From: Riley Andrews Date: Thu, 28 May 2015 19:10:05 +0000 (-0700) Subject: android: drivers: workaround debugfs race in binder X-Git-Tag: firefly_0821_release~4090^2 X-Git-Url: http://demsky.eecs.uci.edu/git/?a=commitdiff_plain;h=67680c141957991b9350269a8eaf30baf1c85427;p=firefly-linux-kernel-4.4.55.git android: drivers: workaround debugfs race in binder If a /d/binder/proc/[pid] entry is kept open after linux has torn down the associated process, binder_proc_show can deference an invalid binder_proc that has been stashed in the debugfs inode. Validate that the binder_proc ptr passed into binder_proc_show has not been freed by looking for it within the global process list whilst the global lock is held. If the ptr is not valid, print nothing. Bug 19587483 Change-Id: Ice878c171db51ef9a4879c2f9299a2deb873d255 Signed-off-by: Riley Andrews --- diff --git a/drivers/android/binder.c b/drivers/android/binder.c index c048624fc6b7..383aa21a0e2a 100644 --- a/drivers/android/binder.c +++ b/drivers/android/binder.c @@ -3598,13 +3598,24 @@ static int binder_transactions_show(struct seq_file *m, void *unused) static int binder_proc_show(struct seq_file *m, void *unused) { + struct binder_proc *itr; struct binder_proc *proc = m->private; int do_lock = !binder_debug_no_lock; + bool valid_proc = false; if (do_lock) binder_lock(__func__); - seq_puts(m, "binder proc state:\n"); - print_binder_proc(m, proc, 1); + + hlist_for_each_entry(itr, &binder_procs, proc_node) { + if (itr == proc) { + valid_proc = true; + break; + } + } + if (valid_proc) { + seq_puts(m, "binder proc state:\n"); + print_binder_proc(m, proc, 1); + } if (do_lock) binder_unlock(__func__); return 0;