-
Notifications
You must be signed in to change notification settings - Fork 14k
cmse: lint on unions crossing the secure boundary #147697
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
This comment has been minimized.
This comment has been minimized.
a344d30 to
514010e
Compare
This comment has been minimized.
This comment has been minimized.
514010e to
9d276b5
Compare
This comment has been minimized.
This comment has been minimized.
9d276b5 to
4a269f5
Compare
This comment has been minimized.
This comment has been minimized.
4a269f5 to
0b424f6
Compare
|
r? @davidtwco This seems useful just for parity with clang. The code is built to be extended to cover more cases of types possibly containing uninitialized memory, but by the looks of things there isn't currently a straightforward way to detect such types (cc #t-compiler/help > check whether a type can be (partially) uninitialized) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Implementation LGTM, two nits, but will need t-lang approval for a new lint
tests/ui/cmse-nonsecure/cmse-nonsecure-entry/params-via-stack.rs
Outdated
Show resolved
Hide resolved
| use minicore::*; | ||
|
|
||
| #[repr(Rust)] | ||
| pub union ReprRustUnionU64 { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add cases where the unions are contained within other types to these tests?
0b424f6 to
4586300
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The lint will only fire when the cmse ABIs are enabled, but I suppose the name does sort of "leak".
the OP here provides some context. The bigger picture is in this draft RFC that I plan to formally submit soon.
| warning: passing a union across the security boundary may leak information | ||
| --> $DIR/return-uninitialized.rs:46:5 | ||
| | | ||
| LL | / match 0 { | ||
| LL | | | ||
| LL | | 0 => Wrapper(ReprRustUnionU64 { _unused: 1 }), | ||
| LL | | _ => Wrapper(ReprRustUnionU64 { _unused: 2 }), | ||
| LL | | } | ||
| | |_____^ | ||
| | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
would it make sense to warn in the individual arms of the match instead? I think as a user that would be better in this simple case, though I don't know that we can make that robust (e.g. thinking about labeled blocks).
Would that also include padding? In any case, this seems wildly useful for many users, not just On that basis I'm wondering if we should aspirationally call this Is there some means by which we could allow the user to suppress this not by |
Ideally, yes. But I don't have a good strategy for actually achieving that. Based on #t-compiler/help > check whether a type can be (partially) uninitialized @ 💬 maybe there are parts of safe transmute that are helpful here.
I'm not familiar enough with the opsem details here, but in any case I don't think we'd want to tie our lints to LLVM implementation details that much? |
|
I'm not proposing to depend on LLVM details. I was asking how we can handle code that's doing the correct thing (whatever that might be), such as ensuring the uninitialized memory is zero. In C, you would ensure the union is zero-initialized, then initialize the correct field, then return it. What's the equivalent operation that you can do in Rust, and can we ensure that we don't emit the lint if you properly do that? |
|
What I had in mind is to use At least in that case, I don't think we have a good way of checking whether the value is properly initialized without actually evaluating the program (e.g. with miri). |
When a union passes from secure to non-secure (so, passed as an argument to an nonsecure call, or returned by a nonsecure entry), warn that there may be secure information lingering in the unused or uninitialized parts of a union value. https://godbolt.org/z/vq9xnrnEs
|
This PR was discussed today in the T-lang triage meeting https://hackmd.io/Oo0T829rSfeGYTdZixvI_Q#cmse-lint-on-unions-crossing-the-secure-boundary-rust147697 Generally everyone seemed in favor. We decided to wait with actually merging this PR until the CMSE RFC is up (and perhaps accepted). That way we have a bit more time to see if there is significant overlap with RfL, look at additionally linting on values with padding, and see how it feels to use this lint in practice. |
4586300 to
5abb0ff
Compare
|
These commits modify the If this was unintentional then you should revert the changes before this PR is merged. |
|
This PR was rebased onto a different master commit. Here's a range-diff highlighting what actually changed. Rebasing is a normal part of keeping PRs up to date, so no action is needed—this note is just to help reviewers. |
|
The latest commit additionally lints on types with padding: // This is an aggregate that cannot be unwrapped, and has 1 (uninitialized) padding byte.
#[repr(C)]
struct PaddedStruct {
a: u8,
b: u16,
}
#[no_mangle]
extern "cmse-nonsecure-entry" fn padded_struct() -> PaddedStruct {
PaddedStruct { a: 0, b: 1 }
//~^ WARN passing a (partially) uninitialized value across the security boundary may leak information
}The approach is to check whether a type This seems to work nicely for both Also by the looks of it the transmute logic is fairly robust, but someone more familiar with |
|
☔ The latest upstream changes (presumably #148305) made this pull request unmergeable. Please resolve the merge conflicts. |
tracking issue: #81391
tracking issue: #75835
When a union passes from secure to non-secure (so, passed as an argument to a non-secure call, or returned by a non-secure entry), warn that there may be secure information lingering in the unused or uninitialized parts of a union value.
This lint matches the behavior of clang (see https://godbolt.org/z/vq9xnrnEs). Like clang we warn at the use site, so that individual uses could be annotated with
#[allow(cmse_uninitialized_leak)].Ideally we'd warn on any type that may have uninitialized parts, but I haven't figured out a good way to do that yet.
It is still unclear whether a union value where all fields are equally large and allow the same bit patterns can be considered initialized (see rust-lang/unsafe-code-guidelines#438), so for now we just warn on any
union.r? @ghost