|
Message-ID: <CAGXu5jJVSG7ZuftTRGZjgKqetpmxNpeqwxAzhY8BJ4_H-oUw5w@mail.gmail.com> Date: Mon, 12 Mar 2018 10:17:41 -0700 From: Kees Cook <keescook@...omium.org> To: Linus Torvalds <torvalds@...ux-foundation.org> Cc: Ingo Molnar <mingo@...nel.org>, P J P <pjp@...oraproject.org>, Florian Weimer <fweimer@...hat.com>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, Steven Rostedt <rostedt@...dmis.org>, Arnd Bergmann <arnd@...db.de>, Daniel Micay <danielmicay@...il.com>, Dave Hansen <dave.hansen@...ux.intel.com>, Alexander Popov <alex.popov@...ux.com>, Kernel Hardening <kernel-hardening@...ts.openwall.com>, PaX Team <pageexec@...email.hu>, Brad Spengler <spender@...ecurity.net>, Andy Lutomirski <luto@...nel.org>, Tycho Andersen <tycho@...ho.ws>, Laura Abbott <labbott@...hat.com>, Mark Rutland <mark.rutland@....com>, Borislav Petkov <bp@...en8.de>, Richard Sandiford <richard.sandiford@....com>, Thomas Gleixner <tglx@...utronix.de>, "H . Peter Anvin" <hpa@...or.com>, Peter Zijlstra <a.p.zijlstra@...llo.nl>, "Dmitry V . Levin" <ldv@...linux.org>, Emese Revfy <re.emese@...il.com>, Jonathan Corbet <corbet@....net>, Andrey Ryabinin <aryabinin@...tuozzo.com>, "Kirill A . Shutemov" <kirill.shutemov@...ux.intel.com>, Thomas Garnier <thgarnie@...gle.com>, Andrew Morton <akpm@...ux-foundation.org>, Alexei Starovoitov <ast@...nel.org>, Josef Bacik <jbacik@...com>, Masami Hiramatsu <mhiramat@...nel.org>, Nicholas Piggin <npiggin@...il.com>, Al Viro <viro@...iv.linux.org.uk>, "David S . Miller" <davem@...emloft.net>, Ding Tianhong <dingtianhong@...wei.com>, David Woodhouse <dwmw@...zon.co.uk>, Josh Poimboeuf <jpoimboe@...hat.com>, Dominik Brodowski <linux@...inikbrodowski.net>, Juergen Gross <jgross@...e.com>, Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Dan Williams <dan.j.williams@...el.com>, Mathias Krause <minipli@...glemail.com>, Vikas Shivappa <vikas.shivappa@...ux.intel.com>, Kyle Huey <me@...ehuey.com>, Dmitry Safonov <dsafonov@...tuozzo.com>, Will Deacon <will.deacon@....com>, X86 ML <x86@...nel.org>, LKML <linux-kernel@...r.kernel.org> Subject: Re: Fully initialized stack usage (was Re: [PATCH RFC v9 4/7] x86/entry: Erase kernel stack in syscall_trace_enter()) On Mon, Mar 12, 2018 at 10:09 AM, Linus Torvalds <torvalds@...ux-foundation.org> wrote: > On Mon, Mar 12, 2018 at 9:42 AM, Kees Cook <keescook@...omium.org> wrote: >> - initialization _must include structure padding_. Without this, we're >> only solving part of the exposure. Does -finit-local-vars do this? > > Good point. It uses build_constructor() with an empty constructor, so > it *should* be 100% equivalent to > > struct xyz var = { }; > > if I understand correctly, but I'm not sure what that will do with padding. AIUI, this does not guarantee padding initialization (yet another "undefined behavior"). This is why we've had to sprinkle memset(&var, 0, sizeof(var)) in places where a structure has padding and got leaked. :( I assume this may be orthogonal to -finit-local-vars, and maybe we'll need some -finit-padding or something. (Though, honestly, is there anyone that wants to get _padding_ correct, but not variable initialization?) >> - Can we retain the uninitialized variable usage warning? (with an >> updated text; maybe "variable used without explicit initialization, >> using zero-initialization"?) > > I think that fundamentally goes away, because all later phases see > fully initialized state. I'm fine with it going away, though I share Jeff Law's observation in Florian's gcc thread that we lose some potentially useful warnings ("oops, it took a while to track down this bug, since that variable had been zero initialized; I wish I knew that had happened", etc.) And when the kernel entirely depends on auto-zero-init, we could just add -Wno-maybe-uninitialized. *shrug* -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.