1/*
2 * Copyright 2012-2016 by the PaX Team <pageexec@freemail.hu>
3 * Copyright 2016 by Emese Revfy <re.emese@gmail.com>
4 * Licensed under the GPL v2
5 *
6 * Note: the choice of the license means that the compilation process is
7 *       NOT 'eligible' as defined by gcc's library exception to the GPL v3,
8 *       but for the kernel it doesn't matter since it doesn't link against
9 *       any of the gcc libraries
10 *
11 * This gcc plugin helps generate a little bit of entropy from program state,
12 * used throughout the uptime of the kernel. Here is an instrumentation example:
13 *
14 * before:
15 * void __latent_entropy test(int argc, char *argv[])
16 * {
17 *	if (argc <= 1)
18 *		printf("%s: no command arguments :(\n", *argv);
19 *	else
20 *		printf("%s: %d command arguments!\n", *argv, args - 1);
21 * }
22 *
23 * after:
24 * void __latent_entropy test(int argc, char *argv[])
25 * {
26 *	// latent_entropy_execute() 1.
27 *	unsigned long local_entropy;
28 *	// init_local_entropy() 1.
29 *	void *local_entropy_frameaddr;
30 *	// init_local_entropy() 3.
31 *	unsigned long tmp_latent_entropy;
32 *
33 *	// init_local_entropy() 2.
34 *	local_entropy_frameaddr = __builtin_frame_address(0);
35 *	local_entropy = (unsigned long) local_entropy_frameaddr;
36 *
37 *	// init_local_entropy() 4.
38 *	tmp_latent_entropy = latent_entropy;
39 *	// init_local_entropy() 5.
40 *	local_entropy ^= tmp_latent_entropy;
41 *
42 *	// latent_entropy_execute() 3.
43 *	if (argc <= 1) {
44 *		// perturb_local_entropy()
45 *		local_entropy += 4623067384293424948;
46 *		printf("%s: no command arguments :(\n", *argv);
47 *		// perturb_local_entropy()
48 *	} else {
49 *		local_entropy ^= 3896280633962944730;
50 *		printf("%s: %d command arguments!\n", *argv, args - 1);
51 *	}
52 *
53 *	// latent_entropy_execute() 4.
54 *	tmp_latent_entropy = rol(tmp_latent_entropy, local_entropy);
55 *	latent_entropy = tmp_latent_entropy;
56 * }
57 *
58 * TODO:
59 * - add ipa pass to identify not explicitly marked candidate functions
60 * - mix in more program state (function arguments/return values,
61 *   loop variables, etc)
62 * - more instrumentation control via attribute parameters
63 *
64 * BUGS:
65 * - none known
66 *
67 * Options:
68 * -fplugin-arg-latent_entropy_plugin-disable
69 *
70 * Attribute: __attribute__((latent_entropy))
71 *  The latent_entropy gcc attribute can be only on functions and variables.
72 *  If it is on a function then the plugin will instrument it. If the attribute
73 *  is on a variable then the plugin will initialize it with a random value.
74 *  The variable must be an integer, an integer array type or a structure
75 *  with integer fields.
76 */
77
78#include "gcc-common.h"
79
80__visible int plugin_is_GPL_compatible;
81
82static GTY(()) tree latent_entropy_decl;
83
84static struct plugin_info latent_entropy_plugin_info = {
85	.version	= "201606141920vanilla",
86	.help		= "disable\tturn off latent entropy instrumentation\n",
87};
88
89static unsigned HOST_WIDE_INT deterministic_seed;
90static unsigned HOST_WIDE_INT rnd_buf[32];
91static size_t rnd_idx = ARRAY_SIZE(rnd_buf);
92static int urandom_fd = -1;
93
94static unsigned HOST_WIDE_INT get_random_const(void)
95{
96	if (deterministic_seed) {
97		unsigned HOST_WIDE_INT w = deterministic_seed;
98		w ^= w << 13;
99		w ^= w >> 7;
100		w ^= w << 17;
101		deterministic_seed = w;
102		return deterministic_seed;
103	}
104
105	if (urandom_fd < 0) {
106		urandom_fd = open("/dev/urandom", O_RDONLY);
107		gcc_assert(urandom_fd >= 0);
108	}
109	if (rnd_idx >= ARRAY_SIZE(rnd_buf)) {
110		gcc_assert(read(urandom_fd, rnd_buf, sizeof(rnd_buf)) == sizeof(rnd_buf));
111		rnd_idx = 0;
112	}
113	return rnd_buf[rnd_idx++];
114}
115
116static tree tree_get_random_const(tree type)
117{
118	unsigned long long mask;
119
120	mask = 1ULL << (TREE_INT_CST_LOW(TYPE_SIZE(type)) - 1);
121	mask = 2 * (mask - 1) + 1;
122
123	if (TYPE_UNSIGNED(type))
124		return build_int_cstu(type, mask & get_random_const());
125	return build_int_cst(type, mask & get_random_const());
126}
127
128static tree handle_latent_entropy_attribute(tree *node, tree name,
129						tree args __unused,
130						int flags __unused,
131						bool *no_add_attrs)
132{
133	tree type;
134#if BUILDING_GCC_VERSION <= 4007
135	VEC(constructor_elt, gc) *vals;
136#else
137	vec<constructor_elt, va_gc> *vals;
138#endif
139
140	switch (TREE_CODE(*node)) {
141	default:
142		*no_add_attrs = true;
143		error("%qE attribute only applies to functions and variables",
144			name);
145		break;
146
147	case VAR_DECL:
148		if (DECL_INITIAL(*node)) {
149			*no_add_attrs = true;
150			error("variable %qD with %qE attribute must not be initialized",
151				*node, name);
152			break;
153		}
154
155		if (!TREE_STATIC(*node)) {
156			*no_add_attrs = true;
157			error("variable %qD with %qE attribute must not be local",
158				*node, name);
159			break;
160		}
161
162		type = TREE_TYPE(*node);
163		switch (TREE_CODE(type)) {
164		default:
165			*no_add_attrs = true;
166			error("variable %qD with %qE attribute must be an integer or a fixed length integer array type or a fixed sized structure with integer fields",
167				*node, name);
168			break;
169
170		case RECORD_TYPE: {
171			tree fld, lst = TYPE_FIELDS(type);
172			unsigned int nelt = 0;
173
174			for (fld = lst; fld; nelt++, fld = TREE_CHAIN(fld)) {
175				tree fieldtype;
176
177				fieldtype = TREE_TYPE(fld);
178				if (TREE_CODE(fieldtype) == INTEGER_TYPE)
179					continue;
180
181				*no_add_attrs = true;
182				error("structure variable %qD with %qE attribute has a non-integer field %qE",
183					*node, name, fld);
184				break;
185			}
186
187			if (fld)
188				break;
189
190#if BUILDING_GCC_VERSION <= 4007
191			vals = VEC_alloc(constructor_elt, gc, nelt);
192#else
193			vec_alloc(vals, nelt);
194#endif
195
196			for (fld = lst; fld; fld = TREE_CHAIN(fld)) {
197				tree random_const, fld_t = TREE_TYPE(fld);
198
199				random_const = tree_get_random_const(fld_t);
200				CONSTRUCTOR_APPEND_ELT(vals, fld, random_const);
201			}
202
203			/* Initialize the fields with random constants */
204			DECL_INITIAL(*node) = build_constructor(type, vals);
205			break;
206		}
207
208		/* Initialize the variable with a random constant */
209		case INTEGER_TYPE:
210			DECL_INITIAL(*node) = tree_get_random_const(type);
211			break;
212
213		case ARRAY_TYPE: {
214			tree elt_type, array_size, elt_size;
215			unsigned int i, nelt;
216			HOST_WIDE_INT array_size_int, elt_size_int;
217
218			elt_type = TREE_TYPE(type);
219			elt_size = TYPE_SIZE_UNIT(TREE_TYPE(type));
220			array_size = TYPE_SIZE_UNIT(type);
221
222			if (TREE_CODE(elt_type) != INTEGER_TYPE || !array_size
223				|| TREE_CODE(array_size) != INTEGER_CST) {
224				*no_add_attrs = true;
225				error("array variable %qD with %qE attribute must be a fixed length integer array type",
226					*node, name);
227				break;
228			}
229
230			array_size_int = TREE_INT_CST_LOW(array_size);
231			elt_size_int = TREE_INT_CST_LOW(elt_size);
232			nelt = array_size_int / elt_size_int;
233
234#if BUILDING_GCC_VERSION <= 4007
235			vals = VEC_alloc(constructor_elt, gc, nelt);
236#else
237			vec_alloc(vals, nelt);
238#endif
239
240			for (i = 0; i < nelt; i++) {
241				tree cst = size_int(i);
242				tree rand_cst = tree_get_random_const(elt_type);
243
244				CONSTRUCTOR_APPEND_ELT(vals, cst, rand_cst);
245			}
246
247			/*
248			 * Initialize the elements of the array with random
249			 * constants
250			 */
251			DECL_INITIAL(*node) = build_constructor(type, vals);
252			break;
253		}
254		}
255		break;
256
257	case FUNCTION_DECL:
258		break;
259	}
260
261	return NULL_TREE;
262}
263
264static struct attribute_spec latent_entropy_attr = { };
265
266static void register_attributes(void *event_data __unused, void *data __unused)
267{
268	latent_entropy_attr.name		= "latent_entropy";
269	latent_entropy_attr.decl_required	= true;
270	latent_entropy_attr.handler		= handle_latent_entropy_attribute;
271
272	register_attribute(&latent_entropy_attr);
273}
274
275static bool latent_entropy_gate(void)
276{
277	tree list;
278
279	/* don't bother with noreturn functions for now */
280	if (TREE_THIS_VOLATILE(current_function_decl))
281		return false;
282
283	/* gcc-4.5 doesn't discover some trivial noreturn functions */
284	if (EDGE_COUNT(EXIT_BLOCK_PTR_FOR_FN(cfun)->preds) == 0)
285		return false;
286
287	list = DECL_ATTRIBUTES(current_function_decl);
288	return lookup_attribute("latent_entropy", list) != NULL_TREE;
289}
290
291static tree create_var(tree type, const char *name)
292{
293	tree var;
294
295	var = create_tmp_var(type, name);
296	add_referenced_var(var);
297	mark_sym_for_renaming(var);
298	return var;
299}
300
301/*
302 * Set up the next operation and its constant operand to use in the latent
303 * entropy PRNG. When RHS is specified, the request is for perturbing the
304 * local latent entropy variable, otherwise it is for perturbing the global
305 * latent entropy variable where the two operands are already given by the
306 * local and global latent entropy variables themselves.
307 *
308 * The operation is one of add/xor/rol when instrumenting the local entropy
309 * variable and one of add/xor when perturbing the global entropy variable.
310 * Rotation is not used for the latter case because it would transmit less
311 * entropy to the global variable than the other two operations.
312 */
313static enum tree_code get_op(tree *rhs)
314{
315	static enum tree_code op;
316	unsigned HOST_WIDE_INT random_const;
317
318	random_const = get_random_const();
319
320	switch (op) {
321	case BIT_XOR_EXPR:
322		op = PLUS_EXPR;
323		break;
324
325	case PLUS_EXPR:
326		if (rhs) {
327			op = LROTATE_EXPR;
328			/*
329			 * This code limits the value of random_const to
330			 * the size of a long for the rotation
331			 */
332			random_const %= TYPE_PRECISION(long_unsigned_type_node);
333			break;
334		}
335
336	case LROTATE_EXPR:
337	default:
338		op = BIT_XOR_EXPR;
339		break;
340	}
341	if (rhs)
342		*rhs = build_int_cstu(long_unsigned_type_node, random_const);
343	return op;
344}
345
346static gimple create_assign(enum tree_code code, tree lhs, tree op1,
347				tree op2)
348{
349	return gimple_build_assign_with_ops(code, lhs, op1, op2);
350}
351
352static void perturb_local_entropy(basic_block bb, tree local_entropy)
353{
354	gimple_stmt_iterator gsi;
355	gimple assign;
356	tree rhs;
357	enum tree_code op;
358
359	op = get_op(&rhs);
360	assign = create_assign(op, local_entropy, local_entropy, rhs);
361	gsi = gsi_after_labels(bb);
362	gsi_insert_before(&gsi, assign, GSI_NEW_STMT);
363	update_stmt(assign);
364}
365
366static void __perturb_latent_entropy(gimple_stmt_iterator *gsi,
367					tree local_entropy)
368{
369	gimple assign;
370	tree temp;
371	enum tree_code op;
372
373	/* 1. create temporary copy of latent_entropy */
374	temp = create_var(long_unsigned_type_node, "temp_latent_entropy");
375
376	/* 2. read... */
377	add_referenced_var(latent_entropy_decl);
378	mark_sym_for_renaming(latent_entropy_decl);
379	assign = gimple_build_assign(temp, latent_entropy_decl);
380	gsi_insert_before(gsi, assign, GSI_NEW_STMT);
381	update_stmt(assign);
382
383	/* 3. ...modify... */
384	op = get_op(NULL);
385	assign = create_assign(op, temp, temp, local_entropy);
386	gsi_insert_after(gsi, assign, GSI_NEW_STMT);
387	update_stmt(assign);
388
389	/* 4. ...write latent_entropy */
390	assign = gimple_build_assign(latent_entropy_decl, temp);
391	gsi_insert_after(gsi, assign, GSI_NEW_STMT);
392	update_stmt(assign);
393}
394
395static bool handle_tail_calls(basic_block bb, tree local_entropy)
396{
397	gimple_stmt_iterator gsi;
398
399	for (gsi = gsi_start_bb(bb); !gsi_end_p(gsi); gsi_next(&gsi)) {
400		gcall *call;
401		gimple stmt = gsi_stmt(gsi);
402
403		if (!is_gimple_call(stmt))
404			continue;
405
406		call = as_a_gcall(stmt);
407		if (!gimple_call_tail_p(call))
408			continue;
409
410		__perturb_latent_entropy(&gsi, local_entropy);
411		return true;
412	}
413
414	return false;
415}
416
417static void perturb_latent_entropy(tree local_entropy)
418{
419	edge_iterator ei;
420	edge e, last_bb_e;
421	basic_block last_bb;
422
423	gcc_assert(single_pred_p(EXIT_BLOCK_PTR_FOR_FN(cfun)));
424	last_bb_e = single_pred_edge(EXIT_BLOCK_PTR_FOR_FN(cfun));
425
426	FOR_EACH_EDGE(e, ei, last_bb_e->src->preds) {
427		if (ENTRY_BLOCK_PTR_FOR_FN(cfun) == e->src)
428			continue;
429		if (EXIT_BLOCK_PTR_FOR_FN(cfun) == e->src)
430			continue;
431
432		handle_tail_calls(e->src, local_entropy);
433	}
434
435	last_bb = single_pred(EXIT_BLOCK_PTR_FOR_FN(cfun));
436	if (!handle_tail_calls(last_bb, local_entropy)) {
437		gimple_stmt_iterator gsi = gsi_last_bb(last_bb);
438
439		__perturb_latent_entropy(&gsi, local_entropy);
440	}
441}
442
443static void init_local_entropy(basic_block bb, tree local_entropy)
444{
445	gimple assign, call;
446	tree frame_addr, rand_const, tmp, fndecl, udi_frame_addr;
447	enum tree_code op;
448	unsigned HOST_WIDE_INT rand_cst;
449	gimple_stmt_iterator gsi = gsi_after_labels(bb);
450
451	/* 1. create local_entropy_frameaddr */
452	frame_addr = create_var(ptr_type_node, "local_entropy_frameaddr");
453
454	/* 2. local_entropy_frameaddr = __builtin_frame_address() */
455	fndecl = builtin_decl_implicit(BUILT_IN_FRAME_ADDRESS);
456	call = gimple_build_call(fndecl, 1, integer_zero_node);
457	gimple_call_set_lhs(call, frame_addr);
458	gsi_insert_before(&gsi, call, GSI_NEW_STMT);
459	update_stmt(call);
460
461	udi_frame_addr = fold_convert(long_unsigned_type_node, frame_addr);
462	assign = gimple_build_assign(local_entropy, udi_frame_addr);
463	gsi_insert_after(&gsi, assign, GSI_NEW_STMT);
464	update_stmt(assign);
465
466	/* 3. create temporary copy of latent_entropy */
467	tmp = create_var(long_unsigned_type_node, "temp_latent_entropy");
468
469	/* 4. read the global entropy variable into local entropy */
470	add_referenced_var(latent_entropy_decl);
471	mark_sym_for_renaming(latent_entropy_decl);
472	assign = gimple_build_assign(tmp, latent_entropy_decl);
473	gsi_insert_after(&gsi, assign, GSI_NEW_STMT);
474	update_stmt(assign);
475
476	/* 5. mix local_entropy_frameaddr into local entropy */
477	assign = create_assign(BIT_XOR_EXPR, local_entropy, local_entropy, tmp);
478	gsi_insert_after(&gsi, assign, GSI_NEW_STMT);
479	update_stmt(assign);
480
481	rand_cst = get_random_const();
482	rand_const = build_int_cstu(long_unsigned_type_node, rand_cst);
483	op = get_op(NULL);
484	assign = create_assign(op, local_entropy, local_entropy, rand_const);
485	gsi_insert_after(&gsi, assign, GSI_NEW_STMT);
486	update_stmt(assign);
487}
488
489static bool create_latent_entropy_decl(void)
490{
491	varpool_node_ptr node;
492
493	if (latent_entropy_decl != NULL_TREE)
494		return true;
495
496	FOR_EACH_VARIABLE(node) {
497		tree name, var = NODE_DECL(node);
498
499		if (DECL_NAME_LENGTH(var) < sizeof("latent_entropy") - 1)
500			continue;
501
502		name = DECL_NAME(var);
503		if (strcmp(IDENTIFIER_POINTER(name), "latent_entropy"))
504			continue;
505
506		latent_entropy_decl = var;
507		break;
508	}
509
510	return latent_entropy_decl != NULL_TREE;
511}
512
513static unsigned int latent_entropy_execute(void)
514{
515	basic_block bb;
516	tree local_entropy;
517
518	if (!create_latent_entropy_decl())
519		return 0;
520
521	/* prepare for step 2 below */
522	gcc_assert(single_succ_p(ENTRY_BLOCK_PTR_FOR_FN(cfun)));
523	bb = single_succ(ENTRY_BLOCK_PTR_FOR_FN(cfun));
524	if (!single_pred_p(bb)) {
525		split_edge(single_succ_edge(ENTRY_BLOCK_PTR_FOR_FN(cfun)));
526		gcc_assert(single_succ_p(ENTRY_BLOCK_PTR_FOR_FN(cfun)));
527		bb = single_succ(ENTRY_BLOCK_PTR_FOR_FN(cfun));
528	}
529
530	/* 1. create the local entropy variable */
531	local_entropy = create_var(long_unsigned_type_node, "local_entropy");
532
533	/* 2. initialize the local entropy variable */
534	init_local_entropy(bb, local_entropy);
535
536	bb = bb->next_bb;
537
538	/*
539	 * 3. instrument each BB with an operation on the
540	 *    local entropy variable
541	 */
542	while (bb != EXIT_BLOCK_PTR_FOR_FN(cfun)) {
543		perturb_local_entropy(bb, local_entropy);
544		bb = bb->next_bb;
545	};
546
547	/* 4. mix local entropy into the global entropy variable */
548	perturb_latent_entropy(local_entropy);
549	return 0;
550}
551
552static void latent_entropy_start_unit(void *gcc_data __unused,
553					void *user_data __unused)
554{
555	tree type, id;
556	int quals;
557
558	if (in_lto_p)
559		return;
560
561	/* extern volatile unsigned long latent_entropy */
562	quals = TYPE_QUALS(long_unsigned_type_node) | TYPE_QUAL_VOLATILE;
563	type = build_qualified_type(long_unsigned_type_node, quals);
564	id = get_identifier("latent_entropy");
565	latent_entropy_decl = build_decl(UNKNOWN_LOCATION, VAR_DECL, id, type);
566
567	TREE_STATIC(latent_entropy_decl) = 1;
568	TREE_PUBLIC(latent_entropy_decl) = 1;
569	TREE_USED(latent_entropy_decl) = 1;
570	DECL_PRESERVE_P(latent_entropy_decl) = 1;
571	TREE_THIS_VOLATILE(latent_entropy_decl) = 1;
572	DECL_EXTERNAL(latent_entropy_decl) = 1;
573	DECL_ARTIFICIAL(latent_entropy_decl) = 1;
574	lang_hooks.decls.pushdecl(latent_entropy_decl);
575}
576
577#define PASS_NAME latent_entropy
578#define PROPERTIES_REQUIRED PROP_gimple_leh | PROP_cfg
579#define TODO_FLAGS_FINISH TODO_verify_ssa | TODO_verify_stmts | TODO_dump_func \
580	| TODO_update_ssa
581#include "gcc-generate-gimple-pass.h"
582
583__visible int plugin_init(struct plugin_name_args *plugin_info,
584			  struct plugin_gcc_version *version)
585{
586	bool enabled = true;
587	const char * const plugin_name = plugin_info->base_name;
588	const int argc = plugin_info->argc;
589	const struct plugin_argument * const argv = plugin_info->argv;
590	int i;
591
592	/*
593	 * Call get_random_seed() with noinit=true, so that this returns
594	 * 0 in the case where no seed has been passed via -frandom-seed.
595	 */
596	deterministic_seed = get_random_seed(true);
597
598	static const struct ggc_root_tab gt_ggc_r_gt_latent_entropy[] = {
599		{
600			.base = &latent_entropy_decl,
601			.nelt = 1,
602			.stride = sizeof(latent_entropy_decl),
603			.cb = &gt_ggc_mx_tree_node,
604			.pchw = &gt_pch_nx_tree_node
605		},
606		LAST_GGC_ROOT_TAB
607	};
608
609	PASS_INFO(latent_entropy, "optimized", 1, PASS_POS_INSERT_BEFORE);
610
611	if (!plugin_default_version_check(version, &gcc_version)) {
612		error(G_("incompatible gcc/plugin versions"));
613		return 1;
614	}
615
616	for (i = 0; i < argc; ++i) {
617		if (!(strcmp(argv[i].key, "disable"))) {
618			enabled = false;
619			continue;
620		}
621		error(G_("unknown option '-fplugin-arg-%s-%s'"), plugin_name, argv[i].key);
622	}
623
624	register_callback(plugin_name, PLUGIN_INFO, NULL,
625				&latent_entropy_plugin_info);
626	if (enabled) {
627		register_callback(plugin_name, PLUGIN_START_UNIT,
628					&latent_entropy_start_unit, NULL);
629		register_callback(plugin_name, PLUGIN_REGISTER_GGC_ROOTS,
630				  NULL, (void *)&gt_ggc_r_gt_latent_entropy);
631		register_callback(plugin_name, PLUGIN_PASS_MANAGER_SETUP, NULL,
632					&latent_entropy_pass_info);
633	}
634	register_callback(plugin_name, PLUGIN_ATTRIBUTES, register_attributes,
635				NULL);
636
637	return 0;
638}
639