* Enable random addresses for generated code * Enable custom stack in sandbox * Triggering CI? * Update exploit to work in release mode.
414 lines
12 KiB
C
414 lines
12 KiB
C
#include <fcntl.h>
|
|
#include <linux/audit.h>
|
|
#include <linux/filter.h>
|
|
#include <linux/seccomp.h>
|
|
#include <stdbool.h>
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/prctl.h>
|
|
#include <sys/syscall.h>
|
|
#include <sys/wait.h>
|
|
#include <unistd.h>
|
|
|
|
#define MAX_PROGRAM_LEN 0x1000
|
|
#define ACTIVATION_KEY_LEN 0x80
|
|
|
|
static char activation_key[ACTIVATION_KEY_LEN] = {0};
|
|
|
|
typedef enum Opcode { ADD = 0, ADDI = 1, SUB = 2, COPY = 3, LOADI = 4, COUNT_OPCODES } Opcode;
|
|
|
|
typedef enum Register {
|
|
Adelheid = 0,
|
|
Berthold = 1,
|
|
Cornelia = 2,
|
|
Dora = 3,
|
|
Engelbert = 4,
|
|
Friedrich = 5,
|
|
Giesela = 6,
|
|
Heinrich = 7,
|
|
Irmgard = 8,
|
|
Joachim = 9,
|
|
Klaus = 10,
|
|
Liesbeth = 11,
|
|
Manfred = 12,
|
|
Norbert = 13,
|
|
COUNT_REGISTERS
|
|
} Register;
|
|
|
|
typedef struct Instruction {
|
|
Opcode opcode;
|
|
Register reg1;
|
|
uint8_t padding[2]; // unused
|
|
union {
|
|
Register reg2;
|
|
uint32_t imm;
|
|
};
|
|
} Instruction;
|
|
|
|
typedef int (*exec_func_t)();
|
|
|
|
static bool premium_activated = false;
|
|
|
|
// Take a look at https://wiki.osdev.org/X86-64_Instruction_Encoding#Registers for more information.
|
|
static uint8_t register_id_lookup[COUNT_REGISTERS] = {
|
|
0b0000, // A is mapped to rax
|
|
0b0011, // B to rbx
|
|
0b0001, // C to rcx
|
|
0b0010, // D to rdx
|
|
0b0110, // E to rsi
|
|
0b0111, // F to rdi
|
|
0b1000, // G to r8
|
|
0b1001, // H to r9
|
|
0b1010, // I to r10
|
|
0b1011, // J to r11
|
|
0b1100, // K to r12
|
|
0b1101, // L to r13
|
|
0b1110, // M to r14
|
|
0b1111, // N to r15
|
|
};
|
|
|
|
#define EXTRACT_REX_BIT(x) ((x >> 3) & 1)
|
|
|
|
size_t get_size_t(size_t min, size_t limit) {
|
|
size_t val;
|
|
char buf[0x10] = {0};
|
|
char *end_ptr;
|
|
do {
|
|
if (fgets(buf, sizeof(buf), stdin) == NULL)
|
|
exit(EXIT_FAILURE);
|
|
|
|
val = strtoull(buf, &end_ptr, 0);
|
|
|
|
if (buf == end_ptr) {
|
|
puts("That's not a integer, come back when you passed elementary school!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (val <= limit && val >= min)
|
|
break;
|
|
|
|
puts("Nah, that's too long. Let's try again.");
|
|
} while (true);
|
|
return val;
|
|
}
|
|
|
|
Instruction *get_program(size_t *program_len) {
|
|
printf("Now to your next program: How long should it bee?");
|
|
size_t len = get_size_t(1, MAX_PROGRAM_LEN);
|
|
|
|
Instruction *program = malloc(len * sizeof(Instruction));
|
|
|
|
if (program == NULL) {
|
|
puts("Cannot malloc anything!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
printf("Now your program:");
|
|
|
|
if (fread(program, sizeof(Instruction), len, stdin) != len) {
|
|
puts("You did not enter as many instructions as you wanted. Learn counting, idiot!");
|
|
free(program);
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
*program_len = len;
|
|
return program;
|
|
}
|
|
|
|
bool instr_use_reg2(Opcode opcode) { return opcode == ADD || opcode == SUB || opcode == COPY; }
|
|
|
|
bool validate_program(Instruction *program, size_t len) {
|
|
for (size_t i = 0; i < len; ++i) {
|
|
// prevent use of wrong opcodes or registers
|
|
if (program[i].opcode >= COUNT_OPCODES || program[i].reg1 >= COUNT_REGISTERS)
|
|
return false;
|
|
|
|
if (instr_use_reg2(program[i].opcode) && program[i].reg2 >= COUNT_REGISTERS)
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
int init_seccomp() {
|
|
#define ALLOW(NR) BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, (NR), 0, 1), BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_ALLOW)
|
|
struct sock_filter filter[] = {
|
|
BPF_STMT(BPF_LD + BPF_W + BPF_ABS, offsetof(struct seccomp_data, arch)),
|
|
BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, AUDIT_ARCH_X86_64, 1, 0),
|
|
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_KILL),
|
|
|
|
BPF_STMT(BPF_LD + BPF_W + BPF_ABS, offsetof(struct seccomp_data, nr)),
|
|
ALLOW(SYS_read),
|
|
ALLOW(SYS_write),
|
|
ALLOW(SYS_execve),
|
|
ALLOW(SYS_exit_group),
|
|
|
|
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_KILL),
|
|
};
|
|
#undef ALLOW
|
|
|
|
struct sock_fprog prog = {
|
|
.len = sizeof(filter) / sizeof(*filter),
|
|
.filter = filter,
|
|
};
|
|
|
|
return prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) || prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog);
|
|
}
|
|
|
|
size_t gen_random_address() {
|
|
int rand_fd = open("/dev/random", O_RDONLY);
|
|
size_t random_addr;
|
|
read(rand_fd, &random_addr, sizeof(random_addr));
|
|
close(rand_fd);
|
|
|
|
return random_addr & 0xFFFFFFFF000;
|
|
}
|
|
|
|
void exec_code(uint8_t *code) {
|
|
register exec_func_t exec_func = (exec_func_t)code;
|
|
|
|
// allocate a new stack at a random address => no stale addresses left (remember: stack grows down!)
|
|
void *custom_stack_addr = (void *)gen_random_address() + 0x1000;
|
|
if (mmap(custom_stack_addr - 0x1000, 0x1000, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED, -1, 0) == MAP_FAILED) {
|
|
puts("Cannot allocate custom stack!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
close(0);
|
|
close(1);
|
|
close(2);
|
|
if (init_seccomp()) {
|
|
puts("Cannot enable seccomp jail!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
__asm__ __volatile__("mov %0, %%rsp" : : "r"(custom_stack_addr) : /*"rsp"*/);
|
|
uint8_t res = exec_func();
|
|
_exit(res);
|
|
}
|
|
|
|
void gen_3B_native_instr(uint8_t opcode, uint8_t reg1_id, uint8_t reg2_id, uint8_t *code, size_t *offset) {
|
|
// REW.X prefix (we use 64bit registers) + upper bit of the second register id + upper bit of the first register id
|
|
code[*offset] = 0b01001000 + (EXTRACT_REX_BIT(reg2_id) << 2) + EXTRACT_REX_BIT(reg1_id);
|
|
code[*offset + 1] = opcode;
|
|
// registers: direct addressing + second reg id + first reg id
|
|
code[*offset + 2] = 0b11000000 + (reg2_id << 3) + reg1_id;
|
|
*offset += 3;
|
|
}
|
|
|
|
void gen_immediate_native_instr(uint8_t opcode, uint8_t reg_id, uint32_t imm, uint8_t *code, size_t *offset) {
|
|
code[*offset] = 0b01001000 + EXTRACT_REX_BIT(reg_id); // REW.X prefix (we use 64bit registers) + upper bit of the first register id
|
|
code[*offset + 1] = opcode;
|
|
code[*offset + 2] = 0b11000000L + (reg_id & 0b111); // registers: direct addressing + lower 3 bit of first reg id
|
|
*(uint32_t *)(code + *offset + 3) = imm; // immediate
|
|
*offset += 7;
|
|
}
|
|
|
|
void gen_code(uint8_t *code, Instruction *program, size_t program_len) {
|
|
// guides on how x64 instructions are encoded:
|
|
// https://wiki.osdev.org/X86-64_Instruction_Encoding
|
|
// https://pyokagan.name/blog/2019-09-20-x86encoding/
|
|
|
|
size_t offset = 0;
|
|
uint32_t acc = 0;
|
|
uint8_t reg1_id;
|
|
uint8_t reg2_id;
|
|
|
|
// prolog: zero out registers
|
|
for (Register reg = Adelheid; reg < COUNT_REGISTERS; ++reg) {
|
|
// mov reg, 0
|
|
gen_immediate_native_instr(0xc7, register_id_lookup[reg], 0, code, &offset);
|
|
}
|
|
|
|
for (size_t pc = 0; pc < program_len; ++pc) {
|
|
Instruction instr = program[pc];
|
|
switch (instr.opcode) {
|
|
case ADD:
|
|
// add reg1, reg2
|
|
// this encoding flips the register usage, so we need to put them in the other way around here (hint: not the bug)
|
|
gen_3B_native_instr(0x03, register_id_lookup[instr.reg2], register_id_lookup[instr.reg1], code, &offset);
|
|
break;
|
|
case ADDI:
|
|
// optimization: fold multiple consecutive ADDI instructions to the same register into one
|
|
if (pc < program_len && program[pc + 1].opcode == ADDI && instr.reg1 == program[pc + 1].reg1) {
|
|
acc += program[pc].imm;
|
|
} else {
|
|
// add reg, acc
|
|
gen_immediate_native_instr(0x81, register_id_lookup[instr.reg1], instr.imm + acc, code, &offset);
|
|
acc = 0;
|
|
}
|
|
break;
|
|
case SUB:
|
|
// add reg1, reg2
|
|
gen_3B_native_instr(0x29, register_id_lookup[instr.reg1], register_id_lookup[instr.reg2], code, &offset);
|
|
break;
|
|
case COPY:
|
|
// optimization: COPY from and to a register is a nop
|
|
reg1_id = register_id_lookup[instr.reg1];
|
|
reg2_id = register_id_lookup[instr.reg2];
|
|
if (reg1_id == reg2_id)
|
|
break;
|
|
|
|
// mov reg1, reg2
|
|
gen_3B_native_instr(0x89, reg1_id, reg2_id, code, &offset);
|
|
break;
|
|
case LOADI:
|
|
// optimization: multiple consecutive loads to the same register are unnecessary
|
|
if (pc < program_len && program[pc + 1].opcode == LOADI && instr.reg1 == program[pc + 1].reg1)
|
|
break;
|
|
|
|
gen_immediate_native_instr(0xc7, register_id_lookup[instr.reg1], instr.imm, code, &offset);
|
|
break;
|
|
default:
|
|
puts("Found invalid instruction!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
// epilog: return lower 8bit of Adelheid as return value
|
|
// ret
|
|
code[offset] = 0xc3;
|
|
}
|
|
|
|
uint8_t run_jit(Instruction *program, size_t len) {
|
|
// an instruction takes up to 7B + prolog + epilog
|
|
size_t expected_code_len = 7 * len + 3 * COUNT_REGISTERS + 1;
|
|
// page alignment
|
|
size_t allocated_code_len = (expected_code_len + 0xFFF) & ~0xFFF;
|
|
|
|
size_t random_addr = gen_random_address();
|
|
|
|
// allocate memory for context and code
|
|
uint8_t *code = (uint8_t *)mmap((void *)random_addr, allocated_code_len, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED, -1, 0);
|
|
if (code == MAP_FAILED) {
|
|
puts("Cannot mmap memory for code.");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
gen_code(code, program, len);
|
|
|
|
// make code executable and non-writeable
|
|
if (mprotect(code, allocated_code_len, PROT_READ | PROT_EXEC) != 0) {
|
|
puts("Cannot make code executable!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (premium_activated) {
|
|
// premium version does not use sandbox
|
|
exec_func_t exec_func = (exec_func_t)code;
|
|
return exec_func();
|
|
} else {
|
|
int child_pid = fork();
|
|
switch (child_pid) {
|
|
case -1:
|
|
puts("I'm infertile, I cannot have a child \U0001F62D");
|
|
exit(EXIT_FAILURE);
|
|
case 0:
|
|
// child
|
|
exec_code(code);
|
|
__builtin_unreachable();
|
|
default:
|
|
// parent
|
|
break;
|
|
}
|
|
|
|
// continue in the parent; child never gets here
|
|
|
|
// unmap allocated memory
|
|
if (munmap(code, allocated_code_len) != 0) {
|
|
puts("Cannot unmap code.");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
// wait for child and extract exit code
|
|
int wstatus = 0;
|
|
if (waitpid(child_pid, &wstatus, 0) == -1) {
|
|
puts("waitpid failed!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (!WIFEXITED(wstatus)) {
|
|
puts("Program crashed! WHAT?");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
return WEXITSTATUS(wstatus);
|
|
}
|
|
}
|
|
|
|
void check_premium() {
|
|
printf("Do you want to activate the premium version? (y/N):");
|
|
char answer[3] = {0};
|
|
if (fgets(answer, sizeof(answer), stdin) == NULL) {
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
switch (answer[0]) {
|
|
case 'y':
|
|
break;
|
|
default:
|
|
premium_activated = false;
|
|
return;
|
|
}
|
|
|
|
int secret_fd = open("activation_key.txt", O_RDONLY);
|
|
if (secret_fd < 0) {
|
|
puts("Cannot open activation key file!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (read(secret_fd, activation_key, sizeof(activation_key)) < 0) {
|
|
puts("Cannot read reference activation key.");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
close(secret_fd);
|
|
|
|
printf("Then please enter your activation key:");
|
|
char buf[ACTIVATION_KEY_LEN] = {0};
|
|
|
|
ssize_t read_bytes = read(0, buf, sizeof(buf));
|
|
if (read_bytes <= 0) {
|
|
puts("Cannot read activation key from user!");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (buf[read_bytes - 1] == '\n') {
|
|
buf[read_bytes - 1] = 0;
|
|
}
|
|
|
|
premium_activated = memcmp(activation_key, buf, sizeof(activation_key)) == 0;
|
|
}
|
|
|
|
int main() {
|
|
setbuf(stdout, NULL);
|
|
setbuf(stdin, NULL);
|
|
|
|
puts("COPaaS - Compiler-oriented programming as a service");
|
|
|
|
check_premium();
|
|
if (premium_activated) {
|
|
puts("Using premium version! No sandbox for you!");
|
|
} else {
|
|
puts("Using the demo version!");
|
|
}
|
|
|
|
Instruction *program;
|
|
size_t program_len;
|
|
int exit_code;
|
|
|
|
while (true) {
|
|
program = get_program(&program_len);
|
|
if (!validate_program(program, program_len)) {
|
|
puts("Your program is not valid. You possibly use invalid opcodes or registers!");
|
|
free(program);
|
|
continue;
|
|
}
|
|
|
|
exit_code = run_jit(program, program_len);
|
|
|
|
printf("Your program exited with %d!\n", exit_code);
|
|
free(program);
|
|
}
|
|
}
|