[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170905172152.36227-1-tkjos@google.com>
Date: Tue, 5 Sep 2017 10:21:52 -0700
From: Todd Kjos <tkjos@...roid.com>
To: gregkh@...uxfoundation.org, arve@...roid.com,
devel@...verdev.osuosl.org, linux-kernel@...r.kernel.org,
maco@...gle.com, tkjos@...gle.com, xuyiping@...ilicon.com,
gengyanping@...ilicon.com, shiwanglai@...ilicon.com
Subject: [PATCH] binder: fix memory corruption in binder_transaction binder
From: Xu YiPing <xuyiping@...ilicon.com>
commit 7a4408c6bd3e ("binder: make sure accesses to proc/thread are
safe") made a change to enqueue tcomplete to thread->todo before
enqueuing the transaction. However, in err_dead_proc_or_thread case,
the tcomplete is directly freed, without dequeued. It may cause the
thread->todo list to be corrupted.
So, dequeue it before freeing.
Signed-off-by: Xu YiPing <xuyiping@...ilicon.com>
Signed-off-by: Todd Kjos <tkjos@...gle.com>
---
drivers/android/binder.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/android/binder.c b/drivers/android/binder.c
index d055b3f2a207..96cc28afa383 100644
--- a/drivers/android/binder.c
+++ b/drivers/android/binder.c
@@ -3083,6 +3083,7 @@ static void binder_transaction(struct binder_proc *proc,
err_dead_proc_or_thread:
return_error = BR_DEAD_REPLY;
return_error_line = __LINE__;
+ binder_dequeue_work(proc, tcomplete);
err_translate_failed:
err_bad_object_type:
err_bad_offset:
--
2.14.1.581.gf28d330327-goog
Powered by blists - more mailing lists