|
Message-ID: <CA+=Sn1kSg-Y8SseUWPTTJi5HRgYYxVtcDGUJvCcCYQQzKeiUQw@mail.gmail.com> Date: Thu, 30 May 2019 10:09:44 -0700 From: Andrew Pinski <pinskia@...il.com> To: Tycho Andersen <tycho@...ho.ws> Cc: GCC Mailing List <gcc@....gnu.org>, kernel-hardening@...ts.openwall.com Subject: Re: unrecognizable insn generated in plugin? On Thu, May 30, 2019 at 10:01 AM Tycho Andersen <tycho@...ho.ws> wrote: > > Hi all, > > I've been trying to implement an idea Andy suggested recently for > preventing some kinds of ROP attacks. The discussion of the idea is > here: > https://lore.kernel.org/linux-mm/DFA69954-3F0F-4B79-A9B5-893D33D87E51@amacapital.net/ > > Right now I'm struggling to get my plugin to compile without crashing. The > basic idea is to insert some code before every "pop rbp" and "pop rsp"; I've > figured out how to find these instructions, and I'm inserting code using: > > emit_insn(gen_rtx_XOR(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM), > gen_rtx_MEM(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM)))); Simplely this xor does not set anything. I think you want something like: emit_insn(gen_rtx_SET(gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM), gen_rtx_XOR(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM), gen_rtx_MEM(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM))))); But that might not work either, you might need some thing more. Thanks, Andrew Pinski > > The plugin completes successfully, but GCC complains later, > > kernel/seccomp.c: In function ‘seccomp_check_filter’: > kernel/seccomp.c:242:1: error: unrecognizable insn: > } > ^ > (insn 698 645 699 17 (xor:DI (reg:DI 6 bp) > (mem:DI (reg:DI 6 bp) [0 S8 A8])) "kernel/seccomp.c":242 -1 > (nil)) > during RTL pass: shorten > kernel/seccomp.c:242:1: internal compiler error: in insn_min_length, at config/i386/i386.md:14714 > > I assume this is because some internal metadata is screwed up, but I have no > clue as to what that is or how to fix it. My gcc version is 8.3.0, and > config/i386/i386.md:14714 of that tag looks mostly unrelated. > > I had problems earlier because I was trying to run it after *clean_state which > is the thing that does init_insn_lengths(), but now I'm running it after > *stack_regs, so I thought it should be ok... > > Anyway, the full plugin draft is below. You can run it by adding > CONFIG_GCC_PLUGIN_HEAPLEAP=y to your kernel config. > > Thanks! > > Tycho > > > From 83b0631f14784ce11362ebd64e40c8d25c0decee Mon Sep 17 00:00:00 2001 > From: Tycho Andersen <tycho@...ho.ws> > Date: Fri, 19 Apr 2019 19:24:58 -0600 > Subject: [PATCH] heapleap > > Signed-off-by: Tycho Andersen <tycho@...ho.ws> > --- > scripts/Makefile.gcc-plugins | 8 ++ > scripts/gcc-plugins/Kconfig | 4 + > scripts/gcc-plugins/heapleap_plugin.c | 189 ++++++++++++++++++++++++++ > 3 files changed, 201 insertions(+) > > diff --git a/scripts/Makefile.gcc-plugins b/scripts/Makefile.gcc-plugins > index 5f7df50cfe7a..283b81dc5742 100644 > --- a/scripts/Makefile.gcc-plugins > +++ b/scripts/Makefile.gcc-plugins > @@ -44,6 +44,14 @@ ifdef CONFIG_GCC_PLUGIN_ARM_SSP_PER_TASK > endif > export DISABLE_ARM_SSP_PER_TASK_PLUGIN > > +gcc-plugin-$(CONFIG_GCC_PLUGIN_HEAPLEAP) += heapleap_plugin.so > +gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_HEAPLEAP) \ > + += -DHEAPLEAP_PLUGIN > +ifdef CONFIG_GCC_PLUGIN_HEAPLEAP > + DISABLE_HEAPLEAP_PLUGIN += -fplugin-arg-heapleap_plugin-disable > +endif > +export DISABLE_HEAPLEAP_PLUGIN > + > # All the plugin CFLAGS are collected here in case a build target needs to > # filter them out of the KBUILD_CFLAGS. > GCC_PLUGINS_CFLAGS := $(strip $(addprefix -fplugin=$(objtree)/scripts/gcc-plugins/, $(gcc-plugin-y)) $(gcc-plugin-cflags-y)) > diff --git a/scripts/gcc-plugins/Kconfig b/scripts/gcc-plugins/Kconfig > index 74271dba4f94..491b9cd5df1a 100644 > --- a/scripts/gcc-plugins/Kconfig > +++ b/scripts/gcc-plugins/Kconfig > @@ -226,4 +226,8 @@ config GCC_PLUGIN_ARM_SSP_PER_TASK > bool > depends on GCC_PLUGINS && ARM > > +config GCC_PLUGIN_HEAPLEAP > + bool "Prevent 'pop esp' type instructions from loading an address in the heap" > + depends on GCC_PLUGINS > + > endif > diff --git a/scripts/gcc-plugins/heapleap_plugin.c b/scripts/gcc-plugins/heapleap_plugin.c > new file mode 100644 > index 000000000000..5051b96d79f4 > --- /dev/null > +++ b/scripts/gcc-plugins/heapleap_plugin.c > @@ -0,0 +1,189 @@ > +/* > + * This is based on an idea from Andy Lutomirski described here: > + * https://lore.kernel.org/linux-mm/DFA69954-3F0F-4B79-A9B5-893D33D87E51@amacapital.net/ > + * > + * unsigned long offset = *rsp - rsp; > + * offset >>= THREAD_SHIFT; > + * if (unlikely(offset)) > + * BUG(); > + * POP RSP; > + */ > + > +#include "gcc-common.h" > + > +__visible int plugin_is_GPL_compatible; > +static bool disable = false; > + > +static struct plugin_info heapleap_plugin_info = { > + .version = "1", > + .help = "disable\t\tdo not activate the plugin\n" > +}; > + > +static bool heapleap_gate(void) > +{ > + tree section; > + > + /* > + * Similar to stackleak, we only do this for user code for now. > + */ > + section = lookup_attribute("section", > + DECL_ATTRIBUTES(current_function_decl)); > + if (section && TREE_VALUE(section)) { > + section = TREE_VALUE(TREE_VALUE(section)); > + > + if (!strncmp(TREE_STRING_POINTER(section), ".init.text", 10)) > + return false; > + if (!strncmp(TREE_STRING_POINTER(section), ".devinit.text", 13)) > + return false; > + if (!strncmp(TREE_STRING_POINTER(section), ".cpuinit.text", 13)) > + return false; > + if (!strncmp(TREE_STRING_POINTER(section), ".meminit.text", 13)) > + return false; > + } > + > + return !disable; > +} > + > +/* > + * Check that: > + * > + * unsigned long offset = *rbp - rbp; > + * offset >>= THREAD_SHIFT; > + * if (unlikely(offset)) > + * BUG(); > + * pop rbp; > + * > + * (we should probably do the same for rsp?) > + */ > +static void heapleap_add_check(rtx_insn *insn) > +{ > + rtx_insn *seq_head; > + > + fprintf(stderr, "adding heapleap check\n"); > + print_rtl_single(stderr, insn); > + > + start_sequence(); > + > + /* xor ebp [ebp] */ > + emit_insn(gen_rtx_XOR(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM), > + gen_rtx_MEM(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM)))); > + > + /* ebp >> THREAD_SHIFT */ > + /* > + * TODO: THREAD_SHIFT isn't defined for every arch, including x86. > + * THREAD_SIZE for x86_64 is 4096 * 2, so THREAD_SHIFT would be 13 > + * there. We should at least compute this from THREAD_SIZE though. > + */ > + emit_insn(gen_rtx_LSHIFTRT(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM), > + GEN_INT(13))); > + > + /* > + * We're inserting right before the final pass, and we're adding some > + * kind of jump, thus splitting the basic block that is the epilogue. > + * That probably causes problems, and currently gcc crashes when doing > + * the final pass after we emit this, so we probably need to do better. > + */ > + emit_insn(gen_rtx_IF_THEN_ELSE(DImode, > + gen_rtx_NE(DImode, > + gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM), > + GEN_INT(0)), > + /* > + * we're really not supposed to BUG() for this stuff; > + * maybe we should figure out how to call WARN()? might > + * be painful. > + */ > + gen_ud2(), > + /* poor man's no-op, i.e. how do i do this better? */ > + gen_rtx_SET(gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM), > + gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM)))); > + seq_head = get_insns(); > + end_sequence(); > + > + emit_insn_before(seq_head, insn); > +} > + > +static unsigned int heapleap_execute(void) > +{ > + rtx_insn *insn, *next; > + > + if (strcmp(IDENTIFIER_POINTER(DECL_NAME(cfun->decl)), "seccomp_check_filter")) > + return 0; > + > + for (insn = get_insns(); insn; insn = next) { > + rtx body, set, lhs, rhs; > + int i; > + > + next = NEXT_INSN(insn); > + if (!next) > + continue; > + > + if (!RTX_FRAME_RELATED_P(next) || !NONJUMP_INSN_P(next)) > + continue; > + > + /* > + * I don't understand why we need this; but PATTERN(insn) is a > + * CODE_LABEL, so... > + */ > + body = XEXP(insn, 1); > + set = PATTERN(body); > + if (GET_CODE(set) != SET) > + continue; > + > + /* TODO: use SET_DEST() here instead? */ > + lhs = XEXP(set, 0); > + /* TODO: ebp vs esp? esp only occurs twice in my linked kernel */ > + if (GET_CODE(lhs) != REG || REGNO(lhs) != HARD_FRAME_POINTER_REGNUM) > + continue; > + > + /* TODO: use SET_SRC() here instead? */ > + rhs = XEXP(set, 1); > + if (GET_CODE(rhs) != MEM) > + continue; > + > + heapleap_add_check(next); > + } > + > + return 0; > +} > + > +#define PASS_NAME heapleap > +#include "gcc-generate-rtl-pass.h" > + > +__visible int plugin_init(struct plugin_name_args *plugin_info, > + struct plugin_gcc_version *version) > +{ > + const char * const plugin_name = plugin_info->base_name; > + const int argc = plugin_info->argc; > + const struct plugin_argument * const argv = plugin_info->argv; > + int i; > + > + /* > + * *clean_state is the pass that does init_insn_lengths(), so we can't > + * do anything after this, because gcc fails there's not a length for > + * every instruction in the final pass > + */ > + PASS_INFO(heapleap, "*stack_regs", 1, PASS_POS_INSERT_AFTER); > + > + if (!plugin_default_version_check(version, &gcc_version)) { > + error(G_("incompatible gcc/plugin versions")); > + return 1; > + } > + > + for (i = 0; i < argc; i++) { > + if (!strcmp(argv[i].key, "disable")) { > + disable = true; > + return 0; > + } else { > + error(G_("unknown option '-fplugin-arg-%s-%s'"), > + plugin_name, argv[i].key); > + return 1; > + } > + } > + > + register_callback(plugin_name, PLUGIN_INFO, NULL, > + &heapleap_plugin_info); > + > + register_callback(plugin_name, PLUGIN_PASS_MANAGER_SETUP, NULL, > + &heapleap_pass_info); > + return 0; > +} > -- > 2.20.1 >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.