@@ -191,7 +191,8 @@ Shadow byte legend (one shadow byte represents 8 application bytes):
191
191
192
192
The LLVM Control Flow Integrity (CFI) support in the Rust compiler initially
193
193
provides forward-edge control flow protection for Rust-compiled code only by
194
- aggregating function pointers in groups identified by their number of arguments.
194
+ aggregating function pointers in groups identified by their return and parameter
195
+ types.
195
196
196
197
Forward-edge control flow protection for C or C++ and Rust -compiled code " mixed
197
198
binaries" (i.e., for when C or C++ and Rust -compiled code share the same
@@ -243,7 +244,7 @@ fn do_twice(f: fn(i32) -> i32, arg: i32) -> i32 {
243
244
fn main () {
244
245
let answer = do_twice(add_one, 5);
245
246
246
- println! (" The answer is: {answer} " );
247
+ println! (" The answer is: {} " , answer );
247
248
248
249
println! (" With CFI enabled, you should not see the next answer" );
249
250
let f: fn(i32) -> i32 = unsafe {
@@ -253,30 +254,30 @@ fn main() {
253
254
};
254
255
let next_answer = do_twice(f, 5);
255
256
256
- println! (" The next answer is: {next_answer} " );
257
+ println! (" The next answer is: {} " , next_answer );
257
258
}
258
259
` ` `
259
260
Fig. 1. Modified example from the [Advanced Functions and
260
261
Closures][rust-book-ch19-05] chapter of the [The Rust Programming
261
262
Language][rust-book] book.
262
263
263
- [//]: # (FIXME: Replace with output from cargo using nightly when #89652 is merged)
264
-
265
264
` ` ` shell
266
- $ rustc rust_cfi.rs -o rust_cfi
267
- $ ./rust_cfi
265
+ $ cargo run --release
266
+ Compiling rust-cfi-1 v0.1.0 (/home/rcvalle/rust-cfi-1)
267
+ Finished release [optimized] target(s) in 0.76s
268
+ Running ` target/release/rust-cfi-1`
268
269
The answer is: 12
269
270
With CFI enabled, you should not see the next answer
270
271
The next answer is: 14
271
272
$
272
273
` ` `
273
274
Fig. 2. Build and execution of the modified example with LLVM CFI disabled.
274
275
275
- [//]: # (FIXME: Replace with output from cargo using nightly when #89652 is merged)
276
-
277
276
` ` ` shell
278
- $ rustc -Clto -Zsanitizer=cfi rust_cfi.rs -o rust_cfi
279
- $ ./rust_cfi
277
+ $ RUSTFLAGS=" -Zsanitizer=cfi -Cembed-bitcode=yes -Clto" cargo run --release
278
+ Compiling rust-cfi-1 v0.1.0 (/home/rcvalle/rust-cfi-1)
279
+ Finished release [optimized] target(s) in 3.39s
280
+ Running ` target/release/rust-cfi-1`
280
281
The answer is: 12
281
282
With CFI enabled, you should not see the next answer
282
283
Illegal instruction
@@ -306,37 +307,37 @@ fn do_twice(f: fn(i32) -> i32, arg: i32) -> i32 {
306
307
fn main () {
307
308
let answer = do_twice(add_one, 5);
308
309
309
- println! (" The answer is: {answer} " );
310
+ println! (" The answer is: {} " , answer );
310
311
311
312
println! (" With CFI enabled, you should not see the next answer" );
312
313
let f: fn(i32) -> i32 =
313
314
unsafe { mem::transmute::< * const u8, fn(i32) -> i32> (add_two as * const u8) };
314
315
let next_answer = do_twice(f, 5);
315
316
316
- println! (" The next answer is: {next_answer} " );
317
+ println! (" The next answer is: {} " , next_answer );
317
318
}
318
319
` ` `
319
320
Fig. 4. Another modified example from the [Advanced Functions and
320
321
Closures][rust-book-ch19-05] chapter of the [The Rust Programming
321
322
Language][rust-book] book.
322
323
323
- [//]: # (FIXME: Replace with output from cargo using nightly when #89652 is merged)
324
-
325
324
` ` ` shell
326
- $ rustc rust_cfi.rs -o rust_cfi
327
- $ ./rust_cfi
325
+ $ cargo run --release
326
+ Compiling rust-cfi-2 v0.1.0 (/home/rcvalle/rust-cfi-2)
327
+ Finished release [optimized] target(s) in 0.76s
328
+ Running ` target/release/rust-cfi-2`
328
329
The answer is: 12
329
330
With CFI enabled, you should not see the next answer
330
331
The next answer is: 14
331
332
$
332
333
` ` `
333
334
Fig. 5. Build and execution of the modified example with LLVM CFI disabled.
334
335
335
- [//]: # (FIXME: Replace with output from cargo using nightly when #89652 is merged)
336
-
337
336
` ` ` shell
338
- $ rustc -Clto -Zsanitizer=cfi rust_cfi.rs -o rust_cfi
339
- $ ./rust_cfi
337
+ $ RUSTFLAGS=" -Zsanitizer=cfi -Cembed-bitcode=yes -Clto" cargo run --release
338
+ Compiling rust-cfi-2 v0.1.0 (/home/rcvalle/rust-cfi-2)
339
+ Finished release [optimized] target(s) in 3.38s
340
+ Running ` target/release/rust-cfi-2`
340
341
The answer is: 12
341
342
With CFI enabled, you should not see the next answer
342
343
Illegal instruction
@@ -346,14 +347,69 @@ Fig. 6. Build and execution of the modified example with LLVM CFI enabled.
346
347
347
348
When LLVM CFI is enabled, if there are any attempts to change/hijack control
348
349
flow using an indirect branch/call to a function with different number of
349
- arguments than intended/passed in the call/branch site, the execution is also
350
- terminated (see Fig. 6).
351
-
352
- Forward-edge control flow protection not only by aggregating function pointers
353
- in groups identified by their number of arguments, but also their argument
354
- types, will also be provided in later work by defining and using compatible type
355
- identifiers (see Type metadata in the design document in the tracking
356
- issue [# 89653](https://github.com/rust-lang/rust/issues/89653)).
350
+ parameters than arguments intended/passed in the call/branch site, the
351
+ execution is also terminated (see Fig. 6).
352
+
353
+ ` ` ` rust
354
+ use std::mem;
355
+
356
+ fn add_one(x: i32) -> i32 {
357
+ x + 1
358
+ }
359
+
360
+ fn add_two(x: i64) -> i64 {
361
+ x + 2
362
+ }
363
+
364
+ fn do_twice(f: fn(i32) -> i32, arg: i32) -> i32 {
365
+ f(arg) + f(arg)
366
+ }
367
+
368
+ fn main () {
369
+ let answer = do_twice(add_one, 5);
370
+
371
+ println! (" The answer is: {}" , answer);
372
+
373
+ println! (" With CFI enabled, you should not see the next answer" );
374
+ let f: fn(i32) -> i32 =
375
+ unsafe { mem::transmute::< * const u8, fn(i32) -> i32> (add_two as * const u8) };
376
+ let next_answer = do_twice(f, 5);
377
+
378
+ println! (" The next answer is: {}" , next_answer);
379
+ }
380
+ ` ` `
381
+ Fig. 7. Another modified example from the [Advanced Functions and
382
+ Closures][rust-book-ch19-05] chapter of the [The Rust Programming
383
+ Language][rust-book] book.
384
+
385
+ ` ` ` shell
386
+ cargo run --release
387
+ Compiling rust-cfi-3 v0.1.0 (/home/rcvalle/rust-cfi-3)
388
+ Finished release [optimized] target(s) in 0.74s
389
+ Running ` target/release/rust-cfi-3`
390
+ The answer is: 12
391
+ With CFI enabled, you should not see the next answer
392
+ The next answer is: 14
393
+ $
394
+ ` ` `
395
+ Fig. 8. Build and execution of the modified example with LLVM CFI disabled.
396
+
397
+ ` ` ` shell
398
+ $ RUSTFLAGS=" -Zsanitizer=cfi -Cembed-bitcode=yes -Clto" cargo run --release
399
+ Compiling rust-cfi-3 v0.1.0 (/home/rcvalle/rust-cfi-3)
400
+ Finished release [optimized] target(s) in 3.40s
401
+ Running ` target/release/rust-cfi-3`
402
+ The answer is: 12
403
+ With CFI enabled, you should not see the next answer
404
+ Illegal instruction
405
+ $
406
+ ` ` `
407
+ Fig. 9. Build and execution of the modified example with LLVM CFI enabled.
408
+
409
+ When LLVM CFI is enabled, if there are any attempts to change/hijack control
410
+ flow using an indirect branch/call to a function with different return and
411
+ parameter types than the return type expected and arguments intended/passed in
412
+ the call/branch site, the execution is also terminated (see Fig. 9).
357
413
358
414
[rust-book-ch19-05]: https://doc.rust-lang.org/book/ch19-05-advanced-functions-and-closures.html
359
415
[rust-book]: https://doc.rust-lang.org/book/title-page.html
0 commit comments