Skip to content

Conversation

@folkertdev
Copy link
Contributor

@folkertdev folkertdev commented Oct 14, 2025

tracking issue: #81391
tracking issue: #75835

When a union passes from secure to non-secure (so, passed as an argument to a non-secure call, or returned by a non-secure entry), warn that there may be secure information lingering in the unused or uninitialized parts of a union value.

This lint matches the behavior of clang (see https://godbolt.org/z/vq9xnrnEs). Like clang we warn at the use site, so that individual uses could be annotated with #[allow(cmse_uninitialized_leak)].

Ideally we'd warn on any type that may have uninitialized parts, but I haven't figured out a good way to do that yet.

It is still unclear whether a union value where all fields are equally large and allow the same bit patterns can be considered initialized (see rust-lang/unsafe-code-guidelines#438), so for now we just warn on any union.

r? @ghost

@folkertdev folkertdev added F-cmse_nonsecure_entry `#![feature(cmse_nonsecure_entry)]` F-abi_cmse_nonsecure_call `#![feature(abi_cmse_nonsecure_call)]` labels Oct 14, 2025
@rustbot rustbot added A-test-infra-minicore Area: `minicore` test auxiliary and `//@ add-core-stubs` S-waiting-on-author Status: This is awaiting some action (such as code changes or more information) from the author. T-compiler Relevant to the compiler team, which will review and decide on the PR/issue. labels Oct 14, 2025
@rust-log-analyzer

This comment has been minimized.

@folkertdev folkertdev force-pushed the cmse-lint-on-uninitialized branch from a344d30 to 514010e Compare October 15, 2025 09:09
@rust-log-analyzer

This comment has been minimized.

@folkertdev folkertdev force-pushed the cmse-lint-on-uninitialized branch from 514010e to 9d276b5 Compare October 15, 2025 11:03
@rust-log-analyzer

This comment has been minimized.

@folkertdev folkertdev force-pushed the cmse-lint-on-uninitialized branch from 9d276b5 to 4a269f5 Compare October 15, 2025 11:55
@rust-log-analyzer

This comment has been minimized.

@folkertdev folkertdev force-pushed the cmse-lint-on-uninitialized branch from 4a269f5 to 0b424f6 Compare October 15, 2025 16:49
@folkertdev
Copy link
Contributor Author

r? @davidtwco

This seems useful just for parity with clang. The code is built to be extended to cover more cases of types possibly containing uninitialized memory, but by the looks of things there isn't currently a straightforward way to detect such types (cc #t-compiler/help > check whether a type can be (partially) uninitialized)

@folkertdev folkertdev marked this pull request as ready for review October 15, 2025 19:29
@rustbot
Copy link
Collaborator

rustbot commented Oct 15, 2025

HIR ty lowering was modified

cc @fmease

This PR modifies tests/auxiliary/minicore.rs.

cc @jieyouxu

@rustbot rustbot added S-waiting-on-review Status: Awaiting review from the assignee but also interested parties. and removed S-waiting-on-author Status: This is awaiting some action (such as code changes or more information) from the author. labels Oct 15, 2025
Copy link
Member

@davidtwco davidtwco left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Implementation LGTM, two nits, but will need t-lang approval for a new lint

View changes since this review

use minicore::*;

#[repr(Rust)]
pub union ReprRustUnionU64 {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you add cases where the unions are contained within other types to these tests?

@davidtwco davidtwco added the I-lang-nominated Nominated for discussion during a lang team meeting. label Oct 16, 2025
@folkertdev folkertdev force-pushed the cmse-lint-on-uninitialized branch from 0b424f6 to 4586300 Compare October 16, 2025 20:05
Copy link
Contributor Author

@folkertdev folkertdev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The lint will only fire when the cmse ABIs are enabled, but I suppose the name does sort of "leak".

the OP here provides some context. The bigger picture is in this draft RFC that I plan to formally submit soon.

View changes since this review

Comment on lines 49 to 58
warning: passing a union across the security boundary may leak information
--> $DIR/return-uninitialized.rs:46:5
|
LL | / match 0 {
LL | |
LL | | 0 => Wrapper(ReprRustUnionU64 { _unused: 1 }),
LL | | _ => Wrapper(ReprRustUnionU64 { _unused: 2 }),
LL | | }
| |_____^
|
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

would it make sense to warn in the individual arms of the match instead? I think as a user that would be better in this simple case, though I don't know that we can make that robust (e.g. thinking about labeled blocks).

@traviscross traviscross added the P-lang-drag-1 Lang team prioritization drag level 1. https://rust-lang.zulipchat.com/#narrow/channel/410516-t-lang label Oct 22, 2025
@joshtriplett
Copy link
Member

Ideally we'd warn on any type that may have uninitialized parts, but I haven't figured out a good way to do that yet.

Would that also include padding?

In any case, this seems wildly useful for many users, not just cmse. The Linux kernel would likely benefit from this, for instance, to avoid leaking uninitialized bits to userspace.

On that basis I'm wondering if we should aspirationally call this uninitialized_leak or similar, without cmse in it.

Is there some means by which we could allow the user to suppress this not by allow but by demonstrating that they've properly zero-initialized it? Or is the point that LLVM doesn't guarantee that because it might un-zero that memory (e.g. copying without caring what value ends up in the padding / unused-union-bits / etc)?

@folkertdev
Copy link
Contributor Author

Would that also include padding?

Ideally, yes. But I don't have a good strategy for actually achieving that. Based on #t-compiler/help > check whether a type can be (partially) uninitialized @ 💬 maybe there are parts of safe transmute that are helpful here.

Is there some means by which we could allow the user to suppress this not by allow but by demonstrating that they've properly zero-initialized it? Or is the point that LLVM doesn't guarantee that because it might un-zero that memory (e.g. copying without caring what value ends up in the padding / unused-union-bits / etc)?

I'm not familiar enough with the opsem details here, but in any case I don't think we'd want to tie our lints to LLVM implementation details that much?

@joshtriplett
Copy link
Member

I'm not proposing to depend on LLVM details. I was asking how we can handle code that's doing the correct thing (whatever that might be), such as ensuring the uninitialized memory is zero.

In C, you would ensure the union is zero-initialized, then initialize the correct field, then return it. What's the equivalent operation that you can do in Rust, and can we ensure that we don't emit the lint if you properly do that?

@folkertdev
Copy link
Contributor Author

What I had in mind is to use MaybeUninit::zeroed, set the relevant fields, and assume_init.

At least in that case, I don't think we have a good way of checking whether the value is properly initialized without actually evaluating the program (e.g. with miri).

When a union passes from secure to non-secure (so, passed as an argument
to an nonsecure call, or returned by a nonsecure entry), warn that there
may be secure information lingering in the unused or uninitialized
parts of a union value.

https://godbolt.org/z/vq9xnrnEs
@traviscross traviscross added I-lang-radar Items that are on lang's radar and will need eventual work or consideration. T-lang Relevant to the language team needs-fcp This change is insta-stable, or significant enough to need a team FCP to proceed. and removed I-lang-nominated Nominated for discussion during a lang team meeting. P-lang-drag-1 Lang team prioritization drag level 1. https://rust-lang.zulipchat.com/#narrow/channel/410516-t-lang labels Oct 29, 2025
@folkertdev
Copy link
Contributor Author

This PR was discussed today in the T-lang triage meeting

https://hackmd.io/Oo0T829rSfeGYTdZixvI_Q#cmse-lint-on-unions-crossing-the-secure-boundary-rust147697

Generally everyone seemed in favor. We decided to wait with actually merging this PR until the CMSE RFC is up (and perhaps accepted). That way we have a bit more time to see if there is significant overlap with RfL, look at additionally linting on values with padding, and see how it feels to use this lint in practice.

@folkertdev folkertdev force-pushed the cmse-lint-on-uninitialized branch from 4586300 to 5abb0ff Compare October 29, 2025 19:11
@rustbot
Copy link
Collaborator

rustbot commented Oct 29, 2025

These commits modify the Cargo.lock file. Unintentional changes to Cargo.lock can be introduced when switching branches and rebasing PRs.

If this was unintentional then you should revert the changes before this PR is merged.
Otherwise, you can ignore this comment.

@rustbot
Copy link
Collaborator

rustbot commented Oct 29, 2025

This PR was rebased onto a different master commit. Here's a range-diff highlighting what actually changed.

Rebasing is a normal part of keeping PRs up to date, so no action is needed—this note is just to help reviewers.

@folkertdev
Copy link
Contributor Author

The latest commit additionally lints on types with padding:

// This is an aggregate that cannot be unwrapped, and has 1 (uninitialized) padding byte.
#[repr(C)]
struct PaddedStruct {
    a: u8,
    b: u16,
}

#[no_mangle]
extern "cmse-nonsecure-entry" fn padded_struct() -> PaddedStruct {
    PaddedStruct { a: 0, b: 1 }
    //~^ WARN passing a (partially) uninitialized value across the security boundary may leak information
}

The approach is to check whether a type T can be safely transmuted to [u8; size_of::<T>()] using the internal machinery from rustc_transmute that is also used for "safe transmute" (#![feature(transmutability)]).

This seems to work nicely for both unions and structs with padding. For unions it is also more accurate, in that e.g. #[repr(Rust)] union { _a: i64 } is considered fully initialized. What I am not 100% sure on is what the edge cases are.

Also by the looks of it the transmute logic is fairly robust, but someone more familiar with rustc_transmute should judge whether we're potentially indirectly using/stabilizing functionality that we shouldn't.

@bors
Copy link
Collaborator

bors commented Nov 3, 2025

☔ The latest upstream changes (presumably #148305) made this pull request unmergeable. Please resolve the merge conflicts.

@davidtwco davidtwco added S-blocked Status: Blocked on something else such as an RFC or other implementation work. and removed S-waiting-on-review Status: Awaiting review from the assignee but also interested parties. labels Nov 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

A-test-infra-minicore Area: `minicore` test auxiliary and `//@ add-core-stubs` F-abi_cmse_nonsecure_call `#![feature(abi_cmse_nonsecure_call)]` F-cmse_nonsecure_entry `#![feature(cmse_nonsecure_entry)]` I-lang-radar Items that are on lang's radar and will need eventual work or consideration. needs-fcp This change is insta-stable, or significant enough to need a team FCP to proceed. S-blocked Status: Blocked on something else such as an RFC or other implementation work. T-compiler Relevant to the compiler team, which will review and decide on the PR/issue. T-lang Relevant to the language team

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants