[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202512092319.ECBB8613@keescook>
Date: Tue, 9 Dec 2025 23:21:03 -0800
From: Kees Cook <kees@...nel.org>
To: Miguel Ojeda <ojeda@...nel.org>
Cc: Alex Gaynor <alex.gaynor@...il.com>,
Nathan Chancellor <nathan@...nel.org>,
Boqun Feng <boqun.feng@...il.com>, Gary Guo <gary@...yguo.net>,
Björn Roy Baron <bjorn3_gh@...tonmail.com>,
Benno Lossin <benno.lossin@...ton.me>,
Andreas Hindborg <a.hindborg@...nel.org>,
Alice Ryhl <aliceryhl@...gle.com>, Trevor Gross <tmgross@...ch.edu>,
rust-for-linux@...r.kernel.org,
Nick Desaulniers <ndesaulniers@...gle.com>,
Bill Wendling <morbo@...gle.com>,
Justin Stitt <justinstitt@...gle.com>, llvm@...ts.linux.dev,
linux-kernel@...r.kernel.org, patches@...ts.linux.dev,
Aaron Ballman <aaron@...onballman.com>,
Bill Wendling <isanbard@...il.com>,
Cole Nixon <nixontcole@...il.com>,
Connor Kuehl <cipkuehl@...il.com>, Fangrui Song <i@...kray.me>,
James Foster <jafosterja@...il.com>,
Jeff Takahashi <jeffrey.takahashi@...il.com>,
Jordan Cantrell <jordan.cantrell@...l.com>,
Matthew Maurer <mmaurer@...gle.com>,
Nikk Forbus <nicholas.forbus@...il.com>,
Qing Zhao <qing.zhao@...cle.com>,
Sami Tolvanen <samitolvanen@...gle.com>,
Tim Pugh <nwtpugh@...il.com>
Subject: Re: [RFC PATCH] rust: allow Clang-native `RANDSTRUCT` configs
On Tue, Nov 19, 2024 at 07:57:47PM +0100, Miguel Ojeda wrote:
> The kernel supports `RANDSTRUCT_FULL` with Clang 16+, and `bindgen`
> (which uses `libclang` under the hood) inherits the information, so the
> generated bindings look correct.
>
> For instance, running:
>
> bindgen x.h -- -frandomize-layout-seed=100
>
> with:
>
> struct S1 {
> int a;
> int b;
> };
>
> struct S2 {
> int a;
> int b;
> } __attribute__((randomize_layout));
>
> struct S3 {
> void (*a)(void);
> void (*b)(void);
> };
>
> struct S4 {
> void (*a)(void);
> void (*b)(void);
> } __attribute__((no_randomize_layout));
>
> may swap `S2`'s and `S3`'s members, but not `S1`'s nor `S4`'s:
>
> pub struct S1 {
> pub a: ::std::os::raw::c_int,
> pub b: ::std::os::raw::c_int,
> }
>
> pub struct S2 {
> pub b: ::std::os::raw::c_int,
> pub a: ::std::os::raw::c_int,
> }
>
> pub struct S3 {
> pub b: ::std::option::Option<unsafe extern "C" fn()>,
> pub a: ::std::option::Option<unsafe extern "C" fn()>,
> }
>
> pub struct S4 {
> pub a: ::std::option::Option<unsafe extern "C" fn()>,
> pub b: ::std::option::Option<unsafe extern "C" fn()>,
> }
>
> Thus allow those configurations by requiring a Clang compiler to use
> `RANDSTRUCT`. In addition, remove the `!GCC_PLUGIN_RANDSTRUCT` check
> since it is not needed.
>
> A simpler alternative would be to remove the `!RANDSTRUCT` check (keeping
> the `!GCC_PLUGIN_RANDSTRUCT` one). However, if in the future GCC starts
> supporting `RANDSTRUCT` natively, it would be likely that it would not
> work unless GCC and Clang agree on the exact semantics of the flag. And,
> as far as I can see, so far the randomization in Clang does not seem to be
> guaranteed to remain stable across versions or platforms, i.e. only for a
> given compiler Clang binary, given it is not documented and that LLVM's
> `HEAD` has the revert in place for the expected field names in the test
> (LLVM commit 8dbc6b560055 ("Revert "[randstruct] Check final randomized
> layout ordering"")) [1][2]. And the GCC plugin definitely does not match,
> e.g. its RNG is different (`std::mt19937` vs Bob Jenkins').
>
> And given it is not supposed to be guaranteed to remain stable across
> versions, it is a good idea to match the Clang and `bindgen`'s
> `libclang` versions -- we already have a warning for that in
> `scripts/rust_is_available.sh`. In the future, it would also be good to
> have a build test to double-check layouts do actually match (but that
> is true regardless of this particular feature).
>
> Finally, make a required small change to take into account the anonymous
> struct used in `randomized_struct_fields_*` in `struct task_struct`.
>
> Cc: Aaron Ballman <aaron@...onballman.com>
> Cc: Bill Wendling <isanbard@...il.com>
> Cc: Cole Nixon <nixontcole@...il.com>
> Cc: Connor Kuehl <cipkuehl@...il.com>
> Cc: Fangrui Song <i@...kray.me>
> Cc: James Foster <jafosterja@...il.com>
> Cc: Jeff Takahashi <jeffrey.takahashi@...il.com>
> Cc: Jordan Cantrell <jordan.cantrell@...l.com>
> Cc: Justin Stitt <justinstitt@...gle.com>
> Cc: Matthew Maurer <mmaurer@...gle.com>
> Cc: Nathan Chancellor <nathan@...nel.org>
> Cc: Nikk Forbus <nicholas.forbus@...il.com>
> Cc: Qing Zhao <qing.zhao@...cle.com>
> Cc: Sami Tolvanen <samitolvanen@...gle.com>
> Cc: Tim Pugh <nwtpugh@...il.com>
> Link: https://reviews.llvm.org/D121556
> Link: https://github.com/llvm/llvm-project/commit/8dbc6b560055ff5068ff45b550482ba62c36b5a5 [1]
> Link: https://reviews.llvm.org/D124199 [2]
> Reviewed-by: Kees Cook <kees@...nel.org>
> Signed-off-by: Miguel Ojeda <ojeda@...nel.org>
I played with this again, and yes it appears to be working. I think,
however, I would like to make the anon struct universal. What do you
think of this?
diff --git a/init/Kconfig b/init/Kconfig
index cab3ad28ca49..839bb5a6b187 100644
--- a/init/Kconfig
+++ b/init/Kconfig
@@ -2090,8 +2090,7 @@ config RUST
depends on RUST_IS_AVAILABLE
select EXTENDED_MODVERSIONS if MODVERSIONS
depends on !MODVERSIONS || GENDWARFKSYMS
- depends on !GCC_PLUGIN_RANDSTRUCT
- depends on !RANDSTRUCT
+ depends on !RANDSTRUCT || CC_IS_CLANG
depends on !DEBUG_INFO_BTF || (PAHOLE_HAS_LANG_EXCLUDE && !LTO)
depends on !CFI || HAVE_CFI_ICALL_NORMALIZE_INTEGERS_RUSTC
select CFI_ICALL_NORMALIZE_INTEGERS if CFI
diff --git a/include/linux/compiler_types.h b/include/linux/compiler_types.h
index 1414be493738..ed17db287db1 100644
--- a/include/linux/compiler_types.h
+++ b/include/linux/compiler_types.h
@@ -437,14 +437,9 @@ struct ftrace_likely_data {
#if defined(RANDSTRUCT) && !defined(__CHECKER__)
# define __randomize_layout __designated_init __attribute__((randomize_layout))
# define __no_randomize_layout __attribute__((no_randomize_layout))
-/* This anon struct can add padding, so only enable it under randstruct. */
-# define randomized_struct_fields_start struct {
-# define randomized_struct_fields_end } __randomize_layout;
#else
# define __randomize_layout __designated_init
# define __no_randomize_layout
-# define randomized_struct_fields_start
-# define randomized_struct_fields_end
#endif
#ifndef __no_kstack_erase
diff --git a/include/linux/sched.h b/include/linux/sched.h
index b469878de25c..7da987ea7f58 100644
--- a/include/linux/sched.h
+++ b/include/linux/sched.h
@@ -833,7 +833,7 @@ struct task_struct {
* This begins the randomizable portion of task_struct. Only
* scheduling-critical items should be added above here.
*/
- randomized_struct_fields_start
+ struct {
void *stack;
refcount_t usage;
@@ -1664,7 +1664,7 @@ struct task_struct {
* New fields for task_struct should be added above here, so that
* they are included in the randomized portion of task_struct.
*/
- randomized_struct_fields_end
+ } __randomize_layout;
} __attribute__ ((aligned (64)));
#ifdef CONFIG_SCHED_PROXY_EXEC
diff --git a/rust/kernel/task.rs b/rust/kernel/task.rs
index 49fad6de0674..c52552272495 100644
--- a/rust/kernel/task.rs
+++ b/rust/kernel/task.rs
@@ -208,7 +208,7 @@ pub fn as_ptr(&self) -> *mut bindings::task_struct {
pub fn group_leader(&self) -> &Task {
// SAFETY: The group leader of a task never changes after initialization, so reading this
// field is not a data race.
- let ptr = unsafe { *ptr::addr_of!((*self.as_ptr()).group_leader) };
+ let ptr = unsafe { *ptr::addr_of!((*self.as_ptr()).__bindgen_anon_1.group_leader) };
// SAFETY: The lifetime of the returned task reference is tied to the lifetime of `self`,
// and given that a task has a reference to its group leader, we know it must be valid for
@@ -220,7 +220,7 @@ pub fn group_leader(&self) -> &Task {
pub fn pid(&self) -> Pid {
// SAFETY: The pid of a task never changes after initialization, so reading this field is
// not a data race.
- unsafe { *ptr::addr_of!((*self.as_ptr()).pid) }
+ unsafe { *ptr::addr_of!((*self.as_ptr()).__bindgen_anon_1.pid) }
}
/// Returns the UID of the given task.
@@ -291,7 +291,7 @@ impl CurrentTask {
pub fn mm(&self) -> Option<&MmWithUser> {
// SAFETY: The `mm` field of `current` is not modified from other threads, so reading it is
// not a data race.
- let mm = unsafe { (*self.as_ptr()).mm };
+ let mm = unsafe { (*self.as_ptr()).__bindgen_anon_1.mm };
if mm.is_null() {
return None;
--
Kees Cook
Powered by blists - more mailing lists