Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 | /* * Copyright (c) 2020 Apple Inc. All rights reserved. * * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. The rights granted to you under the License * may not be used to create, or enable the creation or redistribution of, * unlawful or unlicensed copies of an Apple operating system, or to * circumvent, violate, or enable the circumvention or violation of, any * terms of an Apple operating system software license agreement. * * Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ */ #if DEVELOPMENT || DEBUG #if __has_feature(ptrauth_calls) #include <pexpert/pexpert.h> #include <mach/port.h> #include <mach/task.h> #include <kern/task.h> #include <vm/vm_map.h> #include <vm/pmap.h> #include <ipc/ipc_types.h> #include <ipc/ipc_port.h> #include <kern/ipc_kobject.h> #include <kern/kern_types.h> kern_return_t ptrauth_data_tests(void); /* * Given an existing PAC pointer (ptr), its declaration type (decl), the (key) * used to sign it and the string discriminator (discr), extract the raw pointer * along with the signature and compare it with one computed on the fly * via ptrauth_sign_unauthenticated(). * * If the two mismatch, return an error and fail the test. */ #define VALIDATE_PTR(decl, ptr, key, discr) { \ decl raw = *(decl *)&(ptr); \ decl cmp = ptrauth_sign_unauthenticated(ptr, key, \ ptrauth_blend_discriminator(&ptr, ptrauth_string_discriminator(discr))); \ if (cmp != raw) { \ printf("kern.run_pac_test: %s (%s) (discr=%s) is not signed as expected (%p vs %p)\n", #decl, #ptr, #discr, raw, cmp); \ kr = KERN_INVALID_ADDRESS; \ } \ } /* * Allocate the containing structure, and store a pointer to the desired member, * which should be subject to pointer signing. */ #define ALLOC_VALIDATE_DATA_PTR(structure, decl, member, discr) { \ structure *tmp = kalloc_data(sizeof(structure), Z_WAITOK | Z_ZERO); \ if (!tmp) return KERN_NO_SPACE; \ tmp->member = (void*)0xffffffff41414141; \ VALIDATE_DATA_PTR(decl, tmp->member, discr) \ kfree_data(tmp, sizeof(structure)); \ } #define VALIDATE_DATA_PTR(decl, ptr, discr) VALIDATE_PTR(decl, ptr, ptrauth_key_process_independent_data, discr) /* * Validate that a pointer that is supposed to be signed, is, and that the signature * matches based on signing key, location and discriminator */ kern_return_t ptrauth_data_tests(void) { int kr = KERN_SUCCESS; /* task_t */ ALLOC_VALIDATE_DATA_PTR(struct task, vm_map_t, map, "task.map"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_port *, itk_task_ports[0], "task.itk_task_ports"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_port *, itk_settable_self, "task.itk_settable_self"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_port *, itk_host, "task.itk_host"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_port *, itk_bootstrap, "task.itk_bootstrap"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_port *, itk_debug_control, "task.itk_debug_control"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_space *, itk_space, "task.itk_space"); ALLOC_VALIDATE_DATA_PTR(struct task, void *, bsd_info, "task.bsd_info"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_port *, itk_task_access, "task.itk_task_access"); ALLOC_VALIDATE_DATA_PTR(struct task, struct ipc_port *, itk_resume, "task.itk_resume"); /* _vm_map */ ALLOC_VALIDATE_DATA_PTR(struct _vm_map, pmap_t, pmap, "_vm_map.pmap"); /* ipc_port */ ALLOC_VALIDATE_DATA_PTR(struct ipc_port, ipc_kobject_label_t, ip_kolabel, "ipc_port.kolabel"); /* ipc_kobject_label */ ALLOC_VALIDATE_DATA_PTR(struct ipc_kobject_label, ipc_kobject_t, ikol_alt_port, "ipc_kobject_label.ikol_alt_port"); /* ipc_entry */ ALLOC_VALIDATE_DATA_PTR(struct ipc_entry, struct ipc_object *, ie_object, "ipc_entry.ie_object"); /* ipc_kmsg */ ALLOC_VALIDATE_DATA_PTR(struct ipc_kmsg, struct ipc_port *, ikm_prealloc, "kmsg.ikm_prealloc"); ALLOC_VALIDATE_DATA_PTR(struct ipc_kmsg, void *, ikm_data, "kmsg.ikm_data"); ALLOC_VALIDATE_DATA_PTR(struct ipc_kmsg, mach_msg_header_t *, ikm_header, "kmsg.ikm_header"); ALLOC_VALIDATE_DATA_PTR(struct ipc_kmsg, struct ipc_port *, ikm_voucher_port, "kmsg.ikm_voucher_port"); return kr; } #endif /* __has_feature(ptrauth_calls) */ #endif /* DEVELOPMENT || DEBUG */ |