-
Notifications
You must be signed in to change notification settings - Fork 571
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Split PV typemap into mutable and immutable #23150
base: blead
Are you sure you want to change the base?
Conversation
884d894
to
eb6f169
Compare
int isHASH | ||
const char * dbtype | ||
int flags | ||
int mode |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe rmv white space only changes on unrelated lines? makes future git blames confusing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The variables are aligned, I'm keeping that alignment here.
Did you try a core smoke with a perl interp built with that linux-only nobody-uses-it hardware-RO-const-from-malloc SVPV COW buffers feature? I've never heard of anyone using it but it exists in core interp src code. The interp build flag feature sounds very good but that feature is always off (assert-like) AFAIK b/c of slow-ness of continuously asking the ring 0 kernel to flip your RWX bits MMU bits. I made a branch but never finished it where I made Remember, in many many places, So currently there is P5P written/maint code (did a git blame) somewhere inside 5.41 code that does
or maybe it pointlessly (code rot) does
or
So if some core P5P person commit that to a core .c interp blead somewhere in the last 10-20 years, very rarely its gonna appear, in CPAN XS or private XS b/c statistics and nobody is perfect. But its guaranteed it will appear again atleast 1x over the next 40 years. A dev could bikeshed a 1 byte In any case,
IMO all of these are invalid regarding Perl C. Ask for 0 bytes? You get 0 bytes! The person didn't execute
is a CVE attempt or something b/c a not null-terminated SVPV was just introduced into the VM and will start to circulate, and I doubt the end user is creating a 1 byte long C struct to pass to a 3rd part clib that doesn't need a wasteful extra secret '\0' byte and call it an optimization attempt. Last sentence is a BIG problem with Perl XS/CORE's API, when someone wants to store a 16 byte C struct in SvPVX(), and core's public API turns that into 32 byte long buffers, and wastes 16 bytes at time, over and over. But back to this PR, changing CPAN XS public API, to start blindly executing More research is needed with "average" or "typical" PP production quality code, and "average" or "typical" CPAN XS modules to see how
There are few people crazy (me)/rare enough to type
In 5.41 git repo, there is ZERO, NO, NADA usage of macro
It really should be (not perfect ahead, please debate)
so libc So summary, some more thinking or answers, or opinion, are needed on topics
|
I know Father C wrote and used it when he worked on COW.
I think it uses a spectacular amount of RAM because it needs a full page for every allocation, and really slow because that really trashes the MMU. Great for debugging, absolutely unusable in production.
There is the |
Passing SVt_IV/SVt_NV is 80% safe but does 20% random random heap corruption/bc Remember NC refactored SV heads from 3 members to the 4 we know now around 5.9.3.
What do the
So also GP* and RV*are permanently conflicted with SVPV's There are a bunch of issues big small or non-issues with |
I like the change, but I'd expect it to break silly amounts of modules, especially old ones that aren't maintained any more. |
what do you think of adding a XS/C side analog of https://perldoc.perl.org/warnings or the formal https://perldoc.perl.org/warnings PP API having warning options that DIRECTLY only affect execution of XSUBs/C funcs/machine code, not PP OP* bytecode? Basically macros SvPV() and SvPV_nolen() become 1x self latching STDERR console warnings without
? I can sort of implement high-ish performance hardware RO/MMU controlled, bad-write protection COW for Win32/Win64 only if someone really wants or I find a reason to need it for personal reasons. The backend ntdll.dll Rtl*() funcs behind MS's HeapAlloc/HeapCreate, do have optional hardware read-only protection that can be flipped on and off 4KB aka HeapSize() aka msize() at a time through certain undocumented highish-level ntdll.dll Rtl*() features. Either by the minimally public API documented middle (2nd) flag arg, or dedicated Rtl*() function calls. Its not the MS public API "page heap" feature which gives a dedicated 4 KB VM block to a 1 byte long malloc()/HeapAlloc() request. This PR also brings up big BIG criticism from certain former perl devs on how Perl SVPV COW in 2014, and Perl's HEK* in the Nicholas Clark/JHI era were implemented. The flaw is by keeping the constantly runtime ++ing --ing refcount integers, right next to the PV buffer, in address space, its impossible to implement hardware const/RO protection to PP-level/PP-lang/XS-level/C-leve constant SVPV/HE/HEK strings. Twice in the last 15 years, forks of Perl, changed the current P5P HEK struct's I32 refcount field, to a POINTER to a I32 refcount. I think in my "SHEK" PR/branch which is still open right now, but is sorta out of date, ever since Doing the above probably kills 90% the runtime RW->R->RW->R->RW kernel ring-0 mprotect calls, HEKs/SHEKs/GHEKs usually live for the rest of the perl process lifetime since they almost always represent the PP optree and I have a hypothesis, that a very basic and very simple capture of the first 2 bytes and last 2 bytes, [some logic omited], of the PV buffer, inside the HEK or max 255 RC SVPV COW, then constant comparison and runtime asserting, of that U32, against PP visible first and last 2 bytes, could benchmark to 0 runtime overhead, but provide 99% of the same protection against accidentally bad XS modules on CPAN. But my hypothesis/proposal has 0% protection against malicious XS modules on CPAN but those are never a design consideration for any end user PP/C/XS code written for the Perl 5 interp b/c day 1 fundamental design reasons of the Perl 5 interp/lang reasons. https://metacpan.org/pod/Safe is long since been declared obsolete and useless. PP Taint probably too. And https://perldoc.perl.org/perlsecpolicy#Feeding-untrusted-code-to-the-interpreter has (day 1?) said kernel ring-0 aka vmware aka ulimit aka docker aka WinKernel's ACLs/Job API are the only ways to deal with CVEs/bug bounty/blackhat PP or XS code. Google V8's blackhat-proof guarantee and Chrome's W3C blackhat-proof guarantees are N/A for Perl ecosystem. Remember NodeJS doesn't have that guarantee and the NodeJS interp the exact same "Arbitrary Machine Code Execution" exploit that Perl 5 and ISO C have 😇 Also remember Google V8's blackhat-proof guarantee requires CC build time disabling (compile out) of JIT/JS string eval/machine codegen inside the jail-ed V8 interp binary, and loading pre-compiled V8 bytecode/V8 machine code/V8 ELF .so'es from disk that were made in another full service V8 interpreter. And Chrome doesn't even trust V8's blackhat proof-ness anyways and always runs unsafe WWW https:// .js src code in a super OS-level restricted 2nd (3rd/4th/etc) OS process with just a single unix domain socket doing RPC between 2 chrome.exe OS processes. Gotta go back to basic Jan 1 1970 C POSIX security design rules and HW MMU protection. Don't trust your human programmers regardless of resume and salary. Escaping the sandbox is a Tovalds or Intel problem, not a Google or P5P's problem. I agree. A Perl interp core attempt at a high performance hardware RO MMU protected COW implementation should be tried and benchmarked, and see what happens, maybe first 2 bytes and last 2 bytes will work perfect. Maybe NtVirtualMemoryAdjust() and mprotect() take 2-9 micro seconds (20, 200, or 2000 hertz), not 200 or 900 microseconds (0.2/0.9 milliseconds, aka eternity) to flip the CPU's page table. Maybe take a Firefox/Trident Edge 11 technique, and keep 2 separate mmap views or virtual address space views to Perl's "legacy" HEKs and SVPV max 255 COWs. This has 0 bytes of phy ram or page file overhead on Windows and Linux. Perl C API's RC++ RC-- macros know the secret, but macros SvPV() and SvPVX() and 100% of CPAN XS authors don't know the secret and all 3 instantly SEGV 100% of the time guaranteed. |
This splits the current string typemap into a mutable and an immutable variant. This will make a bunch of XS code do the right thing with COW strings.
However, this can also break old-fashioned XS code whose arguments aren't marked
const
properly. As is evidenced by the fast that it broke 11 modules in core. This may break "a few things" on CPAN as well.