Re: [PATCH] x86/refcount: Implement fast refcount_t handling

From: Peter Zijlstra
Date: Mon Apr 24 2017 - 18:02:15 EST


On Mon, Apr 24, 2017 at 01:40:56PM -0700, Kees Cook wrote:
> I think we're way off in the weeds here. The "cannot inc from 0" check
> is about general sanity checks on refcounts.

I disagree, although sanity check are good too.

> It should never happen, and if it does, there's a bug.

The very same is true of the overflow thing.

> However, what the refcount hardening protection is trying to do is
> protect again the exploitable condition: overflow.

Sure..

> Inc-from-0 isn't an exploitable condition since in theory
> the memory suddenly becomes correctly managed again.

It does not. It just got free'ed. Nothing will stop the free from
happening (or already having happened).

> We're just discussing different things.

No, both are bugs, neither overflow not inc-from-zero _should_ happen.
The whole point is that code is buggy. If it weren't for that, we'd not
be doing this.

How is the below not useful fodder for an exploit? It might be a less
common bug, and perhaps a bit more fiddly to make work, but afaict its
still a full use-after-free and therefore useful.

---

Thread-A Thread-B

if(dec_and_test(&obj->ref)) { // true, ref==0

inc(&obj->ref) // ref: 0->1

kfree(obj);
}



~~~/ Thread-C /~~~

obj = kmalloc(); // is obj from Thread-A

obj->ref = 1;
obj->func = ....


obj->func();

-- OR --

put(obj);
if (dec_and_test(&obj->ref))
kfree(obj); // which was of Thread-C