How is this different from tools like Valgrind and Address Sanitizer?
How is this different from tools like Valgrind and Address Sanitizer?
Posted Oct 28, 2025 19:55 UTC (Tue) by oldnpastit (subscriber, #95303)Parent article: Fil-C: A memory-safe C implementation
Posted Oct 28, 2025 20:28 UTC (Tue)
by bertschingert (subscriber, #160729)
[Link]
But it would seem to be more robust than ASAN; from reading about how ASAN works, it seems that it puts "poisoned" bytes around an allocation, so that memory accesses shortly after the end of a buffer hit those poisoned bytes and are caught. However, ASAN wouldn't catch an invalid access to a non-poisoned address of memory via a particular a pointer, if that address was allocated in a separate allocation. [1]
I assume Fil-C's pointer capability model is able to catch "provenance" violations like that.
[1] https://blog.gistre.epita.fr/posts/benjamin.peter-2022-10...
Posted Oct 28, 2025 20:33 UTC (Tue)
by excors (subscriber, #95769)
[Link] (3 responses)
> Fil-C is engineered to prevent memory safety bugs from being used for exploitation rather than just simply flagging them often enough to find bugs. This makes Fil-C different from AddressSanitizer, HWAsan, or MTE, which can all be bypassed by attackers. The key difference that makes this possible is that Fil-C is capability based (so each pointer knows what range of memory it may access, and how it may access it) rather than tag based (where pointer accesses are allowed if they hit valid memory).
Clang says "AddressSanitizer's runtime was not developed with security-sensitive constraints in mind and may compromise the security of the resulting executable", so it should not be used in production.
Valgrind has much worse performance (the manual claims 10-50x slowdown, plus it's effectively single-threaded), which is probably bad enough to make it unusable in production, and similarly will miss many memory safety bugs.
Posted Oct 28, 2025 21:26 UTC (Tue)
by cyperpunks (subscriber, #39406)
[Link] (2 responses)
Posted Oct 29, 2025 4:57 UTC (Wed)
by Cyberax (✭ supporter ✭, #52523)
[Link] (1 responses)
It's somewhat analogous to compiling C into WebAssembly and then JIT-compiling WebAssembly.
The amazing thing is that it preserves most of C/C++ semantics.
Posted Oct 29, 2025 5:53 UTC (Wed)
by willmo (subscriber, #82093)
[Link]
But (at least WRT memory safety) only the semantics of the abstract machine described by the language standards, and not the additional semantics (aka undefined behavior) of the straightforward mappings to typical hardware that we’re all accustomed to.
Very cool idea. :-)
How is this different from tools like Valgrind and Address Sanitizer?
How is this different from tools like Valgrind and Address Sanitizer?
How is this different from tools like Valgrind and Address Sanitizer?
How is this different from tools like Valgrind and Address Sanitizer?
How is this different from tools like Valgrind and Address Sanitizer?
