Skip to content

Commit f3277cb

Browse files
toddkjosgregkh
authored andcommitted
binder: fix UAF when releasing todo list
When releasing a thread todo list when tearing down a binder_proc, the following race was possible which could result in a use-after-free: 1. Thread 1: enter binder_release_work from binder_thread_release 2. Thread 2: binder_update_ref_for_handle() -> binder_dec_node_ilocked() 3. Thread 2: dec nodeA --> 0 (will free node) 4. Thread 1: ACQ inner_proc_lock 5. Thread 2: block on inner_proc_lock 6. Thread 1: dequeue work (BINDER_WORK_NODE, part of nodeA) 7. Thread 1: REL inner_proc_lock 8. Thread 2: ACQ inner_proc_lock 9. Thread 2: todo list cleanup, but work was already dequeued 10. Thread 2: free node 11. Thread 2: REL inner_proc_lock 12. Thread 1: deref w->type (UAF) The problem was that for a BINDER_WORK_NODE, the binder_work element must not be accessed after releasing the inner_proc_lock while processing the todo list elements since another thread might be handling a deref on the node containing the binder_work element leading to the node being freed. Signed-off-by: Todd Kjos <[email protected]> Link: https://lore.kernel.org/r/[email protected] Cc: <[email protected]> # 4.14, 4.19, 5.4, 5.8 Signed-off-by: Greg Kroah-Hartman <[email protected]>
1 parent 78eef5d commit f3277cb

File tree

1 file changed

+10
-25
lines changed

1 file changed

+10
-25
lines changed

drivers/android/binder.c

Lines changed: 10 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -223,7 +223,7 @@ static struct binder_transaction_log_entry *binder_transaction_log_add(
223223
struct binder_work {
224224
struct list_head entry;
225225

226-
enum {
226+
enum binder_work_type {
227227
BINDER_WORK_TRANSACTION = 1,
228228
BINDER_WORK_TRANSACTION_COMPLETE,
229229
BINDER_WORK_RETURN_ERROR,
@@ -885,27 +885,6 @@ static struct binder_work *binder_dequeue_work_head_ilocked(
885885
return w;
886886
}
887887

888-
/**
889-
* binder_dequeue_work_head() - Dequeues the item at head of list
890-
* @proc: binder_proc associated with list
891-
* @list: list to dequeue head
892-
*
893-
* Removes the head of the list if there are items on the list
894-
*
895-
* Return: pointer dequeued binder_work, NULL if list was empty
896-
*/
897-
static struct binder_work *binder_dequeue_work_head(
898-
struct binder_proc *proc,
899-
struct list_head *list)
900-
{
901-
struct binder_work *w;
902-
903-
binder_inner_proc_lock(proc);
904-
w = binder_dequeue_work_head_ilocked(list);
905-
binder_inner_proc_unlock(proc);
906-
return w;
907-
}
908-
909888
static void
910889
binder_defer_work(struct binder_proc *proc, enum binder_deferred_state defer);
911890
static void binder_free_thread(struct binder_thread *thread);
@@ -4585,13 +4564,17 @@ static void binder_release_work(struct binder_proc *proc,
45854564
struct list_head *list)
45864565
{
45874566
struct binder_work *w;
4567+
enum binder_work_type wtype;
45884568

45894569
while (1) {
4590-
w = binder_dequeue_work_head(proc, list);
4570+
binder_inner_proc_lock(proc);
4571+
w = binder_dequeue_work_head_ilocked(list);
4572+
wtype = w ? w->type : 0;
4573+
binder_inner_proc_unlock(proc);
45914574
if (!w)
45924575
return;
45934576

4594-
switch (w->type) {
4577+
switch (wtype) {
45954578
case BINDER_WORK_TRANSACTION: {
45964579
struct binder_transaction *t;
45974580

@@ -4625,9 +4608,11 @@ static void binder_release_work(struct binder_proc *proc,
46254608
kfree(death);
46264609
binder_stats_deleted(BINDER_STAT_DEATH);
46274610
} break;
4611+
case BINDER_WORK_NODE:
4612+
break;
46284613
default:
46294614
pr_err("unexpected work type, %d, not freed\n",
4630-
w->type);
4615+
wtype);
46314616
break;
46324617
}
46334618
}

0 commit comments

Comments
 (0)