lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Wed,  6 Mar 2019 13:05:46 +0200
From:   Elena Reshetova <>
        Elena Reshetova <>
Subject: [PATCH 0/3] creds/cgroups/ns_proxy refcount_t conversions

I would like to reopen ages-old discussion on these conversions now.
Eric had objections against them in past, namely on not providing enough
security for reference counters (but we still argue it is better
than overflowing atomic_t and resulting use-after-free).
However now, refcount_t has been successfully used in kernel in many places,
helped to detect bugs and mistakes in logic of refcounters.
We have converted most of core kernel reference counters by now and these
3 are pretty core ones, so it would be really great to have them covered

The patches are fully independent and can be cherry-picked and
discussed separately. More information about each conversion in each patch

Elena Reshetova (3):
  nsproxy: convert nsproxy.count to refcount_t
  groups: convert group_info.usage to refcount_t
  creds: convert cred.usage to refcount_t

 include/linux/cred.h    | 15 +++++++-------
 include/linux/nsproxy.h |  6 +++---
 kernel/cred.c           | 44 ++++++++++++++++++++---------------------
 kernel/groups.c         |  2 +-
 kernel/nsproxy.c        |  6 +++---
 net/sunrpc/auth.c       |  2 +-
 6 files changed, 38 insertions(+), 37 deletions(-)


Powered by blists - more mailing lists