2 * Copyright 2011-2017 by the PaX Team <pageexec@freemail.hu>
3 * Modified by Alexander Popov <alex.popov@linux.com>
4 * Licensed under the GPL v2
6 * Note: the choice of the license means that the compilation process is
7 * NOT 'eligible' as defined by gcc's library exception to the GPL v3,
8 * but for the kernel it doesn't matter since it doesn't link against
9 * any of the gcc libraries
11 * This gcc plugin is needed for tracking the lowest border of the kernel stack.
12 * It instruments the kernel code inserting stackleak_track_stack() calls:
14 * - for the functions with a stack frame size greater than or equal
15 * to the "track-min-size" plugin parameter.
17 * This plugin is ported from grsecurity/PaX. For more information see:
18 * https://grsecurity.net/
19 * https://pax.grsecurity.net/
22 * - use fprintf() to stderr, debug_generic_expr(), debug_gimple_stmt(),
23 * print_rtl_single() and debug_rtx();
24 * - add "-fdump-tree-all -fdump-rtl-all" to the plugin CFLAGS in
25 * Makefile.gcc-plugins to see the verbose dumps of the gcc passes;
26 * - use gcc -E to understand the preprocessing shenanigans;
27 * - use gcc with enabled CFG/GIMPLE/SSA verification (--enable-checking).
30 #include "gcc-common.h"
32 __visible
int plugin_is_GPL_compatible
;
34 static int track_frame_size
= -1;
35 static bool build_for_x86
= false;
36 static const char track_function
[] = "stackleak_track_stack";
37 static bool disable
= false;
38 static bool verbose
= false;
41 * Mark these global variables (roots) for gcc garbage collector since
42 * they point to the garbage-collected memory.
44 static GTY(()) tree track_function_decl
;
46 static struct plugin_info stackleak_plugin_info
= {
47 .version
= "201707101337",
48 .help
= "track-min-size=nn\ttrack stack for functions with a stack frame size >= nn bytes\n"
49 "arch=target_arch\tspecify target build arch\n"
50 "disable\t\tdo not activate the plugin\n"
51 "verbose\t\tprint info about the instrumentation\n"
54 static void add_stack_tracking_gcall(gimple_stmt_iterator
*gsi
, bool after
)
61 /* Insert calling stackleak_track_stack() */
62 stmt
= gimple_build_call(track_function_decl
, 0);
63 gimple_call
= as_a_gcall(stmt
);
65 gsi_insert_after(gsi
, gimple_call
, GSI_CONTINUE_LINKING
);
67 gsi_insert_before(gsi
, gimple_call
, GSI_SAME_STMT
);
69 /* Update the cgraph */
70 bb
= gimple_bb(gimple_call
);
71 node
= cgraph_get_create_node(track_function_decl
);
73 cgraph_create_edge(cgraph_get_node(current_function_decl
), node
,
74 gimple_call
, bb
->count
,
75 compute_call_stmt_bb_frequency(current_function_decl
, bb
));
78 static bool is_alloca(gimple stmt
)
80 if (gimple_call_builtin_p(stmt
, BUILT_IN_ALLOCA
))
83 #if BUILDING_GCC_VERSION >= 4007
84 if (gimple_call_builtin_p(stmt
, BUILT_IN_ALLOCA_WITH_ALIGN
))
91 static tree
get_current_stack_pointer_decl(void)
93 varpool_node_ptr node
;
95 FOR_EACH_VARIABLE(node
) {
96 tree var
= NODE_DECL(node
);
97 tree name
= DECL_NAME(var
);
99 if (DECL_NAME_LENGTH(var
) != sizeof("current_stack_pointer") - 1)
102 if (strcmp(IDENTIFIER_POINTER(name
), "current_stack_pointer"))
109 fprintf(stderr
, "stackleak: missing current_stack_pointer in %s()\n",
110 DECL_NAME_POINTER(current_function_decl
));
115 static void add_stack_tracking_gasm(gimple_stmt_iterator
*gsi
, bool after
)
117 gasm
*asm_call
= NULL
;
119 vec
<tree
, va_gc
> *inputs
= NULL
;
121 /* 'no_caller_saved_registers' is currently supported only for x86 */
122 gcc_assert(build_for_x86
);
125 * Insert calling stackleak_track_stack() in asm:
126 * asm volatile("call stackleak_track_stack"
127 * :: "r" (current_stack_pointer))
128 * Use ASM_CALL_CONSTRAINT trick from arch/x86/include/asm/asm.h.
129 * This constraint is taken into account during gcc shrink-wrapping
130 * optimization. It is needed to be sure that stackleak_track_stack()
131 * call is inserted after the prologue of the containing function,
132 * when the stack frame is prepared.
134 sp_decl
= get_current_stack_pointer_decl();
135 if (sp_decl
== NULL_TREE
) {
136 add_stack_tracking_gcall(gsi
, after
);
139 input
= build_tree_list(NULL_TREE
, build_const_char_string(2, "r"));
140 input
= chainon(NULL_TREE
, build_tree_list(input
, sp_decl
));
141 vec_safe_push(inputs
, input
);
142 asm_call
= gimple_build_asm_vec("call stackleak_track_stack",
143 inputs
, NULL
, NULL
, NULL
);
144 gimple_asm_set_volatile(asm_call
, true);
146 gsi_insert_after(gsi
, asm_call
, GSI_CONTINUE_LINKING
);
148 gsi_insert_before(gsi
, asm_call
, GSI_SAME_STMT
);
149 update_stmt(asm_call
);
152 static void add_stack_tracking(gimple_stmt_iterator
*gsi
, bool after
)
155 * The 'no_caller_saved_registers' attribute is used for
156 * stackleak_track_stack(). If the compiler supports this attribute for
157 * the target arch, we can add calling stackleak_track_stack() in asm.
158 * That improves performance: we avoid useless operations with the
159 * caller-saved registers in the functions from which we will remove
160 * stackleak_track_stack() call during the stackleak_cleanup pass.
162 if (lookup_attribute_spec(get_identifier("no_caller_saved_registers")))
163 add_stack_tracking_gasm(gsi
, after
);
165 add_stack_tracking_gcall(gsi
, after
);
169 * Work with the GIMPLE representation of the code. Insert the
170 * stackleak_track_stack() call after alloca() and into the beginning
171 * of the function if it is not instrumented.
173 static unsigned int stackleak_instrument_execute(void)
175 basic_block bb
, entry_bb
;
176 bool prologue_instrumented
= false, is_leaf
= true;
177 gimple_stmt_iterator gsi
= { 0 };
180 * ENTRY_BLOCK_PTR is a basic block which represents possible entry
181 * point of a function. This block does not contain any code and
182 * has a CFG edge to its successor.
184 gcc_assert(single_succ_p(ENTRY_BLOCK_PTR_FOR_FN(cfun
)));
185 entry_bb
= single_succ(ENTRY_BLOCK_PTR_FOR_FN(cfun
));
188 * Loop through the GIMPLE statements in each of cfun basic blocks.
189 * cfun is a global variable which represents the function that is
190 * currently processed.
192 FOR_EACH_BB_FN(bb
, cfun
) {
193 for (gsi
= gsi_start_bb(bb
); !gsi_end_p(gsi
); gsi_next(&gsi
)) {
196 stmt
= gsi_stmt(gsi
);
198 /* Leaf function is a function which makes no calls */
199 if (is_gimple_call(stmt
))
202 if (!is_alloca(stmt
))
206 fprintf(stderr
, "stackleak: be careful, alloca() in %s()\n",
207 DECL_NAME_POINTER(current_function_decl
));
210 /* Insert stackleak_track_stack() call after alloca() */
211 add_stack_tracking(&gsi
, true);
213 prologue_instrumented
= true;
217 if (prologue_instrumented
)
221 * Special cases to skip the instrumentation.
223 * Taking the address of static inline functions materializes them,
224 * but we mustn't instrument some of them as the resulting stack
225 * alignment required by the function call ABI will break other
226 * assumptions regarding the expected (but not otherwise enforced)
227 * register clobbering ABI.
229 * Case in point: native_save_fl on amd64 when optimized for size
230 * clobbers rdx if it were instrumented here.
232 * TODO: any more special cases?
235 !TREE_PUBLIC(current_function_decl
) &&
236 DECL_DECLARED_INLINE_P(current_function_decl
)) {
241 !strncmp(IDENTIFIER_POINTER(DECL_NAME(current_function_decl
)),
246 /* Insert stackleak_track_stack() call at the function beginning */
248 if (!single_pred_p(bb
)) {
249 /* gcc_assert(bb_loop_depth(bb) ||
250 (bb->flags & BB_IRREDUCIBLE_LOOP)); */
251 split_edge(single_succ_edge(ENTRY_BLOCK_PTR_FOR_FN(cfun
)));
252 gcc_assert(single_succ_p(ENTRY_BLOCK_PTR_FOR_FN(cfun
)));
253 bb
= single_succ(ENTRY_BLOCK_PTR_FOR_FN(cfun
));
255 gsi
= gsi_after_labels(bb
);
256 add_stack_tracking(&gsi
, false);
261 static bool large_stack_frame(void)
263 #if BUILDING_GCC_VERSION >= 8000
264 return maybe_ge(get_frame_size(), track_frame_size
);
266 return (get_frame_size() >= track_frame_size
);
270 static void remove_stack_tracking_gcall(void)
272 rtx_insn
*insn
, *next
;
275 * Find stackleak_track_stack() calls. Loop through the chain of insns,
276 * which is an RTL representation of the code for a function.
278 * The example of a matching insn:
279 * (call_insn 8 4 10 2 (call (mem (symbol_ref ("stackleak_track_stack")
280 * [flags 0x41] <function_decl 0x7f7cd3302a80 stackleak_track_stack>)
281 * [0 stackleak_track_stack S1 A8]) (0)) 675 {*call} (expr_list
282 * (symbol_ref ("stackleak_track_stack") [flags 0x41] <function_decl
283 * 0x7f7cd3302a80 stackleak_track_stack>) (expr_list (0) (nil))) (nil))
285 for (insn
= get_insns(); insn
; insn
= next
) {
288 next
= NEXT_INSN(insn
);
290 /* Check the expression code of the insn */
295 * Check the expression code of the insn body, which is an RTL
296 * Expression (RTX) describing the side effect performed by
299 body
= PATTERN(insn
);
301 if (GET_CODE(body
) == PARALLEL
)
302 body
= XVECEXP(body
, 0, 0);
304 if (GET_CODE(body
) != CALL
)
308 * Check the first operand of the call expression. It should
309 * be a mem RTX describing the needed subroutine with a
312 body
= XEXP(body
, 0);
313 if (GET_CODE(body
) != MEM
)
316 body
= XEXP(body
, 0);
317 if (GET_CODE(body
) != SYMBOL_REF
)
320 if (SYMBOL_REF_DECL(body
) != track_function_decl
)
323 /* Delete the stackleak_track_stack() call */
324 delete_insn_and_edges(insn
);
325 #if BUILDING_GCC_VERSION >= 4007 && BUILDING_GCC_VERSION < 8000
326 if (GET_CODE(next
) == NOTE
&&
327 NOTE_KIND(next
) == NOTE_INSN_CALL_ARG_LOCATION
) {
329 next
= NEXT_INSN(insn
);
330 delete_insn_and_edges(insn
);
336 static bool remove_stack_tracking_gasm(void)
338 bool removed
= false;
339 rtx_insn
*insn
, *next
;
341 /* 'no_caller_saved_registers' is currently supported only for x86 */
342 gcc_assert(build_for_x86
);
345 * Find stackleak_track_stack() asm calls. Loop through the chain of
346 * insns, which is an RTL representation of the code for a function.
348 * The example of a matching insn:
349 * (insn 11 5 12 2 (parallel [ (asm_operands/v
350 * ("call stackleak_track_stack") ("") 0
351 * [ (reg/v:DI 7 sp [ current_stack_pointer ]) ]
352 * [ (asm_input:DI ("r")) ] [])
353 * (clobber (reg:CC 17 flags)) ]) -1 (nil))
355 for (insn
= get_insns(); insn
; insn
= next
) {
358 next
= NEXT_INSN(insn
);
360 /* Check the expression code of the insn */
361 if (!NONJUMP_INSN_P(insn
))
365 * Check the expression code of the insn body, which is an RTL
366 * Expression (RTX) describing the side effect performed by
369 body
= PATTERN(insn
);
371 if (GET_CODE(body
) != PARALLEL
)
374 body
= XVECEXP(body
, 0, 0);
376 if (GET_CODE(body
) != ASM_OPERANDS
)
379 if (strcmp(ASM_OPERANDS_TEMPLATE(body
),
380 "call stackleak_track_stack")) {
384 delete_insn_and_edges(insn
);
385 gcc_assert(!removed
);
393 * Work with the RTL representation of the code.
394 * Remove the unneeded stackleak_track_stack() calls from the functions
395 * which don't call alloca() and don't have a large enough stack frame size.
397 static unsigned int stackleak_cleanup_execute(void)
399 const char *fn
= DECL_NAME_POINTER(current_function_decl
);
400 bool removed
= false;
403 * Leave stack tracking in functions that call alloca().
405 * gcc before version 7 called allocate_dynamic_stack_space() from
406 * expand_stack_vars() for runtime alignment of constant-sized stack
407 * variables. That caused cfun->calls_alloca to be set for functions
408 * that in fact don't use alloca().
409 * For more info see gcc commit 7072df0aae0c59ae437e.
410 * Let's leave such functions instrumented as well.
412 if (cfun
->calls_alloca
) {
414 fprintf(stderr
, "stackleak: instrument %s(): calls_alloca\n", fn
);
418 /* Leave stack tracking in functions with large stack frame */
419 if (large_stack_frame()) {
421 fprintf(stderr
, "stackleak: instrument %s()\n", fn
);
425 if (lookup_attribute_spec(get_identifier("no_caller_saved_registers")))
426 removed
= remove_stack_tracking_gasm();
429 remove_stack_tracking_gcall();
434 static bool stackleak_gate(void)
438 section
= lookup_attribute("section",
439 DECL_ATTRIBUTES(current_function_decl
));
440 if (section
&& TREE_VALUE(section
)) {
441 section
= TREE_VALUE(TREE_VALUE(section
));
443 if (!strncmp(TREE_STRING_POINTER(section
), ".init.text", 10))
445 if (!strncmp(TREE_STRING_POINTER(section
), ".devinit.text", 13))
447 if (!strncmp(TREE_STRING_POINTER(section
), ".cpuinit.text", 13))
449 if (!strncmp(TREE_STRING_POINTER(section
), ".meminit.text", 13))
453 return track_frame_size
>= 0;
456 /* Build the function declaration for stackleak_track_stack() */
457 static void stackleak_start_unit(void *gcc_data __unused
,
458 void *user_data __unused
)
462 /* void stackleak_track_stack(void) */
463 fntype
= build_function_type_list(void_type_node
, NULL_TREE
);
464 track_function_decl
= build_fn_decl(track_function
, fntype
);
465 DECL_ASSEMBLER_NAME(track_function_decl
); /* for LTO */
466 TREE_PUBLIC(track_function_decl
) = 1;
467 TREE_USED(track_function_decl
) = 1;
468 DECL_EXTERNAL(track_function_decl
) = 1;
469 DECL_ARTIFICIAL(track_function_decl
) = 1;
470 DECL_PRESERVE_P(track_function_decl
) = 1;
474 * Pass gate function is a predicate function that gets executed before the
475 * corresponding pass. If the return value is 'true' the pass gets executed,
476 * otherwise, it is skipped.
478 static bool stackleak_instrument_gate(void)
480 return stackleak_gate();
483 #define PASS_NAME stackleak_instrument
484 #define PROPERTIES_REQUIRED PROP_gimple_leh | PROP_cfg
485 #define TODO_FLAGS_START TODO_verify_ssa | TODO_verify_flow | TODO_verify_stmts
486 #define TODO_FLAGS_FINISH TODO_verify_ssa | TODO_verify_stmts | TODO_dump_func \
487 | TODO_update_ssa | TODO_rebuild_cgraph_edges
488 #include "gcc-generate-gimple-pass.h"
490 static bool stackleak_cleanup_gate(void)
492 return stackleak_gate();
495 #define PASS_NAME stackleak_cleanup
496 #define TODO_FLAGS_FINISH TODO_dump_func
497 #include "gcc-generate-rtl-pass.h"
500 * Every gcc plugin exports a plugin_init() function that is called right
501 * after the plugin is loaded. This function is responsible for registering
502 * the plugin callbacks and doing other required initialization.
504 __visible
int plugin_init(struct plugin_name_args
*plugin_info
,
505 struct plugin_gcc_version
*version
)
507 const char * const plugin_name
= plugin_info
->base_name
;
508 const int argc
= plugin_info
->argc
;
509 const struct plugin_argument
* const argv
= plugin_info
->argv
;
512 /* Extra GGC root tables describing our GTY-ed data */
513 static const struct ggc_root_tab gt_ggc_r_gt_stackleak
[] = {
515 .base
= &track_function_decl
,
517 .stride
= sizeof(track_function_decl
),
518 .cb
= >_ggc_mx_tree_node
,
519 .pchw
= >_pch_nx_tree_node
525 * The stackleak_instrument pass should be executed before the
526 * "optimized" pass, which is the control flow graph cleanup that is
527 * performed just before expanding gcc trees to the RTL. In former
528 * versions of the plugin this new pass was inserted before the
529 * "tree_profile" pass, which is currently called "profile".
531 PASS_INFO(stackleak_instrument
, "optimized", 1,
532 PASS_POS_INSERT_BEFORE
);
535 * The stackleak_cleanup pass should be executed before the "*free_cfg"
536 * pass. It's the moment when the stack frame size is already final,
537 * function prologues and epilogues are generated, and the
538 * machine-dependent code transformations are not done.
540 PASS_INFO(stackleak_cleanup
, "*free_cfg", 1, PASS_POS_INSERT_BEFORE
);
542 if (!plugin_default_version_check(version
, &gcc_version
)) {
543 error(G_("incompatible gcc/plugin versions"));
547 /* Parse the plugin arguments */
548 for (i
= 0; i
< argc
; i
++) {
549 if (!strcmp(argv
[i
].key
, "track-min-size")) {
550 if (!argv
[i
].value
) {
551 error(G_("no value supplied for option '-fplugin-arg-%s-%s'"),
552 plugin_name
, argv
[i
].key
);
556 track_frame_size
= atoi(argv
[i
].value
);
557 if (track_frame_size
< 0) {
558 error(G_("invalid option argument '-fplugin-arg-%s-%s=%s'"),
559 plugin_name
, argv
[i
].key
, argv
[i
].value
);
562 } else if (!strcmp(argv
[i
].key
, "arch")) {
563 if (!argv
[i
].value
) {
564 error(G_("no value supplied for option '-fplugin-arg-%s-%s'"),
565 plugin_name
, argv
[i
].key
);
569 if (!strcmp(argv
[i
].value
, "x86"))
570 build_for_x86
= true;
571 } else if (!strcmp(argv
[i
].key
, "disable")) {
573 } else if (!strcmp(argv
[i
].key
, "verbose")) {
576 error(G_("unknown option '-fplugin-arg-%s-%s'"),
577 plugin_name
, argv
[i
].key
);
584 fprintf(stderr
, "stackleak: disabled for this translation unit\n");
588 /* Give the information about the plugin */
589 register_callback(plugin_name
, PLUGIN_INFO
, NULL
,
590 &stackleak_plugin_info
);
592 /* Register to be called before processing a translation unit */
593 register_callback(plugin_name
, PLUGIN_START_UNIT
,
594 &stackleak_start_unit
, NULL
);
596 /* Register an extra GCC garbage collector (GGC) root table */
597 register_callback(plugin_name
, PLUGIN_REGISTER_GGC_ROOTS
, NULL
,
598 (void *)>_ggc_r_gt_stackleak
);
601 * Hook into the Pass Manager to register new gcc passes.
603 * The stack frame size info is available only at the last RTL pass,
604 * when it's too late to insert complex code like a function call.
605 * So we register two gcc passes to instrument every function at first
606 * and remove the unneeded instrumentation later.
608 register_callback(plugin_name
, PLUGIN_PASS_MANAGER_SETUP
, NULL
,
609 &stackleak_instrument_pass_info
);
610 register_callback(plugin_name
, PLUGIN_PASS_MANAGER_SETUP
, NULL
,
611 &stackleak_cleanup_pass_info
);