[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220328165821.GL614@gate.crashing.org>
Date: Mon, 28 Mar 2022 11:58:21 -0500
From: Segher Boessenkool <segher@...nel.crashing.org>
To: Peter Zijlstra <peterz@...radead.org>
Cc: Mark Rutland <mark.rutland@....com>,
Nick Desaulniers <ndesaulniers@...gle.com>,
Borislav Petkov <bp@...en8.de>,
Nathan Chancellor <nathan@...nel.org>, x86-ml <x86@...nel.org>,
lkml <linux-kernel@...r.kernel.org>, llvm@...ts.linux.dev,
Josh Poimboeuf <jpoimboe@...hat.com>,
linux-toolchains@...r.kernel.org
Subject: Re: clang memcpy calls
On Mon, Mar 28, 2022 at 06:16:37PM +0200, Peter Zijlstra wrote:
> On Mon, Mar 28, 2022 at 10:59:57AM -0500, Segher Boessenkool wrote:
[ Context added back: ]
> > > My argument is: if the compiler is permitted to implictly and
> > > arbitrarily add calls to instrumented functions within a function marked
> > > with `no_sanitize_address`, the `no_sanitize_address` attribute is
> > > effectively useless, and therefore *something* needs to change.
> I do not see how that follows. Maybe that is obvious from how you look
> > at your use case, but it is not from the viewpoint of people who just
> > want to do sanitation.
>
> It's a substitution issue:
>
> either:
>
> memcpy() equals: "asan instrumentation" + "memcpy implementation"
>
> or:
>
> memcpy() equals: "memcpy implementation"
>
> It can not be both, since they're not equivalent.
Equivalent in what sense? ASAN (like any other sanitizer) does not
change the semantics of valid programs *at all*. And invalid programs
do not have semantics, of course.
> So if the compiler does the substitution, it needs some sense of
> equivalence. All we're asking is that it be consistent (my preference is
> for the latter).
If you want to never do sanitation, there is -fno-sanitize=all. But
that obviously is not what you want either.
> > So what is the goal here? Why do you need to
> > prevent sanitation on anything called from this function, at all cost?
>
> Kernel entry code might not have reached a point where instrumentation
> assumptions are valid yet. Consider calling into C before the kernel
> page-tables are swapped in. KASAN instrumentation would insta-explode
> simply because the environment it expects (the shadow data etc..) isn't
> there.
Ah. Something like the proposed global boolean flag would work fine for
that, afaics? Have all the asan implementation functions just return
until the "I am ready now" flag is set. This is trivial overhead,
compared to having asan at all!
Segher
Powered by blists - more mailing lists