Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1173629AbdDXWCM (ORCPT ); Mon, 24 Apr 2017 18:02:12 -0400 Received: from merlin.infradead.org ([205.233.59.134]:60350 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S978589AbdDXWBt (ORCPT ); Mon, 24 Apr 2017 18:01:49 -0400 Date: Tue, 25 Apr 2017 00:01:28 +0200 From: Peter Zijlstra To: Kees Cook Cc: PaX Team , LKML , Eric Biggers , Christoph Hellwig , "axboe@kernel.dk" , James Bottomley , Elena Reshetova , Hans Liljestrand , David Windsor , "x86@kernel.org" , Ingo Molnar , Arnd Bergmann , Greg Kroah-Hartman , Jann Horn , "David S. Miller" , linux-arch , "kernel-hardening@lists.openwall.com" Subject: Re: [PATCH] x86/refcount: Implement fast refcount_t handling Message-ID: <20170424220128.j7nnhuohqdqbiki7@hirez.programming.kicks-ass.net> References: <20170421220939.GA65363@beast> <58FDF8C4.5120.17D092B7@pageexec.freemail.hu> <20170424133323.cf3xyd3mmwp6ixaz@hirez.programming.kicks-ass.net> <58FE1687.5511.1844D4FC@pageexec.freemail.hu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1767 Lines: 59 On Mon, Apr 24, 2017 at 01:40:56PM -0700, Kees Cook wrote: > I think we're way off in the weeds here. The "cannot inc from 0" check > is about general sanity checks on refcounts. I disagree, although sanity check are good too. > It should never happen, and if it does, there's a bug. The very same is true of the overflow thing. > However, what the refcount hardening protection is trying to do is > protect again the exploitable condition: overflow. Sure.. > Inc-from-0 isn't an exploitable condition since in theory > the memory suddenly becomes correctly managed again. It does not. It just got free'ed. Nothing will stop the free from happening (or already having happened). > We're just discussing different things. No, both are bugs, neither overflow not inc-from-zero _should_ happen. The whole point is that code is buggy. If it weren't for that, we'd not be doing this. How is the below not useful fodder for an exploit? It might be a less common bug, and perhaps a bit more fiddly to make work, but afaict its still a full use-after-free and therefore useful. --- Thread-A Thread-B if(dec_and_test(&obj->ref)) { // true, ref==0 inc(&obj->ref) // ref: 0->1 kfree(obj); } ~~~/ Thread-C /~~~ obj = kmalloc(); // is obj from Thread-A obj->ref = 1; obj->func = .... obj->func(); -- OR -- put(obj); if (dec_and_test(&obj->ref)) kfree(obj); // which was of Thread-C