aboutsummaryrefslogtreecommitdiffstats
path: root/scripts/gcc-plugins
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2018-12-27 14:19:07 -0500
committerLinus Torvalds <torvalds@linux-foundation.org>2018-12-27 14:19:07 -0500
commitc6f1b355d451680a45d63ce66cea67057c938a87 (patch)
tree413ed05d88e6a59d33a8b2034cfffdae1862e7b8 /scripts/gcc-plugins
parentc06e9ef6918b1a6d183f1fef78ebc66f054a7b5a (diff)
parent189af4657186da08a2e79fb8e906cfd82b2ccddc (diff)
Merge tag 'gcc-plugins-v4.21-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux
Pull gcc-plugins update from Kees Cook: "Both arm and arm64 are gaining per-task stack canaries (to match x86), but arm is being done with a gcc plugin, hence it going through the gcc-plugins tree. New gcc-plugin: - Enable per-task stack protector for ARM (Ard Biesheuvel)" * tag 'gcc-plugins-v4.21-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux: ARM: smp: add support for per-task stack canaries
Diffstat (limited to 'scripts/gcc-plugins')
-rw-r--r--scripts/gcc-plugins/Kconfig4
-rw-r--r--scripts/gcc-plugins/arm_ssp_per_task_plugin.c103
2 files changed, 107 insertions, 0 deletions
diff --git a/scripts/gcc-plugins/Kconfig b/scripts/gcc-plugins/Kconfig
index 0d5c799688f0..d45f7f36b859 100644
--- a/scripts/gcc-plugins/Kconfig
+++ b/scripts/gcc-plugins/Kconfig
@@ -190,4 +190,8 @@ config STACKLEAK_RUNTIME_DISABLE
190 runtime to control kernel stack erasing for kernels built with 190 runtime to control kernel stack erasing for kernels built with
191 CONFIG_GCC_PLUGIN_STACKLEAK. 191 CONFIG_GCC_PLUGIN_STACKLEAK.
192 192
193config GCC_PLUGIN_ARM_SSP_PER_TASK
194 bool
195 depends on GCC_PLUGINS && ARM
196
193endif 197endif
diff --git a/scripts/gcc-plugins/arm_ssp_per_task_plugin.c b/scripts/gcc-plugins/arm_ssp_per_task_plugin.c
new file mode 100644
index 000000000000..de70b8470971
--- /dev/null
+++ b/scripts/gcc-plugins/arm_ssp_per_task_plugin.c
@@ -0,0 +1,103 @@
1// SPDX-License-Identifier: GPL-2.0
2
3#include "gcc-common.h"
4
5__visible int plugin_is_GPL_compatible;
6
7static unsigned int sp_mask, canary_offset;
8
9static unsigned int arm_pertask_ssp_rtl_execute(void)
10{
11 rtx_insn *insn;
12
13 for (insn = get_insns(); insn; insn = NEXT_INSN(insn)) {
14 const char *sym;
15 rtx body;
16 rtx masked_sp;
17
18 /*
19 * Find a SET insn involving a SYMBOL_REF to __stack_chk_guard
20 */
21 if (!INSN_P(insn))
22 continue;
23 body = PATTERN(insn);
24 if (GET_CODE(body) != SET ||
25 GET_CODE(SET_SRC(body)) != SYMBOL_REF)
26 continue;
27 sym = XSTR(SET_SRC(body), 0);
28 if (strcmp(sym, "__stack_chk_guard"))
29 continue;
30
31 /*
32 * Replace the source of the SET insn with an expression that
33 * produces the address of the copy of the stack canary value
34 * stored in struct thread_info
35 */
36 masked_sp = gen_reg_rtx(Pmode);
37
38 emit_insn_before(gen_rtx_SET(masked_sp,
39 gen_rtx_AND(Pmode,
40 stack_pointer_rtx,
41 GEN_INT(sp_mask))),
42 insn);
43
44 SET_SRC(body) = gen_rtx_PLUS(Pmode, masked_sp,
45 GEN_INT(canary_offset));
46 }
47 return 0;
48}
49
50#define PASS_NAME arm_pertask_ssp_rtl
51
52#define NO_GATE
53#include "gcc-generate-rtl-pass.h"
54
55__visible int plugin_init(struct plugin_name_args *plugin_info,
56 struct plugin_gcc_version *version)
57{
58 const char * const plugin_name = plugin_info->base_name;
59 const int argc = plugin_info->argc;
60 const struct plugin_argument *argv = plugin_info->argv;
61 int tso = 0;
62 int i;
63
64 if (!plugin_default_version_check(version, &gcc_version)) {
65 error(G_("incompatible gcc/plugin versions"));
66 return 1;
67 }
68
69 for (i = 0; i < argc; ++i) {
70 if (!strcmp(argv[i].key, "disable"))
71 return 0;
72
73 /* all remaining options require a value */
74 if (!argv[i].value) {
75 error(G_("no value supplied for option '-fplugin-arg-%s-%s'"),
76 plugin_name, argv[i].key);
77 return 1;
78 }
79
80 if (!strcmp(argv[i].key, "tso")) {
81 tso = atoi(argv[i].value);
82 continue;
83 }
84
85 if (!strcmp(argv[i].key, "offset")) {
86 canary_offset = atoi(argv[i].value);
87 continue;
88 }
89 error(G_("unknown option '-fplugin-arg-%s-%s'"),
90 plugin_name, argv[i].key);
91 return 1;
92 }
93
94 /* create the mask that produces the base of the stack */
95 sp_mask = ~((1U << (12 + tso)) - 1);
96
97 PASS_INFO(arm_pertask_ssp_rtl, "expand", 1, PASS_POS_INSERT_AFTER);
98
99 register_callback(plugin_info->base_name, PLUGIN_PASS_MANAGER_SETUP,
100 NULL, &arm_pertask_ssp_rtl_pass_info);
101
102 return 0;
103}