on-smash canary detection
In addition to detect dead canary, we try to detect the very moment when we smash the stack top. Requested by k0kubun: https://twitter.com/k0kubun/status/1085180749899194368 git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@66981 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
parent
8a098051c5
commit
232f31ca12
@ -418,5 +418,5 @@ tests.compact.each {|(insn, expr, *a)| assert_equal 'true', expr, insn, *a }
|
|||||||
# with trace
|
# with trace
|
||||||
tests.compact.each {|(insn, expr, *a)|
|
tests.compact.each {|(insn, expr, *a)|
|
||||||
progn = "set_trace_func(proc{})\n" + expr
|
progn = "set_trace_func(proc{})\n" + expr
|
||||||
assert_equal 'true', progn, insn, *a
|
assert_equal 'true', progn, 'trace_' + insn, *a
|
||||||
}
|
}
|
||||||
|
1
vm.c
1
vm.c
@ -1090,6 +1090,7 @@ invoke_iseq_block_from_c(rb_execution_context_t *ec, const struct rb_captured_bl
|
|||||||
stack_check(ec);
|
stack_check(ec);
|
||||||
|
|
||||||
CHECK_VM_STACK_OVERFLOW(cfp, argc);
|
CHECK_VM_STACK_OVERFLOW(cfp, argc);
|
||||||
|
vm_check_canary(ec, sp);
|
||||||
cfp->sp = sp + argc;
|
cfp->sp = sp + argc;
|
||||||
for (i=0; i<argc; i++) {
|
for (i=0; i<argc; i++) {
|
||||||
sp[i] = argv[i];
|
sp[i] = argv[i];
|
||||||
|
@ -525,6 +525,7 @@ setup_parameters_complex(rb_execution_context_t * const ec, const rb_iseq_t * co
|
|||||||
VALUE * const orig_sp = ec->cfp->sp;
|
VALUE * const orig_sp = ec->cfp->sp;
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
|
|
||||||
|
vm_check_canary(ec, orig_sp);
|
||||||
/*
|
/*
|
||||||
* Extend SP for GC.
|
* Extend SP for GC.
|
||||||
*
|
*
|
||||||
@ -782,6 +783,7 @@ vm_caller_setup_arg_splat(rb_control_frame_t *cfp, struct rb_calling_info *calli
|
|||||||
VALUE *argv = cfp->sp - argc;
|
VALUE *argv = cfp->sp - argc;
|
||||||
VALUE ary = argv[argc-1];
|
VALUE ary = argv[argc-1];
|
||||||
|
|
||||||
|
vm_check_canary(GET_EC(), cfp->sp);
|
||||||
cfp->sp--;
|
cfp->sp--;
|
||||||
|
|
||||||
if (!NIL_P(ary)) {
|
if (!NIL_P(ary)) {
|
||||||
|
@ -116,6 +116,7 @@ vm_call0_body(rb_execution_context_t *ec, struct rb_calling_info *calling, const
|
|||||||
int i;
|
int i;
|
||||||
|
|
||||||
CHECK_VM_STACK_OVERFLOW(reg_cfp, calling->argc + 1);
|
CHECK_VM_STACK_OVERFLOW(reg_cfp, calling->argc + 1);
|
||||||
|
vm_check_canary(ec, reg_cfp->sp);
|
||||||
|
|
||||||
*reg_cfp->sp++ = calling->recv;
|
*reg_cfp->sp++ = calling->recv;
|
||||||
for (i = 0; i < calling->argc; i++) {
|
for (i = 0; i < calling->argc; i++) {
|
||||||
|
@ -201,7 +201,55 @@ vm_check_frame(VALUE type,
|
|||||||
}
|
}
|
||||||
#undef CHECK
|
#undef CHECK
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static VALUE vm_stack_canary; /* Initialized later */
|
||||||
|
static bool vm_stack_canary_was_born = false;
|
||||||
|
|
||||||
|
static void
|
||||||
|
vm_check_canary(const rb_execution_context_t *ec, VALUE *sp)
|
||||||
|
{
|
||||||
|
const struct rb_control_frame_struct *reg_cfp = ec->cfp;
|
||||||
|
const struct rb_iseq_struct *iseq;
|
||||||
|
|
||||||
|
if (! LIKELY(vm_stack_canary_was_born)) {
|
||||||
|
return; /* :FIXME: isn't it rather fatal to enter this branch? */
|
||||||
|
}
|
||||||
|
else if (! (iseq = GET_ISEQ())) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
else if (LIKELY(sp[0] != vm_stack_canary)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
/* we are going to call metods below; squash the canary to
|
||||||
|
* prevent infinite loop. */
|
||||||
|
sp[0] = Qundef;
|
||||||
|
}
|
||||||
|
|
||||||
|
const VALUE *orig = rb_iseq_original_iseq(iseq);
|
||||||
|
const VALUE *encoded = iseq->body->iseq_encoded;
|
||||||
|
const ptrdiff_t pos = GET_PC() - encoded;
|
||||||
|
const enum ruby_vminsn_type insn = (enum ruby_vminsn_type)orig[pos];
|
||||||
|
const char *name = insn_name(insn);
|
||||||
|
const VALUE iseqw = rb_iseqw_new(iseq);
|
||||||
|
const VALUE inspection = rb_inspect(iseqw);
|
||||||
|
const char *stri = rb_str_to_cstr(inspection);
|
||||||
|
const VALUE disasm = rb_iseq_disasm(iseq);
|
||||||
|
const char *strd = "";/* rb_str_to_cstr(disasm); */
|
||||||
|
|
||||||
|
/* rb_bug() is not capable of outputting this large contents. It
|
||||||
|
is designed to run form a SIGSEGV handler, which tends to be
|
||||||
|
very restricted. */
|
||||||
|
fprintf(stderr,
|
||||||
|
"We are killing the stack canary set by %s, "
|
||||||
|
"at %s@pc=%"PRIdPTR"\n"
|
||||||
|
"watch out the C stack trace.\n"
|
||||||
|
"%s",
|
||||||
|
name, stri, pos, strd);
|
||||||
|
rb_bug("see above.");
|
||||||
|
}
|
||||||
#else
|
#else
|
||||||
|
#define vm_check_canary(ec, sp)
|
||||||
#define vm_check_frame(a, b, c, d)
|
#define vm_check_frame(a, b, c, d)
|
||||||
#endif /* VM_CHECK_MODE > 0 */
|
#endif /* VM_CHECK_MODE > 0 */
|
||||||
|
|
||||||
@ -225,6 +273,7 @@ vm_push_frame(rb_execution_context_t *ec,
|
|||||||
|
|
||||||
/* check stack overflow */
|
/* check stack overflow */
|
||||||
CHECK_VM_STACK_OVERFLOW0(cfp, sp, local_size + stack_max);
|
CHECK_VM_STACK_OVERFLOW0(cfp, sp, local_size + stack_max);
|
||||||
|
vm_check_canary(ec, sp);
|
||||||
|
|
||||||
ec->cfp = cfp;
|
ec->cfp = cfp;
|
||||||
|
|
||||||
@ -2153,6 +2202,7 @@ vm_call_method_missing(rb_execution_context_t *ec, rb_control_frame_t *reg_cfp,
|
|||||||
|
|
||||||
/* shift arguments: m(a, b, c) #=> method_missing(:m, a, b, c) */
|
/* shift arguments: m(a, b, c) #=> method_missing(:m, a, b, c) */
|
||||||
CHECK_VM_STACK_OVERFLOW(reg_cfp, 1);
|
CHECK_VM_STACK_OVERFLOW(reg_cfp, 1);
|
||||||
|
vm_check_canary(ec, reg_cfp->sp);
|
||||||
if (argc > 1) {
|
if (argc > 1) {
|
||||||
MEMMOVE(argv+1, argv, VALUE, argc-1);
|
MEMMOVE(argv+1, argv, VALUE, argc-1);
|
||||||
}
|
}
|
||||||
@ -4087,7 +4137,6 @@ vm_trace(rb_execution_context_t *ec, rb_control_frame_t *reg_cfp, const VALUE *p
|
|||||||
#if VM_CHECK_MODE > 0
|
#if VM_CHECK_MODE > 0
|
||||||
static NORETURN( NOINLINE( COLDFUNC
|
static NORETURN( NOINLINE( COLDFUNC
|
||||||
void vm_canary_is_found_dead(enum ruby_vminsn_type i, VALUE c)));
|
void vm_canary_is_found_dead(enum ruby_vminsn_type i, VALUE c)));
|
||||||
static VALUE vm_stack_canary;
|
|
||||||
|
|
||||||
void
|
void
|
||||||
Init_vm_stack_canary(void)
|
Init_vm_stack_canary(void)
|
||||||
@ -4095,6 +4144,7 @@ Init_vm_stack_canary(void)
|
|||||||
/* This has to be called _after_ our PRNG is properly set up. */
|
/* This has to be called _after_ our PRNG is properly set up. */
|
||||||
int n = ruby_fill_random_bytes(&vm_stack_canary, sizeof vm_stack_canary, false);
|
int n = ruby_fill_random_bytes(&vm_stack_canary, sizeof vm_stack_canary, false);
|
||||||
|
|
||||||
|
vm_stack_canary_was_born = true;
|
||||||
VM_ASSERT(n == 0);
|
VM_ASSERT(n == 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -137,14 +137,22 @@ enum vm_regan_acttype {
|
|||||||
|
|
||||||
#if VM_CHECK_MODE > 0
|
#if VM_CHECK_MODE > 0
|
||||||
#define SETUP_CANARY() \
|
#define SETUP_CANARY() \
|
||||||
VALUE * canary; \
|
VALUE *canary; \
|
||||||
if (leaf) { \
|
if (leaf) { \
|
||||||
canary = GET_SP(); \
|
canary = GET_SP(); \
|
||||||
SET_SV(vm_stack_canary); \
|
SET_SV(vm_stack_canary); \
|
||||||
|
} \
|
||||||
|
else {\
|
||||||
|
SET_SV(Qfalse); /* cleanup */ \
|
||||||
}
|
}
|
||||||
#define CHECK_CANARY() \
|
#define CHECK_CANARY() \
|
||||||
if (leaf && (*canary != vm_stack_canary)) { \
|
if (leaf) { \
|
||||||
vm_canary_is_found_dead(INSN_ATTR(bin), *canary); \
|
if (*canary == vm_stack_canary) { \
|
||||||
|
*canary = Qfalse; /* cleanup */ \
|
||||||
|
} \
|
||||||
|
else { \
|
||||||
|
vm_canary_is_found_dead(INSN_ATTR(bin), *canary); \
|
||||||
|
} \
|
||||||
}
|
}
|
||||||
#else
|
#else
|
||||||
#define SETUP_CANARY() /* void */
|
#define SETUP_CANARY() /* void */
|
||||||
|
Loading…
x
Reference in New Issue
Block a user