lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <DAZV8OGL8BMH.11SLXBXQ17ZJ9@kernel.org>
Date: Mon, 30 Jun 2025 14:27:47 +0200
From: "Benno Lossin" <lossin@...nel.org>
To: "Andreas Hindborg" <a.hindborg@...nel.org>
Cc: "Miguel Ojeda" <ojeda@...nel.org>, "Alex Gaynor"
 <alex.gaynor@...il.com>, "Boqun Feng" <boqun.feng@...il.com>, "Gary Guo"
 <gary@...yguo.net>, Björn Roy Baron
 <bjorn3_gh@...tonmail.com>, "Alice Ryhl" <aliceryhl@...gle.com>, "Masahiro
 Yamada" <masahiroy@...nel.org>, "Nathan Chancellor" <nathan@...nel.org>,
 "Luis Chamberlain" <mcgrof@...nel.org>, "Danilo Krummrich"
 <dakr@...nel.org>, "Nicolas Schier" <nicolas.schier@...ux.dev>, "Trevor
 Gross" <tmgross@...ch.edu>, "Adam Bratschi-Kaye" <ark.email@...il.com>,
 <rust-for-linux@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
 <linux-kbuild@...r.kernel.org>, "Petr Pavlu" <petr.pavlu@...e.com>, "Sami
 Tolvanen" <samitolvanen@...gle.com>, "Daniel Gomez" <da.gomez@...sung.com>,
 "Simona Vetter" <simona.vetter@...ll.ch>, "Greg KH"
 <gregkh@...uxfoundation.org>, "Fiona Behrens" <me@...enk.dev>, "Daniel
 Almeida" <daniel.almeida@...labora.com>, <linux-modules@...r.kernel.org>
Subject: Re: [PATCH v13 2/6] rust: introduce module_param module

On Mon Jun 30, 2025 at 1:18 PM CEST, Andreas Hindborg wrote:
> "Benno Lossin" <lossin@...nel.org> writes:
>> On Fri Jun 27, 2025 at 9:57 AM CEST, Andreas Hindborg wrote:
>>> Andreas Hindborg <a.hindborg@...nel.org> writes:
>>>> "Benno Lossin" <lossin@...nel.org> writes:
>>>>> That's good to know, then let's try to go for something simple.
>>>>>
>>>>> I don't think that we can just use a `Mutex<T>`, because we don't have a
>>>>> way to create it at const time... I guess we could have
>>>>>
>>>>>     impl<T> Mutex<T>
>>>>>         /// # Safety
>>>>>         ///
>>>>>         /// The returned value needs to be pinned and then `init` needs
>>>>>         /// to be called before any other methods are called on this.
>>>>>         pub unsafe const fn const_new() -> Self;
>>>>>
>>>>>         pub unsafe fn init(&self);
>>>>>     }
>>>>>
>>>>> But that seems like a bad idea, because where would we call the `init`
>>>>> function? That also needs to be synchronized...
>>>>
>>>> Ah, that is unfortunate. The init function will not run before this, so
>>>> we would need a `Once` or an atomic anyway to initialize the lock.
>>>>
>>>> I am not sure if we are allowed to sleep during this, I would have to
>>>> check. But then we could use a spin lock.
>>>>
>>>> We will need the locking anyway, when we want to enable sysfs write
>>>> access to the parameters.
>>>>
>>>>>
>>>>> Maybe we can just like you said use an atomic bool?
>>>>
>>>> Sigh, I will have to check how far that series has come.
>>>>
>>>
>>> I think I am going to build some kind of `Once` feature on top of
>>> Boqun's atomic series [1], so that we can initialize a lock in these
>>> statics. We can't use `global_lock!`, because that depends on module
>>> init to initialize the lock before first use.
>>
>> Sounds good, though we probably don't want to name it `Once`. Since it
>> is something that will be populated in the future, but not by some
>> random accessor, but rather a specific populator.
>>
>> So maybe:
>>
>>     pub struct Delayed<T> {
>>         dummy: T,
>>         real: Opaque<T>,
>>         populated: Atomic<bool>, // or Atomic<Flag>
>>         writing: Atomic<bool>, // or Atomic<Flag>
>>     }
>>
>>     impl<T> Delayed<T> {
>>         pub fn new(dummy: T) -> Self {
>>             Self {
>>                 dummy,
>>                 real: Opaque::uninit(),
>>                 populated: Atomic::new(false),
>>                 writing: Atomic::new(false),
>>             }
>>         }
>>
>>         pub fn get(&self) -> &T {
>>             if self.populated.load(Acquire) {
>>                 unsafe { &*self.real.get() }
>>             } else {
>>                 // maybe print a warning here?
>>                 // or maybe let the user configure this in `new()`?
>>                 &self.dummy
>>             }
>>         }
>>
>>         pub fn populate(&self, value: T) {
>>             if self.writing.cmpxchg(false, true, Release) {
>>                 unsafe { *self.real.get() = value };
>>                 self.populated.store(true, Release);
>>             } else {
>>                 pr_warn!("`Delayed<{}>` written to twice!\n", core::any::type_name::<T>());
>>             }
>>         }
>>     }
>>
>> (no idea if the orderings are correct, I always have to think way to
>> much about that... especially since our atomics seem to only take one
>> ordering in compare_exchange?)
>>
>>> As far as I can tell, atomics may not land in v6.17, so this series
>>> will probably not be ready for merge until v6.18 at the earliest.
>>
>> Yeah, sorry about that :(
>
> Actually, perhaps we could aim at merging this code without this
> synchronization?

I won't remember this issue in a few weeks and I fear that it will just
get buried. In fact, I already had to re-read now what the actual issue
was...

> The lack of synchronization is only a problem if we
> support custom parsing. This patch set does not allow custom parsing
> code, so it does not suffer this issue.

... In doing that, I saw my original example of UB:

    module! {                                                                                                                                
        // ...                                                                                                                               
        params: {                                                                                                                            
            my_param: i64 {                                                                                                                  
                default: 0,                                                                                                                  
                description: "",                                                                                                             
            },                                                                                                                               
        },                                                                                                                                   
    }                                                                                                                                        
                                                                                                                                             
    static BAD: &'static i64 = module_parameters::my_param.get();

That can happen without custom parsing, so it's still a problem...

---
Cheers,
Benno

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ