So far only a per thread canary in the TLS block is supported. This patch adds support for a global canary, too. For this the new option -mstack-protector-guard={global,tls} is added which defaults to tls.
The global canary is expected at symbol __stack_chk_guard which means for a function prologue instructions larl/l(g)fr + mvc are emitted and for an epilogue larl/l(g)fr + clc. Furthermore, option -mstack-protector-guard-record is added which is inspired by -mrecord-mcount and generates section __stack_protector_loc containing pointers to all instructions which load the address of the global guard. Thus, this option has only an effect in conjunction with -mstack-protector-guard=global. The intended use is for the Linux kernel in order to support run-time patching. In each task_struct of the kernel a canary is held which will be copied into the lowcore. Since the kernel supports migration of the lowcore, addresses are not necessarily constant. Therefore, the kernel expects that all instructions loading the address of the canary to be of format RIL or more precisely are either larl or lgrl and that the instructions addresses are recorded in section __stack_protector_loc. The kernel is then required to patch those instructions e.g. to llilf, prior first execution or whenever the lowcore moves. In total this means -mstack-protector-guard=global emits code suitable for user and kernel space. gcc/ChangeLog: * config/s390/s390-opts.h (enum stack_protector_guard): Define SP_TLS and SP_GLOBAL. * config/s390/s390.h (TARGET_SP_GLOBAL_GUARD): Define predicate. (TARGET_SP_TLS_GUARD): Define predicate. * config/s390/s390.md (stack_protect_global_guard_addr<mode>): New insn. (stack_protect_set): Also deal with a global guard. (stack_protect_test): Also deal with a global guard. * config/s390/s390.opt (-mstack-protector-guard={global,tls}): New option. (-mstack-protector-guard-record) New option. gcc/testsuite/ChangeLog: * gcc.target/s390/stack-protector-guard-global-1.c: New test. * gcc.target/s390/stack-protector-guard-global-2.c: New test. * gcc.target/s390/stack-protector-guard-global-3.c: New test. * gcc.target/s390/stack-protector-guard-global-4.c: New test. --- gcc/config/s390/s390-opts.h | 8 ++ gcc/config/s390/s390.h | 3 + gcc/config/s390/s390.md | 87 +++++++++++++++---- gcc/config/s390/s390.opt | 18 ++++ .../s390/stack-protector-guard-global-1.c | 27 ++++++ .../s390/stack-protector-guard-global-2.c | 5 ++ .../s390/stack-protector-guard-global-3.c | 6 ++ .../s390/stack-protector-guard-global-4.c | 6 ++ 8 files changed, 144 insertions(+), 16 deletions(-) create mode 100644 gcc/testsuite/gcc.target/s390/stack-protector-guard-global-1.c create mode 100644 gcc/testsuite/gcc.target/s390/stack-protector-guard-global-2.c create mode 100644 gcc/testsuite/gcc.target/s390/stack-protector-guard-global-3.c create mode 100644 gcc/testsuite/gcc.target/s390/stack-protector-guard-global-4.c diff --git a/gcc/config/s390/s390-opts.h b/gcc/config/s390/s390-opts.h index 9cacb2c29d1..29dd4a5f77f 100644 --- a/gcc/config/s390/s390-opts.h +++ b/gcc/config/s390/s390-opts.h @@ -53,4 +53,12 @@ enum indirect_branch { indirect_branch_thunk_inline, indirect_branch_thunk_extern }; + + +/* Where to get the canary for the stack protector. */ +enum stack_protector_guard +{ + SP_TLS, /* per-thread canary in TLS block */ + SP_GLOBAL /* global canary */ +}; #endif diff --git a/gcc/config/s390/s390.h b/gcc/config/s390/s390.h index 8b04bc9a755..2631788df4c 100644 --- a/gcc/config/s390/s390.h +++ b/gcc/config/s390/s390.h @@ -251,6 +251,9 @@ enum processor_flags && (s390_tune < PROCESSOR_2964_Z13 || (VAL) != const0_rtx) \ && (!CONST_INT_P (LEN) || INTVAL ((LEN)) > TARGET_SETMEM_PREFETCH_DISTANCE)) +#define TARGET_SP_GLOBAL_GUARD (s390_stack_protector_guard == SP_GLOBAL) +#define TARGET_SP_TLS_GUARD (s390_stack_protector_guard == SP_TLS) + /* Run-time target specification. */ /* Defaults for option flags defined only on some subtargets. */ diff --git a/gcc/config/s390/s390.md b/gcc/config/s390/s390.md index 02bc149b0fb..2d3027e1574 100644 --- a/gcc/config/s390/s390.md +++ b/gcc/config/s390/s390.md @@ -311,6 +311,7 @@ ; Stack Protector UNSPECV_SP_GET_TP + UNSPECV_SP_GLOBAL_GUARD_ADDR ]) ;; @@ -11930,6 +11931,36 @@ ; Stack Protector Patterns ; +(define_insn "stack_protect_global_guard_addr<mode>" + [(set (match_operand:P 0 "register_operand" "=d") + (unspec_volatile:P [(const_int 0)] UNSPECV_SP_GLOBAL_GUARD_ADDR))] + "" +{ + if (flag_s390_stack_protector_guard_record) + fprintf (asm_out_file, "1:\n"); + if (flag_pic) + { + if (TARGET_Z10) + output_asm_insn ("l<g>rl\t%0,__stack_chk_guard@GOTENT", operands); + else + { + output_asm_insn ("larl\t%0,__stack_chk_guard@GOTENT", operands); + output_asm_insn ("l<g>\t%0,0(%0)", operands); + } + } + else + output_asm_insn ("larl\t%0,__stack_chk_guard", operands); + if (flag_s390_stack_protector_guard_record) + fprintf (asm_out_file, "\t.section __stack_protector_loc,\\"a\\",@progbits\n" + "\t.%s 1b\n" + "\t.previous\n", TARGET_64BIT ? "quad" : "long"); + return ""; +} + [(set (attr "mnemonic") + (cond [(match_test "flag_pic && TARGET_Z10") (const_string "l<g>rl") + (match_test "flag_pic && !TARGET_Z10") (const_string "*")] + (const_string "larl")))]) + ; Insns stack_protect_get_tp{si,di} are similar to *get_tp_{31,64} but still ; distinct in the sense that they force recomputation of the thread pointer ; instead of potentially reloading it from stack. @@ -11958,16 +11989,28 @@ (match_operand 1 "memory_operand" ""))] "" { -#ifdef TARGET_THREAD_SSP_OFFSET - rtx tp = gen_reg_rtx (Pmode); - if (TARGET_64BIT) - emit_insn (gen_stack_protect_get_tpdi (tp)); + if (TARGET_SP_GLOBAL_GUARD) + { + rtx addr = gen_reg_rtx (Pmode); + if (TARGET_64BIT) + emit_insn (gen_stack_protect_global_guard_addrdi (addr)); + else + emit_insn (gen_stack_protect_global_guard_addrsi (addr)); + operands[1] = gen_rtx_MEM (Pmode, addr); + } else - emit_insn (gen_stack_protect_get_tpsi (tp)); - operands[1] - = gen_rtx_MEM (Pmode, gen_rtx_PLUS (Pmode, tp, - GEN_INT (TARGET_THREAD_SSP_OFFSET))); + { +#ifdef TARGET_THREAD_SSP_OFFSET + rtx tp = gen_reg_rtx (Pmode); + if (TARGET_64BIT) + emit_insn (gen_stack_protect_get_tpdi (tp)); + else + emit_insn (gen_stack_protect_get_tpsi (tp)); + operands[1] + = gen_rtx_MEM (Pmode, gen_rtx_PLUS (Pmode, tp, + GEN_INT (TARGET_THREAD_SSP_OFFSET))); #endif + } if (TARGET_64BIT) emit_insn (gen_stack_protect_setdi (operands[0], operands[1])); else @@ -11991,16 +12034,28 @@ "" { rtx cc_reg, test; -#ifdef TARGET_THREAD_SSP_OFFSET - rtx tp = gen_reg_rtx (Pmode); - if (TARGET_64BIT) - emit_insn (gen_stack_protect_get_tpdi (tp)); + if (TARGET_SP_GLOBAL_GUARD) + { + rtx addr = gen_reg_rtx (Pmode); + if (TARGET_64BIT) + emit_insn (gen_stack_protect_global_guard_addrdi (addr)); + else + emit_insn (gen_stack_protect_global_guard_addrsi (addr)); + operands[1] = gen_rtx_MEM (Pmode, addr); + } else - emit_insn (gen_stack_protect_get_tpsi (tp)); - operands[1] - = gen_rtx_MEM (Pmode, gen_rtx_PLUS (Pmode, tp, - GEN_INT (TARGET_THREAD_SSP_OFFSET))); + { +#ifdef TARGET_THREAD_SSP_OFFSET + rtx tp = gen_reg_rtx (Pmode); + if (TARGET_64BIT) + emit_insn (gen_stack_protect_get_tpdi (tp)); + else + emit_insn (gen_stack_protect_get_tpsi (tp)); + operands[1] + = gen_rtx_MEM (Pmode, gen_rtx_PLUS (Pmode, tp, + GEN_INT (TARGET_THREAD_SSP_OFFSET))); #endif + } if (TARGET_64BIT) emit_insn (gen_stack_protect_testdi (operands[0], operands[1])); else diff --git a/gcc/config/s390/s390.opt b/gcc/config/s390/s390.opt index 6753a9326be..a82992ef7ef 100644 --- a/gcc/config/s390/s390.opt +++ b/gcc/config/s390/s390.opt @@ -196,6 +196,24 @@ mno-stack-guard Target RejectNegative Alias(mstack-guard=,0) Negative(mstack-guard=) Switches off the -mstack-guard= option. +mstack-protector-guard= +Target RejectNegative Joined Enum(stack_protector_guard) Var(s390_stack_protector_guard) Init(SP_TLS) +Use given stack-protector guard. + +Enum +Name(stack_protector_guard) Type(enum stack_protector_guard) +Valid arguments to -mstack-protector-guard=: + +EnumValue +Enum(stack_protector_guard) String(tls) Value(SP_TLS) + +EnumValue +Enum(stack_protector_guard) String(global) Value(SP_GLOBAL) + +mstack-protector-guard-record +Target Var(flag_s390_stack_protector_guard_record) +Generate section __stack_protector_loc containing pointers to all instructions which load the address of the global guard. + mstack-size= Target RejectNegative Joined UInteger Var(s390_stack_size) Save Emit extra code in the function prologue in order to trap if the stack size exceeds the given limit. diff --git a/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-1.c b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-1.c new file mode 100644 index 00000000000..f276645adcb --- /dev/null +++ b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-1.c @@ -0,0 +1,27 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -fstack-protector-all -mstack-protector-guard=global -mstack-protector-guard-record" } */ +/* { dg-final { scan-assembler-times {\n1:\n\tlarl\t%r[0-9]+,__stack_chk_guard\n} 4 } } */ + +void test_0 (void) { } + +void test_1 (void) +{ + __asm__ __volatile ("" ::: + "r0", + "r1", + "r2", + "r3", + "r4", + "r5", + "r6", + "r7", + "r8", + "r9", + "r10", + "r11", +#ifndef __PIC__ + "r12", +#endif + "r13", + "r14"); +} diff --git a/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-2.c b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-2.c new file mode 100644 index 00000000000..7441a87adf7 --- /dev/null +++ b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-2.c @@ -0,0 +1,5 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -fstack-protector-all -mstack-protector-guard=global -mstack-protector-guard-record -fPIC" } */ +/* { dg-final { scan-assembler-times {\n1:\n\t(larl|lg?rl)\t%r[0-9]+,__stack_chk_guard@GOTENT\n} 4 } } */ + +#include "stack-protector-guard-global-1.c" diff --git a/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-3.c b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-3.c new file mode 100644 index 00000000000..4ef379aa8f7 --- /dev/null +++ b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-3.c @@ -0,0 +1,6 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -fstack-protector-all -mstack-protector-guard=global" } */ +/* { dg-final { scan-assembler-times {\tlarl\t%r[0-9]+,__stack_chk_guard\n} 4 } } */ +/* { dg-final { scan-assembler-not {\n1:\n} } } */ + +#include "stack-protector-guard-global-1.c" diff --git a/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-4.c b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-4.c new file mode 100644 index 00000000000..d57fc79bd83 --- /dev/null +++ b/gcc/testsuite/gcc.target/s390/stack-protector-guard-global-4.c @@ -0,0 +1,6 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -fstack-protector-all -mstack-protector-guard=global -fPIC" } */ +/* { dg-final { scan-assembler-times {\t(larl|lg?rl)\t%r[0-9]+,__stack_chk_guard@GOTENT\n} 4 } } */ +/* { dg-final { scan-assembler-not {\n1:\n} } } */ + +#include "stack-protector-guard-global-1.c" -- 2.49.0