Commit 44b73962 authored by Sherry Yang's avatar Sherry Yang Committed by Greg Kroah-Hartman

android: binder: no outgoing transaction when thread todo has transaction

When a process dies, failed reply is sent to the sender of any transaction
queued on a dead thread's todo list. The sender asserts that the
received failed reply corresponds to the head of the transaction stack.
This assert can fail if the dead thread is allowed to send outgoing
transactions when there is already a transaction on its todo list,
because this new transaction can end up on the transaction stack of the
original sender. The following steps illustrate how this assertion can
fail.

1. Thread1 sends txn19 to Thread2
   (T1->transaction_stack=txn19, T2->todo+=txn19)
2. Without processing todo list, Thread2 sends txn20 to Thread1
   (T1->todo+=txn20, T2->transaction_stack=txn20)
3. T1 processes txn20 on its todo list
   (T1->transaction_stack=txn20->txn19, T1->todo=<empty>)
4. T2 dies, T2->todo cleanup attempts to send failed reply for txn19, but
   T1->transaction_stack points to txn20 -- assertion failes

Step 2. is the incorrect behavior. When there is a transaction on a
thread's todo list, this thread should not be able to send any outgoing
synchronous transactions. Only the head of the todo list needs to be
checked because only threads that are waiting for proc work can directly
receive work from another thread, and no work is allowed to be queued
on such a thread without waking up the thread. This patch also enforces
that a thread is not waiting for proc work when a work is directly
enqueued to its todo list.
Acked-by: default avatarArve Hjønnevåg <arve@android.com>
Signed-off-by: default avatarSherry Yang <sherryy@android.com>
Reviewed-by: default avatarMartijn Coenen <maco@android.com>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent 79c6f4b8
...@@ -822,6 +822,7 @@ static void ...@@ -822,6 +822,7 @@ static void
binder_enqueue_deferred_thread_work_ilocked(struct binder_thread *thread, binder_enqueue_deferred_thread_work_ilocked(struct binder_thread *thread,
struct binder_work *work) struct binder_work *work)
{ {
WARN_ON(!list_empty(&thread->waiting_thread_node));
binder_enqueue_work_ilocked(work, &thread->todo); binder_enqueue_work_ilocked(work, &thread->todo);
} }
...@@ -839,6 +840,7 @@ static void ...@@ -839,6 +840,7 @@ static void
binder_enqueue_thread_work_ilocked(struct binder_thread *thread, binder_enqueue_thread_work_ilocked(struct binder_thread *thread,
struct binder_work *work) struct binder_work *work)
{ {
WARN_ON(!list_empty(&thread->waiting_thread_node));
binder_enqueue_work_ilocked(work, &thread->todo); binder_enqueue_work_ilocked(work, &thread->todo);
thread->process_todo = true; thread->process_todo = true;
} }
...@@ -1270,19 +1272,12 @@ static int binder_inc_node_nilocked(struct binder_node *node, int strong, ...@@ -1270,19 +1272,12 @@ static int binder_inc_node_nilocked(struct binder_node *node, int strong,
} else } else
node->local_strong_refs++; node->local_strong_refs++;
if (!node->has_strong_ref && target_list) { if (!node->has_strong_ref && target_list) {
struct binder_thread *thread = container_of(target_list,
struct binder_thread, todo);
binder_dequeue_work_ilocked(&node->work); binder_dequeue_work_ilocked(&node->work);
/* BUG_ON(&thread->todo != target_list);
* Note: this function is the only place where we queue binder_enqueue_deferred_thread_work_ilocked(thread,
* directly to a thread->todo without using the &node->work);
* corresponding binder_enqueue_thread_work() helper
* functions; in this case it's ok to not set the
* process_todo flag, since we know this node work will
* always be followed by other work that starts queue
* processing: in case of synchronous transactions, a
* BR_REPLY or BR_ERROR; in case of oneway
* transactions, a BR_TRANSACTION_COMPLETE.
*/
binder_enqueue_work_ilocked(&node->work, target_list);
} }
} else { } else {
if (!internal) if (!internal)
...@@ -2723,6 +2718,7 @@ static void binder_transaction(struct binder_proc *proc, ...@@ -2723,6 +2718,7 @@ static void binder_transaction(struct binder_proc *proc,
{ {
int ret; int ret;
struct binder_transaction *t; struct binder_transaction *t;
struct binder_work *w;
struct binder_work *tcomplete; struct binder_work *tcomplete;
binder_size_t *offp, *off_end, *off_start; binder_size_t *offp, *off_end, *off_start;
binder_size_t off_min; binder_size_t off_min;
...@@ -2864,6 +2860,29 @@ static void binder_transaction(struct binder_proc *proc, ...@@ -2864,6 +2860,29 @@ static void binder_transaction(struct binder_proc *proc,
goto err_invalid_target_handle; goto err_invalid_target_handle;
} }
binder_inner_proc_lock(proc); binder_inner_proc_lock(proc);
w = list_first_entry_or_null(&thread->todo,
struct binder_work, entry);
if (!(tr->flags & TF_ONE_WAY) && w &&
w->type == BINDER_WORK_TRANSACTION) {
/*
* Do not allow new outgoing transaction from a
* thread that has a transaction at the head of
* its todo list. Only need to check the head
* because binder_select_thread_ilocked picks a
* thread from proc->waiting_threads to enqueue
* the transaction, and nothing is queued to the
* todo list while the thread is on waiting_threads.
*/
binder_user_error("%d:%d new transaction not allowed when there is a transaction on thread todo\n",
proc->pid, thread->pid);
binder_inner_proc_unlock(proc);
return_error = BR_FAILED_REPLY;
return_error_param = -EPROTO;
return_error_line = __LINE__;
goto err_bad_todo_list;
}
if (!(tr->flags & TF_ONE_WAY) && thread->transaction_stack) { if (!(tr->flags & TF_ONE_WAY) && thread->transaction_stack) {
struct binder_transaction *tmp; struct binder_transaction *tmp;
...@@ -3247,6 +3266,7 @@ static void binder_transaction(struct binder_proc *proc, ...@@ -3247,6 +3266,7 @@ static void binder_transaction(struct binder_proc *proc,
kfree(t); kfree(t);
binder_stats_deleted(BINDER_STAT_TRANSACTION); binder_stats_deleted(BINDER_STAT_TRANSACTION);
err_alloc_t_failed: err_alloc_t_failed:
err_bad_todo_list:
err_bad_call_stack: err_bad_call_stack:
err_empty_call_stack: err_empty_call_stack:
err_dead_binder: err_dead_binder:
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment