Hi all,

I've been trying to implement an idea Andy suggested recently for
preventing some kinds of ROP attacks. The discussion of the idea is
here:
https://lore.kernel.org/linux-mm/dfa69954-3f0f-4b79-a9b5-893d33d87...@amacapital.net/

Right now I'm struggling to get my plugin to compile without crashing. The
basic idea is to insert some code before every "pop rbp" and "pop rsp"; I've
figured out how to find these instructions, and I'm inserting code using:

emit_insn(gen_rtx_XOR(DImode, gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM),
                      gen_rtx_MEM(DImode, gen_rtx_REG(DImode, 
HARD_FRAME_POINTER_REGNUM))));

The plugin completes successfully, but GCC complains later,

kernel/seccomp.c: In function ‘seccomp_check_filter’:
kernel/seccomp.c:242:1: error: unrecognizable insn:
 }
 ^
(insn 698 645 699 17 (xor:DI (reg:DI 6 bp)
        (mem:DI (reg:DI 6 bp) [0  S8 A8])) "kernel/seccomp.c":242 -1
     (nil))
during RTL pass: shorten
kernel/seccomp.c:242:1: internal compiler error: in insn_min_length, at 
config/i386/i386.md:14714

I assume this is because some internal metadata is screwed up, but I have no
clue as to what that is or how to fix it. My gcc version is 8.3.0, and
config/i386/i386.md:14714 of that tag looks mostly unrelated.

I had problems earlier because I was trying to run it after *clean_state which
is the thing that does init_insn_lengths(), but now I'm running it after
*stack_regs, so I thought it should be ok...

Anyway, the full plugin draft is below. You can run it by adding
CONFIG_GCC_PLUGIN_HEAPLEAP=y to your kernel config.

Thanks!

Tycho


>From 83b0631f14784ce11362ebd64e40c8d25c0decee Mon Sep 17 00:00:00 2001
From: Tycho Andersen <ty...@tycho.ws>
Date: Fri, 19 Apr 2019 19:24:58 -0600
Subject: [PATCH] heapleap

Signed-off-by: Tycho Andersen <ty...@tycho.ws>
---
 scripts/Makefile.gcc-plugins          |   8 ++
 scripts/gcc-plugins/Kconfig           |   4 +
 scripts/gcc-plugins/heapleap_plugin.c | 189 ++++++++++++++++++++++++++
 3 files changed, 201 insertions(+)

diff --git a/scripts/Makefile.gcc-plugins b/scripts/Makefile.gcc-plugins
index 5f7df50cfe7a..283b81dc5742 100644
--- a/scripts/Makefile.gcc-plugins
+++ b/scripts/Makefile.gcc-plugins
@@ -44,6 +44,14 @@ ifdef CONFIG_GCC_PLUGIN_ARM_SSP_PER_TASK
 endif
 export DISABLE_ARM_SSP_PER_TASK_PLUGIN
 
+gcc-plugin-$(CONFIG_GCC_PLUGIN_HEAPLEAP)       += heapleap_plugin.so
+gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_HEAPLEAP)                \
+                       += -DHEAPLEAP_PLUGIN
+ifdef CONFIG_GCC_PLUGIN_HEAPLEAP
+    DISABLE_HEAPLEAP_PLUGIN += -fplugin-arg-heapleap_plugin-disable
+endif
+export DISABLE_HEAPLEAP_PLUGIN
+
 # All the plugin CFLAGS are collected here in case a build target needs to
 # filter them out of the KBUILD_CFLAGS.
 GCC_PLUGINS_CFLAGS := $(strip $(addprefix 
-fplugin=$(objtree)/scripts/gcc-plugins/, $(gcc-plugin-y)) 
$(gcc-plugin-cflags-y))
diff --git a/scripts/gcc-plugins/Kconfig b/scripts/gcc-plugins/Kconfig
index 74271dba4f94..491b9cd5df1a 100644
--- a/scripts/gcc-plugins/Kconfig
+++ b/scripts/gcc-plugins/Kconfig
@@ -226,4 +226,8 @@ config GCC_PLUGIN_ARM_SSP_PER_TASK
        bool
        depends on GCC_PLUGINS && ARM
 
+config GCC_PLUGIN_HEAPLEAP
+       bool "Prevent 'pop esp' type instructions from loading an address in 
the heap"
+       depends on GCC_PLUGINS
+
 endif
diff --git a/scripts/gcc-plugins/heapleap_plugin.c 
b/scripts/gcc-plugins/heapleap_plugin.c
new file mode 100644
index 000000000000..5051b96d79f4
--- /dev/null
+++ b/scripts/gcc-plugins/heapleap_plugin.c
@@ -0,0 +1,189 @@
+/*
+ * This is based on an idea from Andy Lutomirski described here:
+ * 
https://lore.kernel.org/linux-mm/dfa69954-3f0f-4b79-a9b5-893d33d87...@amacapital.net/
+ *
+ * unsigned long offset = *rsp - rsp;
+ * offset >>= THREAD_SHIFT;
+ * if (unlikely(offset))
+ *     BUG();
+ * POP RSP;
+ */
+
+#include "gcc-common.h"
+
+__visible int plugin_is_GPL_compatible;
+static bool disable = false;
+
+static struct plugin_info heapleap_plugin_info = {
+       .version = "1",
+       .help = "disable\t\tdo not activate the plugin\n"
+};
+
+static bool heapleap_gate(void)
+{
+       tree section;
+
+       /*
+        * Similar to stackleak, we only do this for user code for now.
+        */
+       section = lookup_attribute("section",
+                                  DECL_ATTRIBUTES(current_function_decl));
+       if (section && TREE_VALUE(section)) {
+               section = TREE_VALUE(TREE_VALUE(section));
+
+               if (!strncmp(TREE_STRING_POINTER(section), ".init.text", 10))
+                       return false;
+               if (!strncmp(TREE_STRING_POINTER(section), ".devinit.text", 13))
+                       return false;
+               if (!strncmp(TREE_STRING_POINTER(section), ".cpuinit.text", 13))
+                       return false;
+               if (!strncmp(TREE_STRING_POINTER(section), ".meminit.text", 13))
+                       return false;
+       }
+
+       return !disable;
+}
+
+/*
+ * Check that:
+ *
+ * unsigned long offset = *rbp - rbp;
+ * offset >>= THREAD_SHIFT;
+ * if (unlikely(offset))
+ *     BUG();
+ * pop rbp;
+ *
+ * (we should probably do the same for rsp?)
+ */
+static void heapleap_add_check(rtx_insn *insn)
+{
+       rtx_insn *seq_head;
+
+       fprintf(stderr, "adding heapleap check\n");
+       print_rtl_single(stderr, insn);
+
+       start_sequence();
+
+       /* xor ebp [ebp] */
+       emit_insn(gen_rtx_XOR(DImode, gen_rtx_REG(DImode, 
HARD_FRAME_POINTER_REGNUM),
+                             gen_rtx_MEM(DImode, gen_rtx_REG(DImode, 
HARD_FRAME_POINTER_REGNUM))));
+
+       /* ebp >> THREAD_SHIFT */
+       /*
+        * TODO: THREAD_SHIFT isn't defined for every arch, including x86.
+        * THREAD_SIZE for x86_64 is 4096 * 2, so THREAD_SHIFT would be 13
+        * there. We should at least compute this from THREAD_SIZE though.
+        */
+       emit_insn(gen_rtx_LSHIFTRT(DImode, gen_rtx_REG(DImode, 
HARD_FRAME_POINTER_REGNUM),
+                                  GEN_INT(13)));
+
+       /*
+        * We're inserting right before the final pass, and we're adding some
+        * kind of jump, thus splitting the basic block that is the epilogue.
+        * That probably causes problems, and currently gcc crashes when doing
+        * the final pass after we emit this, so we probably need to do better.
+        */
+       emit_insn(gen_rtx_IF_THEN_ELSE(DImode,
+                       gen_rtx_NE(DImode,
+                               gen_rtx_REG(DImode, HARD_FRAME_POINTER_REGNUM),
+                               GEN_INT(0)),
+                       /*
+                        * we're really not supposed to BUG() for this stuff;
+                        * maybe we should figure out how to call WARN()? might
+                        * be painful.
+                        */
+                       gen_ud2(),
+                       /* poor man's no-op, i.e. how do i do this better? */
+                       gen_rtx_SET(gen_rtx_REG(DImode, 
HARD_FRAME_POINTER_REGNUM),
+                                   gen_rtx_REG(DImode, 
HARD_FRAME_POINTER_REGNUM))));
+       seq_head = get_insns();
+       end_sequence();
+
+       emit_insn_before(seq_head, insn);
+}
+
+static unsigned int heapleap_execute(void)
+{
+       rtx_insn *insn, *next;
+
+       if (strcmp(IDENTIFIER_POINTER(DECL_NAME(cfun->decl)), 
"seccomp_check_filter"))
+               return 0;
+
+       for (insn = get_insns(); insn; insn = next) {
+               rtx body, set, lhs, rhs;
+               int i;
+
+               next = NEXT_INSN(insn);
+               if (!next)
+                       continue;
+
+               if (!RTX_FRAME_RELATED_P(next) || !NONJUMP_INSN_P(next))
+                       continue;
+
+               /*
+                * I don't understand why we need this; but PATTERN(insn) is a
+                * CODE_LABEL, so...
+                */
+               body = XEXP(insn, 1);
+               set = PATTERN(body);
+               if (GET_CODE(set) != SET)
+                       continue;
+
+               /* TODO: use SET_DEST() here instead? */
+               lhs = XEXP(set, 0);
+               /* TODO: ebp vs esp? esp only occurs twice in my linked kernel 
*/
+               if (GET_CODE(lhs) != REG || REGNO(lhs) != 
HARD_FRAME_POINTER_REGNUM)
+                       continue;
+
+               /* TODO: use SET_SRC() here instead? */
+               rhs = XEXP(set, 1);
+               if (GET_CODE(rhs) != MEM)
+                       continue;
+
+               heapleap_add_check(next);
+       }
+
+       return 0;
+}
+
+#define PASS_NAME heapleap
+#include "gcc-generate-rtl-pass.h"
+
+__visible int plugin_init(struct plugin_name_args *plugin_info,
+                         struct plugin_gcc_version *version)
+{
+       const char * const plugin_name = plugin_info->base_name;
+       const int argc = plugin_info->argc;
+       const struct plugin_argument * const argv = plugin_info->argv;
+       int i;
+
+       /*
+        * *clean_state is the pass that does init_insn_lengths(), so we can't
+        * do anything after this, because gcc fails there's not a length for
+        * every instruction in the final pass
+        */
+       PASS_INFO(heapleap, "*stack_regs", 1, PASS_POS_INSERT_AFTER);
+
+       if (!plugin_default_version_check(version, &gcc_version)) {
+               error(G_("incompatible gcc/plugin versions"));
+               return 1;
+       }
+
+       for (i = 0; i < argc; i++) {
+               if (!strcmp(argv[i].key, "disable")) {
+                       disable = true;
+                       return 0;
+               } else {
+                       error(G_("unknown option '-fplugin-arg-%s-%s'"),
+                                       plugin_name, argv[i].key);
+                       return 1;
+               }
+       }
+
+       register_callback(plugin_name, PLUGIN_INFO, NULL,
+                                               &heapleap_plugin_info);
+
+       register_callback(plugin_name, PLUGIN_PASS_MANAGER_SETUP, NULL,
+                                       &heapleap_pass_info);
+       return 0;
+}
-- 
2.20.1

Reply via email to