Skip to content

Clarify black_box warning a bit #140341

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 9, 2025
Merged

Conversation

saethlin
Copy link
Member

@saethlin saethlin commented Apr 26, 2025

Trying to bring the docs on black_box more in line with the advice that we have discussed in Zulip.

#140341 (comment)

@rustbot
Copy link
Collaborator

rustbot commented Apr 26, 2025

r? @ibraheemdev

rustbot has assigned @ibraheemdev.
They will have a look at your PR within the next two weeks and either review your PR or reassign to another reviewer.

Use r? to explicitly pick a reviewer

@rustbot rustbot added S-waiting-on-review Status: Awaiting review from the assignee but also interested parties. T-libs Relevant to the library team, which will review and decide on the PR/issue. labels Apr 26, 2025
Comment on lines 325 to 328
/// You should not be able to write a better `black_box` than the standard library provides. If you
/// can write a function that looks like `black_box` but is more effective at hiding the value of
/// the argument from optimizations, that would be a bug and should be reported. It just would not
/// be a *security* bug.
Copy link
Member

@the8472 the8472 Apr 26, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if that's quite true. For example user code might choose to use FFI and setup linking to evade LTO, I don't think std/rustc is going to jump through those kinds of hoops since it can't control linking of generic instantiations.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps "you should not be able to use other parts of the standard library to write a better..." then?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure what you mean by evading LTO. If LTO can see through black_box it's already quite non-functional for benchmarking.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A weak blackbox implementation might prevent DCE of the input but not optimizations based on properties of the output value.

You can also replace LTO with other post-link optimizations such as wasm JIT and user code taking steps avoid that.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A JIT can break any black box so I'm not sure what point you are trying to make.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A JIT will have blind spots or even explicit escape hatches and you can make a targeted blackbox using those.

The point I'm making is that users may be "able to write a better black_box" under specific circumstances and the standard library won't adopt those.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A weak blackbox implementation might prevent DCE of the input but not optimizations based on properties of the output value.

that's an example where you could do better, and it would indeed be a buggy implementation that should be reported, as the docs say.

Copy link
Member

@the8472 the8472 Apr 26, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, I meant that as an example for a hypothetical backend or target where that's the best we can do.
E.g. by making a value "escape" to a static we could prevent DCE but the backend lacks a way to make the value opaque because it's a single-threaded closed-world environment that has no concept of MMIO or interactions with the environment outside the abstract machine other than special IO instructions, so even volatile would get lowered to plain stores and loads.

@Amanieu
Copy link
Member

Amanieu commented Apr 26, 2025

I think that talking about bugs confuses the message we are trying to send. What we really want to say is that there is no mechanism in the entire Rust language that can get you the guarantees you want for constant-time cryptography: you can't do better than black_box. This should be an additional paragraph in the warning box that warns about using black_box for crypto code.

@the8472
Copy link
Member

the8472 commented Apr 26, 2025

I think the subtlety here is that from a spec perspective all approaches are equal; they're not guaranteed, even asking the question is nonsense because the constant-time aspect is not considered an observable property etc. etc..
But the people who reach for these methods despite the warnings are ignoring the spec and care about actually generated compiler outputs.

And some other approaches such as FFI, assymbly or linker trickery just might achieve better results, under specific circumstances. So we can't really promise that this is the strongest possible implementation under all conditions.

Maybe something like

No identity function available through core is expected to fulfill all of the following conditions

  • is a stronger optimization barrier than black_box
  • has has no additional side-effects
  • only applies to the passed value

If such a function existed it would be used to implement black_box.

@Daniel-Aaron-Bloom
Copy link

Daniel-Aaron-Bloom commented Apr 26, 2025

I think that talking about bugs confuses the message we are trying to send.

I strongly disagree with this. If I'm writing a crypto library that is using black_box to hide a boolean inside a u8 to stop it from being turned into branches by the optimizer and I encounter some circumstance where black_box fails, but some other standard library approach succeeds (e.g. read_volatile), then I have a security bug that I have to fix by cobbling together my own custom_black_box. It would be nice if instead I could file a bug on the standard library and point to obvious language to support it as a bug, rather than a "too bad, so sad, won't fix".

I can't speak for everyone using rust for cryptography, but I think language that helps advocate for the above use case is really important.

@ibraheemdev
Copy link
Member

Going to pass this on to libs because it seems to be controversial. r? libs

@saethlin
Copy link
Member Author

saethlin commented May 2, 2025

I've replaced the diff with @Amanieu's suggestion, though I'd quite like to hear from anyone who manages to get the optimization-suppressing effect they want from a volatile read but not black_box.

@saethlin saethlin changed the title Note that it is a bug if you can write your own better black_box Clarify black_box warning a bit May 2, 2025
@RalfJung
Copy link
Member

RalfJung commented May 2, 2025

Cc @rust-lang/opsem

@Mark-Simulacrum
Copy link
Member

r=me with or without Ralf's wording.

And note that the same limitation applies to all LLVM-based compilers

Co-authored-by: Ralf Jung <[email protected]>
@saethlin
Copy link
Member Author

saethlin commented May 8, 2025

@bors r=Mark-Simulacrum rollup

@bors
Copy link
Collaborator

bors commented May 8, 2025

📌 Commit f501775 has been approved by Mark-Simulacrum

It is now in the queue for this repository.

@bors bors added S-waiting-on-bors Status: Waiting on bors to run and complete tests. Bors will change the label on completion. and removed S-waiting-on-review Status: Awaiting review from the assignee but also interested parties. labels May 8, 2025
matthiaskrgr added a commit to matthiaskrgr/rust that referenced this pull request May 8, 2025
…ulacrum

Clarify black_box warning a bit

Trying to bring the docs on black_box more in line with the advice that we have discussed in Zulip.

rust-lang#140341 (comment)
bors added a commit to rust-lang-ci/rust that referenced this pull request May 8, 2025
…iaskrgr

Rollup of 8 pull requests

Successful merges:

 - rust-lang#140095 (Eliminate `word_and_empty` methods.)
 - rust-lang#140341 (Clarify black_box warning a bit)
 - rust-lang#140684 (Only include `dyn Trait<Assoc = ...>` associated type bounds for `Self: Sized` associated types if they are provided)
 - rust-lang#140707 (Structurally normalize in range pattern checking in HIR typeck)
 - rust-lang#140716 (Improve `-Zremap-path-scope` tests with dependency)
 - rust-lang#140800 (Make `rustdoc-tempdir-removal` run-make tests work on other platforms than linux)
 - rust-lang#140802 (Add release notes for 1.87.0)
 - rust-lang#140811 (Enable triagebot note functionality for rust-lang/rust)

r? `@ghost`
`@rustbot` modify labels: rollup
@bors bors merged commit 32e3207 into rust-lang:master May 9, 2025
6 checks passed
@rustbot rustbot added this to the 1.88.0 milestone May 9, 2025
rust-timer added a commit to rust-lang-ci/rust that referenced this pull request May 9, 2025
Rollup merge of rust-lang#140341 - saethlin:black-box-qoi, r=Mark-Simulacrum

Clarify black_box warning a bit

Trying to bring the docs on black_box more in line with the advice that we have discussed in Zulip.

rust-lang#140341 (comment)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
S-waiting-on-bors Status: Waiting on bors to run and complete tests. Bors will change the label on completion. T-libs Relevant to the library team, which will review and decide on the PR/issue.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

10 participants