On Fri, Dec 08, 2023 at 05:31:59PM +0100, Miguel Ojeda wrote: > On Wed, Dec 6, 2023 at 2:41 PM Peter Zijlstra <peterz@xxxxxxxxxxxxx> wrote: > > > > Anywhoo, the longer a function is, the harder it becomes, since you need > > to deal with everything a function does and consider the specuation > > window length. So trivial functions like the above that do an immediate > > dereference and are (and must be) a valid indirect target (because > > EXPORT) are ideal. > > We discussed this in our weekly meeting, and we would like to ask a > few questions: > > - Could you please describe an example attack that you are thinking > of? (i.e. a "full" attack, rather than just Spectre itself). For > instance, would it rely on other vulnerabilities? There's a fairly large amount of that on github, google spectre poc and stuff like that. > - Is this a kernel rule everybody should follow now? i.e. "no (new?) > short, exported symbols that just dereference their pointer args". If > so, could this please be documented? Or is it already somewhere? Gadget scanners are ever evolving and I think there's a bunch of groups running them against Linux, but most of us don't have spare time beyond trying to plug the latest hole. > - Are we checking for this in some way already, e.g. via `objtool`? > Especially if this is a rule, then it would be nice to have a way to > double-check if we are getting rid of (most of) these "dangerous" > symbols (or at least not introduce new ones, and not just in Rust but > C too). Objtool does not look for these (gadget scanners are quite complicated by now and I don't think I want to go there with objtool). At the moment I'm simply fixing whatever gets reported from 3rd parties when and where time permits. The thing at hand was just me eyeballing it. > > That would be good, but how are you going to do that without duplicating > > the horror that is struct task_struct ? > > As Alice pointed out, `bindgen` "solves" that, but it is nevertheless > extra maintenance effort. > > > Well, I really wish the Rust community would address the C > > interoperability in a hurry. Basically make it a requirement for > > in-kernel Rust. > > Yeah, some of us have advocated for more integrated C support within > Rust (or within `rustc` at least). \o/ > > I mean, how hard can it be to have clang parse the C headers and inject > > them into the Rust IR as if they're external FFI things. > > That is what `bindgen` does (it uses Clang as a library), except it > does not create Rust IR, it outputs normal Rust code, i.e. similar to > C declarations. Right, but then you get into the problem that Rust simply cannot express a fair amount of the things we already do, like asm-goto, or even simple asm with memops apparently. > But note that using Clang does not solve the issue of `#define`s in > the general case. That is why we would still need "helpers" like these > so that the compiler knows how to expand the macro in a C context, > which then can be inlined as LLVM IR or similar (which is what I > suspect you were actually thinking about, rather than "Rust IR"?). Yeah, LLVM-IR. And urgh yeah, CPP, this is another down-side of Rust not being in the C language family, you can't sanely run CPP on it. Someone really should do a Rust like language in the C family, then perhaps it will stop looking like line noise to me :-) I suppose converting things to enum and inline functions where possible might help a bit with that, but things like tracepoints, which are built from a giant pile of CPP are just not going to be happy :/ Anyway, I think it would be a giant step forwards from where we are today. > That "mix the LLVM IRs from Clang and `rustc`" ("local LTO hack") > approach is something we have been discussing in the past for > performance reasons (i.e. to inline these small C functions that Rust > needs, cross-language, even in non-LTO builds). And if it helps to > avoid certain attacks around speculation, then even better. So if the > LLVM folks do not have any major concerns about it, then I think we > should go ahead with that (please see also my reply to comex). But does LTO make any guarantees about inlining? The thing is, with actual LLVM-IR you can express the __always_inline attribute and inlining becomes guaranteed, I don't think you can rely on LTO for the same level of guarantees. And you still need to create these C functions by hand in this local-LTO scenario, which is less than ideal.