From: jongan.kim@lge.com
To: aliceryhl@google.com, arve@android.com, brauner@kernel.org,
cmllamas@google.com, gregkh@linuxfoundation.org,
tkjos@android.com, ojeda@kernel.org, boqun.feng@gmail.com,
gary@garyguo.net, bjorn3_gh@protonmail.com, lossin@kernel.org,
a.hindborg@kernel.org, tmgross@umich.edu, dakr@kernel.org,
yury.norov@gmail.com, vitaly.wool@konsulko.se, tamird@gmail.com,
viresh.kumar@linaro.org, daniel.almeida@collabora.com
Cc: linux-kernel@vger.kernel.org, rust-for-linux@vger.kernel.org,
jongan.kim@lge.com, heesu0025.kim@lge.com, ht.hong@lge.com,
jungsu.hwang@lge.com, kernel-team@android.com,
sanghun.lee@lge.com, seulgi.lee@lge.com, sunghoon.kim@lge.com
Subject: [PATCH v2 1/3] binder: handle PID namespace conversion for freeze operation
Date: Thu, 29 Jan 2026 17:41:17 +0900 [thread overview]
Message-ID: <20260129084119.32994-2-jongan.kim@lge.com> (raw)
In-Reply-To: <20260129084119.32994-1-jongan.kim@lge.com>
From: JongAn Kim <jongan.kim@lge.com>
Currently, when a freeze is attempted from a non-init PID namespace,
there is a possibility that the wrong process in the init namespace
may be frozen due to PID collision across namespaces.
For example, if a container with PID namespace has a process with
PID 100 (which maps to PID 5000 in init namespace), attempting to
freeze PID 100 from the container could incorrectly match a different
process with PID 100 in the init namespace.
This patch fixes the issue by:
1. Converting the caller's PID from their namespace to init namespace
2. Matching against binder_proc->pid (which stores init namespace TGID)
3. Returning -EINVAL for invalid PIDs and -ESRCH for not-found processes
This change ensures correct PID handling when binder freeze occurs in
non-init PID namespace.
Signed-off-by: JongAn Kim <jongan.kim@lge.com>
---
drivers/android/binder.c | 52 +++++++++++++++++++++++++++++++++++++---
1 file changed, 49 insertions(+), 3 deletions(-)
diff --git a/drivers/android/binder.c b/drivers/android/binder.c
index 535fc881c8da..4695e459c924 100644
--- a/drivers/android/binder.c
+++ b/drivers/android/binder.c
@@ -5609,6 +5609,40 @@ static bool binder_txns_pending_ilocked(struct binder_proc *proc)
return false;
}
+/**
+ * binder_convert_to_init_ns_tgid() - Convert pid to global pid(init namespace)
+ * @pid: pid from user space
+ *
+ * Converts a process ID (TGID) from the caller's PID namespace to the
+ * corresponding TGID in the init namespace.
+ *
+ * Return: On success, returns TGID in init namespace (positive value).
+ * On error, returns -EINVAL if pid <= 0, or -ESRCH if process
+ * not found or not visible in init namespace.
+ */
+static int binder_convert_to_init_ns_tgid(u32 pid)
+{
+ struct task_struct *task;
+ int init_ns_pid;
+
+ /* already in init namespace */
+ if (task_is_in_init_pid_ns(current))
+ return pid;
+
+ if (pid == 0)
+ return -EINVAL;
+
+ rcu_read_lock();
+ task = pid_task(find_vpid(pid), PIDTYPE_PID);
+ init_ns_pid = task ? task_tgid_nr_ns(task, &init_pid_ns) : -ESRCH;
+ rcu_read_unlock();
+
+ if (!init_ns_pid)
+ return -ESRCH;
+
+ return init_ns_pid;
+}
+
static void binder_add_freeze_work(struct binder_proc *proc, bool is_frozen)
{
struct binder_node *prev = NULL;
@@ -5717,13 +5751,18 @@ static int binder_ioctl_get_freezer_info(
struct binder_proc *target_proc;
bool found = false;
__u32 txns_pending;
+ int init_ns_pid = 0;
info->sync_recv = 0;
info->async_recv = 0;
+ init_ns_pid = binder_convert_to_init_ns_tgid(info->pid);
+ if (init_ns_pid < 0)
+ return init_ns_pid;
+
mutex_lock(&binder_procs_lock);
hlist_for_each_entry(target_proc, &binder_procs, proc_node) {
- if (target_proc->pid == info->pid) {
+ if (target_proc->pid == init_ns_pid) {
found = true;
binder_inner_proc_lock(target_proc);
txns_pending = binder_txns_pending_ilocked(target_proc);
@@ -5869,6 +5908,7 @@ static long binder_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
struct binder_freeze_info info;
struct binder_proc **target_procs = NULL, *target_proc;
int target_procs_count = 0, i = 0;
+ int init_ns_pid = 0;
ret = 0;
@@ -5877,9 +5917,15 @@ static long binder_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
goto err;
}
+ init_ns_pid = binder_convert_to_init_ns_tgid(info.pid);
+ if (init_ns_pid < 0) {
+ ret = init_ns_pid;
+ goto err;
+ }
+
mutex_lock(&binder_procs_lock);
hlist_for_each_entry(target_proc, &binder_procs, proc_node) {
- if (target_proc->pid == info.pid)
+ if (target_proc->pid == init_ns_pid)
target_procs_count++;
}
@@ -5900,7 +5946,7 @@ static long binder_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
}
hlist_for_each_entry(target_proc, &binder_procs, proc_node) {
- if (target_proc->pid != info.pid)
+ if (target_proc->pid != init_ns_pid)
continue;
binder_inner_proc_lock(target_proc);
--
2.25.1
next prev parent reply other threads:[~2026-01-29 8:50 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-29 8:41 [PATCH v2 0/3] binder: handle PID namespace conversion for freeze operation jongan.kim
2026-01-29 8:41 ` jongan.kim [this message]
2026-01-29 10:41 ` [PATCH v2 1/3] " Alice Ryhl
2026-01-30 1:54 ` jongan.kim
2026-01-29 8:41 ` [PATCH v2 2/3] rust: pid: add Pid abstraction and init_pid_ns helper jongan.kim
2026-01-29 10:32 ` Alice Ryhl
2026-01-30 11:34 ` heesu0025.kim
2026-01-29 14:33 ` Gary Guo
2026-01-30 4:57 ` heesu0025.kim
2026-01-29 8:41 ` [PATCH v2 3/3] rust_binder: handle PID namespace conversion for freeze operation jongan.kim
2026-01-29 10:35 ` Alice Ryhl
2026-01-30 5:22 ` heesu0025.kim
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260129084119.32994-2-jongan.kim@lge.com \
--to=jongan.kim@lge.com \
--cc=a.hindborg@kernel.org \
--cc=aliceryhl@google.com \
--cc=arve@android.com \
--cc=bjorn3_gh@protonmail.com \
--cc=boqun.feng@gmail.com \
--cc=brauner@kernel.org \
--cc=cmllamas@google.com \
--cc=dakr@kernel.org \
--cc=daniel.almeida@collabora.com \
--cc=gary@garyguo.net \
--cc=gregkh@linuxfoundation.org \
--cc=heesu0025.kim@lge.com \
--cc=ht.hong@lge.com \
--cc=jungsu.hwang@lge.com \
--cc=kernel-team@android.com \
--cc=linux-kernel@vger.kernel.org \
--cc=lossin@kernel.org \
--cc=ojeda@kernel.org \
--cc=rust-for-linux@vger.kernel.org \
--cc=sanghun.lee@lge.com \
--cc=seulgi.lee@lge.com \
--cc=sunghoon.kim@lge.com \
--cc=tamird@gmail.com \
--cc=tkjos@android.com \
--cc=tmgross@umich.edu \
--cc=viresh.kumar@linaro.org \
--cc=vitaly.wool@konsulko.se \
--cc=yury.norov@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox