWHYH10zDi5w81P0UoygnGHX2C QjGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=zTI8c8IR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id k187-20020a6324c4000000b00578b21f1890si6764296pgk.294.2023.10.07.16.38.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 07 Oct 2023 16:38:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=zTI8c8IR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 2498680BEF16; Sat, 7 Oct 2023 16:38:18 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344223AbjJGXQL (ORCPT + 99 others); Sat, 7 Oct 2023 19:16:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46820 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344151AbjJGXQK (ORCPT ); Sat, 7 Oct 2023 19:16:10 -0400 Received: from mail-pl1-x62f.google.com (mail-pl1-x62f.google.com [IPv6:2607:f8b0:4864:20::62f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9629ABA for ; Sat, 7 Oct 2023 16:16:09 -0700 (PDT) Received: by mail-pl1-x62f.google.com with SMTP id d9443c01a7336-1c871a095ceso25937415ad.2 for ; Sat, 07 Oct 2023 16:16:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1696720569; x=1697325369; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=RdaS1Ku58oT7hBQj2wy7aqzyQXwY2IDqg0TDApGz+Gg=; b=zTI8c8IRmRVx+/73jqPeEMghfGRc06gbhwZ9hmasRtRAE+6VHvIdawULJvClhLYQnj dL1hlhIr3A/UsdjNf0OV6J1eiWAT3BKmdMYJ878HZe6xqwy32qjDn6TBtBvDz4mDCE3P 8Pcl4R72q+Nri7XwQXNAP2qxuI4Kbg3UOtXtPHpWmiTio+P1x16m8Nr2r+P/UqBNvd/f +TeRxnTXlXwzgV+uuGJPtiD7LbH05zuTXMXwMPvy4bhLNr4qUb3sUForHwNuy2EcLlWA mOezcDpVEQPqyiKfjgLDyQf9IYrJWsUe+oJaBLIH2VeWgoG9Ty0uD+D0y408L3RRzhYq Ej8g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696720569; x=1697325369; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=RdaS1Ku58oT7hBQj2wy7aqzyQXwY2IDqg0TDApGz+Gg=; b=gmk8u7rf9g6NhwjONKgbEvg53j57CMHM96zlrTVBf+igPr2/n/5OJgHg3SLPRrLh0l d+S3CM/9ucwBcTmGNahWPPCWeQ6HykcQdMp3xROaGjen+/4UQeKrPKPTcZatPnzhk7N9 UxlibgJYwACxzDQBNXCTpIf0CFulsMVf/OmlGPwxFeLIxcyIo9tStQljzYyBRoLxk+IN U8vlLE9lqGrc8AYqPt8aQhabZ+Ho7jtytO4rTQGnicjehYc8H/h0IWc9VpPuPKFVZ71b MNSPh1PQo/D2J4oiSQsnnK1N8m4rrDOW68wr3sC0NurrLoXTcOllSrGZuZWH6DtgFQyC AqcA== X-Gm-Message-State: AOJu0YywcEsd+5K4b8QqJBJLIn+av6i15GNbg0qqZ9VnJNhpWgNKBSp0 KiUdOe3D0eEzdTdeApyY5qbl2w== X-Received: by 2002:a05:6a20:7d89:b0:137:23f1:4281 with SMTP id v9-20020a056a207d8900b0013723f14281mr14668305pzj.12.1696720568877; Sat, 07 Oct 2023 16:16:08 -0700 (PDT) Received: from google.com (55.212.185.35.bc.googleusercontent.com. [35.185.212.55]) by smtp.gmail.com with ESMTPSA id f8-20020a170902ce8800b001c76fcccee8sm6401853plg.156.2023.10.07.16.16.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 07 Oct 2023 16:16:08 -0700 (PDT) Date: Sat, 7 Oct 2023 23:16:04 +0000 From: Carlos Llamas To: Kassey Li Cc: gregkh@google.com, gregkh@linuxfoundation.org, surenb@google.com, arve@android.com, joel@joelfernandes.org, brauner@kernel.org, tkjos@android.com, maco@android.com, linux-kernel@vger.kernel.org, Sherry Yang Subject: Re: [PATCH v3] binder: add mutex_lock for mmap and NULL when free Message-ID: References: <20231007122813.84282-1-quic_yingangl@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231007122813.84282-1-quic_yingangl@quicinc.com> X-Spam-Status: No, score=-4.8 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Sat, 07 Oct 2023 16:38:18 -0700 (PDT) On Sat, Oct 07, 2023 at 08:28:13PM +0800, Kassey Li wrote: > - Enforce alloc->mutex in binder_alloc_mmap_handler when add the entry to > list. > > - Assign the freed pages/page_ptr to NULL to catch possible use after free > with NULL pointer access. > > Fixes: 19c987241ca1 ("binder: separate out binder_alloc functions") > Fixes: f2517eb76f1f ("android: binder: Add global lru shrinker to binder") > CC: Todd Kjos > CC: Sherry Yang > Link: https://lore.kernel.org/all/20231007034046.2352124-1-quic_yingangl@quicinc.com/ > Signed-off-by: Kassey Li > --- > V1 -> V2: Add Fixes info. > V2 -> V3: Add this history. > --- > drivers/android/binder_alloc.c | 5 ++++- > 1 file changed, 4 insertions(+), 1 deletion(-) > > diff --git a/drivers/android/binder_alloc.c b/drivers/android/binder_alloc.c > index e3db8297095a..c7d126e04343 100644 > --- a/drivers/android/binder_alloc.c > +++ b/drivers/android/binder_alloc.c > @@ -775,6 +775,7 @@ int binder_alloc_mmap_handler(struct binder_alloc *alloc, > } > > buffer->user_data = alloc->buffer; > + mutex_lock(&alloc->mutex); At this stage we are already holding the mm->mmap_lock. If you take the alloc->mutex here you will deadlock. You should see this warning with lockdep enabled. Also, you don't need the lock here... > list_add(&buffer->entry, &alloc->buffers); > buffer->free = 1; > binder_insert_free_buffer(alloc, buffer); > @@ -782,7 +783,7 @@ int binder_alloc_mmap_handler(struct binder_alloc *alloc, > > /* Signal binder_alloc is fully initialized */ > binder_alloc_set_vma(alloc, vma); This barrier will set the alloc->vma pointer. Once set, it signals that the alloc-> space has been initialized and it is safe to access. > - > + mutex_unlock(&alloc->mutex); > return 0; > > err_alloc_buf_struct_failed: > @@ -856,9 +857,11 @@ void binder_alloc_deferred_release(struct binder_alloc *alloc) > __func__, alloc->pid, i, page_addr, > on_lru ? "on lru" : "active"); > __free_page(alloc->pages[i].page_ptr); > + alloc->pages[i].page_ptr = NULL; > page_count++; > } > kfree(alloc->pages); > + alloc->pages = NULL; The process is dying and there aren't any more references to it. It is pointless to mark the pages NULL. No one is or will use them after. > } > mutex_unlock(&alloc->mutex); > if (alloc->mm) > -- > 2.25.1 > I see that you reported a crash on the previous thread here: https://lore.kernel.org/all/26988068-8c9f-8591-db6e-44c8105af638@quicinc.com/ ...unfortunately, it doesn't seem to me like setting alloc->pages = NULL would help fix your issue. I do agree this sounds like a use-after-free though. Are you able to reproduce the issue with KASAN enabled? This should tell us where the actual problem is. -- Carlos Llamas