This is a note to let you know that I've just added the patch titled binder: fix race between mmput() and do_exit() to the 5.10-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: binder-fix-race-between-mmput-and-do_exit.patch and it can be found in the queue-5.10 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From 9a9ab0d963621d9d12199df9817e66982582d5a5 Mon Sep 17 00:00:00 2001 From: Carlos Llamas <cmllamas@xxxxxxxxxx> Date: Fri, 1 Dec 2023 17:21:32 +0000 Subject: binder: fix race between mmput() and do_exit() From: Carlos Llamas <cmllamas@xxxxxxxxxx> commit 9a9ab0d963621d9d12199df9817e66982582d5a5 upstream. Task A calls binder_update_page_range() to allocate and insert pages on a remote address space from Task B. For this, Task A pins the remote mm via mmget_not_zero() first. This can race with Task B do_exit() and the final mmput() refcount decrement will come from Task A. Task A | Task B ------------------+------------------ mmget_not_zero() | | do_exit() | exit_mm() | mmput() mmput() | exit_mmap() | remove_vma() | fput() | In this case, the work of ____fput() from Task B is queued up in Task A as TWA_RESUME. So in theory, Task A returns to userspace and the cleanup work gets executed. However, Task A instead sleep, waiting for a reply from Task B that never comes (it's dead). This means the binder_deferred_release() is blocked until an unrelated binder event forces Task A to go back to userspace. All the associated death notifications will also be delayed until then. In order to fix this use mmput_async() that will schedule the work in the corresponding mm->async_put_work WQ instead of Task A. Fixes: 457b9a6f09f0 ("Staging: android: add binder driver") Reviewed-by: Alice Ryhl <aliceryhl@xxxxxxxxxx> Signed-off-by: Carlos Llamas <cmllamas@xxxxxxxxxx> Link: https://lore.kernel.org/r/20231201172212.1813387-4-cmllamas@xxxxxxxxxx Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- drivers/android/binder_alloc.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/android/binder_alloc.c +++ b/drivers/android/binder_alloc.c @@ -271,7 +271,7 @@ static int binder_update_page_range(stru } if (mm) { mmap_write_unlock(mm); - mmput(mm); + mmput_async(mm); } return 0; @@ -304,7 +304,7 @@ err_page_ptr_cleared: err_no_vma: if (mm) { mmap_write_unlock(mm); - mmput(mm); + mmput_async(mm); } return vma ? -ENOMEM : -ESRCH; } Patches currently in stable-queue which might be from cmllamas@xxxxxxxxxx are queue-5.10/binder-use-epollerr-from-eventpoll.h.patch queue-5.10/binder-fix-race-between-mmput-and-do_exit.patch queue-5.10/binder-fix-async-space-check-for-0-sized-buffers.patch queue-5.10/binder-fix-comment-on-binder_alloc_new_buf-return-value.patch queue-5.10/binder-fix-trivial-typo-of-binder_free_buf_locked.patch queue-5.10/binder-fix-use-after-free-in-shinker-s-callback.patch queue-5.10/binder-fix-unused-alloc-free_async_space.patch