1 //===-- StackProtector.cpp - Stack Protector Insertion --------------------===// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is distributed under the University of Illinois Open Source 6 // License. See LICENSE.TXT for details. 7 // 8 //===----------------------------------------------------------------------===// 9 // 10 // This pass inserts stack protectors into functions which need them. A variable 11 // with a random value in it is stored onto the stack before the local variables 12 // are allocated. Upon exiting the block, the stored value is checked. If it's 13 // changed, then there was some sort of violation and the program aborts. 14 // 15 //===----------------------------------------------------------------------===// 16 17 #define DEBUG_TYPE "stack-protector" 18 #include "llvm/CodeGen/Passes.h" 19 #include "llvm/Analysis/Dominators.h" 20 #include "llvm/Attributes.h" 21 #include "llvm/Constants.h" 22 #include "llvm/DerivedTypes.h" 23 #include "llvm/Function.h" 24 #include "llvm/Instructions.h" 25 #include "llvm/Intrinsics.h" 26 #include "llvm/Module.h" 27 #include "llvm/Pass.h" 28 #include "llvm/Support/CommandLine.h" 29 #include "llvm/Target/TargetData.h" 30 #include "llvm/Target/TargetLowering.h" 31 using namespace llvm; 32 33 // SSPBufferSize - The lower bound for a buffer to be considered for stack 34 // smashing protection. 35 static cl::opt<unsigned> 36 SSPBufferSize("stack-protector-buffer-size", cl::init(8), 37 cl::desc("Lower bound for a buffer to be considered for " 38 "stack protection")); 39 40 namespace { 41 class StackProtector : public FunctionPass { 42 /// TLI - Keep a pointer of a TargetLowering to consult for determining 43 /// target type sizes. 44 const TargetLowering *TLI; 45 46 Function *F; 47 Module *M; 48 49 DominatorTree* DT; 50 51 /// InsertStackProtectors - Insert code into the prologue and epilogue of 52 /// the function. 53 /// 54 /// - The prologue code loads and stores the stack guard onto the stack. 55 /// - The epilogue checks the value stored in the prologue against the 56 /// original value. It calls __stack_chk_fail if they differ. 57 bool InsertStackProtectors(); 58 59 /// CreateFailBB - Create a basic block to jump to when the stack protector 60 /// check fails. 61 BasicBlock *CreateFailBB(); 62 63 /// RequiresStackProtector - Check whether or not this function needs a 64 /// stack protector based upon the stack protector level. 65 bool RequiresStackProtector() const; 66 public: 67 static char ID; // Pass identification, replacement for typeid. 68 StackProtector() : FunctionPass(ID), TLI(0) { 69 initializeStackProtectorPass(*PassRegistry::getPassRegistry()); 70 } 71 StackProtector(const TargetLowering *tli) 72 : FunctionPass(ID), TLI(tli) { 73 initializeStackProtectorPass(*PassRegistry::getPassRegistry()); 74 } 75 76 virtual void getAnalysisUsage(AnalysisUsage &AU) const { 77 AU.addPreserved<DominatorTree>(); 78 } 79 80 virtual bool runOnFunction(Function &Fn); 81 }; 82 } // end anonymous namespace 83 84 char StackProtector::ID = 0; 85 INITIALIZE_PASS(StackProtector, "stack-protector", 86 "Insert stack protectors", false, false) 87 88 FunctionPass *llvm::createStackProtectorPass(const TargetLowering *tli) { 89 return new StackProtector(tli); 90 } 91 92 bool StackProtector::runOnFunction(Function &Fn) { 93 F = &Fn; 94 M = F->getParent(); 95 DT = getAnalysisIfAvailable<DominatorTree>(); 96 97 if (!RequiresStackProtector()) return false; 98 99 return InsertStackProtectors(); 100 } 101 102 /// RequiresStackProtector - Check whether or not this function needs a stack 103 /// protector based upon the stack protector level. The heuristic we use is to 104 /// add a guard variable to functions that call alloca, and functions with 105 /// buffers larger than SSPBufferSize bytes. 106 bool StackProtector::RequiresStackProtector() const { 107 if (F->hasFnAttr(Attribute::StackProtectReq)) 108 return true; 109 110 if (!F->hasFnAttr(Attribute::StackProtect)) 111 return false; 112 113 const TargetData *TD = TLI->getTargetData(); 114 115 for (Function::iterator I = F->begin(), E = F->end(); I != E; ++I) { 116 BasicBlock *BB = I; 117 118 for (BasicBlock::iterator 119 II = BB->begin(), IE = BB->end(); II != IE; ++II) 120 if (AllocaInst *AI = dyn_cast<AllocaInst>(II)) { 121 if (AI->isArrayAllocation()) 122 // This is a call to alloca with a variable size. Emit stack 123 // protectors. 124 return true; 125 126 if (const ArrayType *AT = dyn_cast<ArrayType>(AI->getAllocatedType())) { 127 // We apparently only care about character arrays. 128 if (!AT->getElementType()->isIntegerTy(8)) 129 continue; 130 131 // If an array has more than SSPBufferSize bytes of allocated space, 132 // then we emit stack protectors. 133 if (SSPBufferSize <= TD->getTypeAllocSize(AT)) 134 return true; 135 } 136 } 137 } 138 139 return false; 140 } 141 142 /// InsertStackProtectors - Insert code into the prologue and epilogue of the 143 /// function. 144 /// 145 /// - The prologue code loads and stores the stack guard onto the stack. 146 /// - The epilogue checks the value stored in the prologue against the original 147 /// value. It calls __stack_chk_fail if they differ. 148 bool StackProtector::InsertStackProtectors() { 149 BasicBlock *FailBB = 0; // The basic block to jump to if check fails. 150 BasicBlock *FailBBDom = 0; // FailBB's dominator. 151 AllocaInst *AI = 0; // Place on stack that stores the stack guard. 152 Value *StackGuardVar = 0; // The stack guard variable. 153 BasicBlock &Entry = F->getEntryBlock(); 154 155 for (Function::iterator I = F->begin(), E = F->end(); I != E; ) { 156 BasicBlock *BB = I++; 157 if (BB->getNumUses() == 0 && BB != &Entry) continue; 158 159 ReturnInst *RI = dyn_cast<ReturnInst>(BB->getTerminator()); 160 if (!RI) continue; 161 162 if (!FailBB) { 163 // Insert code into the entry block that stores the __stack_chk_guard 164 // variable onto the stack: 165 // 166 // entry: 167 // StackGuardSlot = alloca i8* 168 // StackGuard = load __stack_chk_guard 169 // call void @llvm.stackprotect.create(StackGuard, StackGuardSlot) 170 // 171 const PointerType *PtrTy = Type::getInt8PtrTy(RI->getContext()); 172 unsigned AddressSpace, Offset; 173 if (TLI->getStackCookieLocation(AddressSpace, Offset)) { 174 Constant *OffsetVal = 175 ConstantInt::get(Type::getInt32Ty(RI->getContext()), Offset); 176 177 StackGuardVar = ConstantExpr::getIntToPtr(OffsetVal, 178 PointerType::get(PtrTy, AddressSpace)); 179 } else { 180 StackGuardVar = M->getOrInsertGlobal("__stack_chk_guard", PtrTy); 181 } 182 183 Instruction *InsPt = &Entry.front(); 184 185 AI = new AllocaInst(PtrTy, "StackGuardSlot", InsPt); 186 LoadInst *LI = new LoadInst(StackGuardVar, "StackGuard", false, InsPt); 187 188 Value *Args[] = { LI, AI }; 189 CallInst:: 190 Create(Intrinsic::getDeclaration(M, Intrinsic::stackprotector), 191 &Args[0], array_endof(Args), "", InsPt); 192 193 // Create the basic block to jump to when the guard check fails. 194 FailBB = CreateFailBB(); 195 if (DT) 196 FailBBDom = DT->isReachableFromEntry(BB) ? BB : 0; 197 } 198 199 // For each block with a return instruction, convert this: 200 // 201 // return: 202 // ... 203 // ret ... 204 // 205 // into this: 206 // 207 // return: 208 // ... 209 // %1 = load __stack_chk_guard 210 // %2 = load StackGuardSlot 211 // %3 = cmp i1 %1, %2 212 // br i1 %3, label %SP_return, label %CallStackCheckFailBlk 213 // 214 // SP_return: 215 // ret ... 216 // 217 // CallStackCheckFailBlk: 218 // call void @__stack_chk_fail() 219 // unreachable 220 221 // Split the basic block before the return instruction. 222 BasicBlock *NewBB = BB->splitBasicBlock(RI, "SP_return"); 223 if (DT && DT->isReachableFromEntry(BB)) { 224 DT->addNewBlock(NewBB, BB); 225 if (FailBBDom) 226 FailBBDom = DT->findNearestCommonDominator(FailBBDom, BB); 227 } 228 229 // Remove default branch instruction to the new BB. 230 BB->getTerminator()->eraseFromParent(); 231 232 // Move the newly created basic block to the point right after the old basic 233 // block so that it's in the "fall through" position. 234 NewBB->moveAfter(BB); 235 236 // Generate the stack protector instructions in the old basic block. 237 LoadInst *LI1 = new LoadInst(StackGuardVar, "", false, BB); 238 LoadInst *LI2 = new LoadInst(AI, "", true, BB); 239 ICmpInst *Cmp = new ICmpInst(*BB, CmpInst::ICMP_EQ, LI1, LI2, ""); 240 BranchInst::Create(NewBB, FailBB, Cmp, BB); 241 } 242 243 // Return if we didn't modify any basic blocks. I.e., there are no return 244 // statements in the function. 245 if (!FailBB) return false; 246 247 if (DT && FailBBDom) 248 DT->addNewBlock(FailBB, FailBBDom); 249 250 return true; 251 } 252 253 /// CreateFailBB - Create a basic block to jump to when the stack protector 254 /// check fails. 255 BasicBlock *StackProtector::CreateFailBB() { 256 BasicBlock *FailBB = BasicBlock::Create(F->getContext(), 257 "CallStackCheckFailBlk", F); 258 Constant *StackChkFail = 259 M->getOrInsertFunction("__stack_chk_fail", 260 Type::getVoidTy(F->getContext()), NULL); 261 CallInst::Create(StackChkFail, "", FailBB); 262 new UnreachableInst(F->getContext(), FailBB); 263 return FailBB; 264 } 265