xref: /xnu-10002.41.9/bsd/kern/code_signing/ppl.c (revision 699cd48037512bf4380799317ca44ca453c82f57)
1*699cd480SApple OSS Distributions /*
2*699cd480SApple OSS Distributions  * Copyright (c) 2022 Apple Computer, Inc. All rights reserved.
3*699cd480SApple OSS Distributions  *
4*699cd480SApple OSS Distributions  * @APPLE_LICENSE_HEADER_START@
5*699cd480SApple OSS Distributions  *
6*699cd480SApple OSS Distributions  * The contents of this file constitute Original Code as defined in and
7*699cd480SApple OSS Distributions  * are subject to the Apple Public Source License Version 1.1 (the
8*699cd480SApple OSS Distributions  * "License").  You may not use this file except in compliance with the
9*699cd480SApple OSS Distributions  * License.  Please obtain a copy of the License at
10*699cd480SApple OSS Distributions  * http://www.apple.com/publicsource and read it before using this file.
11*699cd480SApple OSS Distributions  *
12*699cd480SApple OSS Distributions  * This Original Code and all software distributed under the License are
13*699cd480SApple OSS Distributions  * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14*699cd480SApple OSS Distributions  * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15*699cd480SApple OSS Distributions  * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16*699cd480SApple OSS Distributions  * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT.  Please see the
17*699cd480SApple OSS Distributions  * License for the specific language governing rights and limitations
18*699cd480SApple OSS Distributions  * under the License.
19*699cd480SApple OSS Distributions  *
20*699cd480SApple OSS Distributions  * @APPLE_LICENSE_HEADER_END@
21*699cd480SApple OSS Distributions  */
22*699cd480SApple OSS Distributions 
23*699cd480SApple OSS Distributions #include <os/overflow.h>
24*699cd480SApple OSS Distributions #include <machine/atomic.h>
25*699cd480SApple OSS Distributions #include <mach/vm_param.h>
26*699cd480SApple OSS Distributions #include <vm/vm_kern.h>
27*699cd480SApple OSS Distributions #include <kern/zalloc.h>
28*699cd480SApple OSS Distributions #include <kern/kalloc.h>
29*699cd480SApple OSS Distributions #include <kern/assert.h>
30*699cd480SApple OSS Distributions #include <kern/locks.h>
31*699cd480SApple OSS Distributions #include <kern/lock_rw.h>
32*699cd480SApple OSS Distributions #include <libkern/libkern.h>
33*699cd480SApple OSS Distributions #include <libkern/section_keywords.h>
34*699cd480SApple OSS Distributions #include <libkern/coretrust/coretrust.h>
35*699cd480SApple OSS Distributions #include <pexpert/pexpert.h>
36*699cd480SApple OSS Distributions #include <sys/vm.h>
37*699cd480SApple OSS Distributions #include <sys/proc.h>
38*699cd480SApple OSS Distributions #include <sys/codesign.h>
39*699cd480SApple OSS Distributions #include <sys/code_signing.h>
40*699cd480SApple OSS Distributions #include <uuid/uuid.h>
41*699cd480SApple OSS Distributions #include <IOKit/IOBSD.h>
42*699cd480SApple OSS Distributions 
43*699cd480SApple OSS Distributions #if PMAP_CS_PPL_MONITOR
44*699cd480SApple OSS Distributions /*
45*699cd480SApple OSS Distributions  * The Page Protection Layer layer implements the PMAP_CS monitor environment which
46*699cd480SApple OSS Distributions  * provides code signing and memory isolation enforcements for data structures which
47*699cd480SApple OSS Distributions  * are critical to ensuring that all code executed on the system is authorized to do
48*699cd480SApple OSS Distributions  * so.
49*699cd480SApple OSS Distributions  *
50*699cd480SApple OSS Distributions  * Unless the data is managed by the PPL itself, XNU needs to page-align everything,
51*699cd480SApple OSS Distributions  * and then reference the memory as read-only.
52*699cd480SApple OSS Distributions  */
53*699cd480SApple OSS Distributions 
54*699cd480SApple OSS Distributions typedef uint64_t pmap_paddr_t __kernel_ptr_semantics;
55*699cd480SApple OSS Distributions extern vm_map_address_t phystokv(pmap_paddr_t pa);
56*699cd480SApple OSS Distributions extern pmap_paddr_t kvtophys_nofail(vm_offset_t va);
57*699cd480SApple OSS Distributions 
58*699cd480SApple OSS Distributions #pragma mark Initialization
59*699cd480SApple OSS Distributions 
60*699cd480SApple OSS Distributions void
code_signing_init()61*699cd480SApple OSS Distributions code_signing_init()
62*699cd480SApple OSS Distributions {
63*699cd480SApple OSS Distributions 	/* Does nothing */
64*699cd480SApple OSS Distributions }
65*699cd480SApple OSS Distributions 
66*699cd480SApple OSS Distributions #pragma mark Developer Mode
67*699cd480SApple OSS Distributions 
68*699cd480SApple OSS Distributions SECURITY_READ_ONLY_LATE(bool*) developer_mode_enabled = &ppl_developer_mode_storage;
69*699cd480SApple OSS Distributions 
70*699cd480SApple OSS Distributions void
ppl_toggle_developer_mode(bool state)71*699cd480SApple OSS Distributions ppl_toggle_developer_mode(
72*699cd480SApple OSS Distributions 	bool state)
73*699cd480SApple OSS Distributions {
74*699cd480SApple OSS Distributions 	pmap_toggle_developer_mode(state);
75*699cd480SApple OSS Distributions }
76*699cd480SApple OSS Distributions 
77*699cd480SApple OSS Distributions #pragma mark Code Signing and Provisioning Profiles
78*699cd480SApple OSS Distributions 
79*699cd480SApple OSS Distributions bool
ppl_code_signing_enabled(void)80*699cd480SApple OSS Distributions ppl_code_signing_enabled(void)
81*699cd480SApple OSS Distributions {
82*699cd480SApple OSS Distributions 	return pmap_cs_enabled();
83*699cd480SApple OSS Distributions }
84*699cd480SApple OSS Distributions 
85*699cd480SApple OSS Distributions kern_return_t
ppl_register_provisioning_profile(const void * profile_blob,const size_t profile_blob_size,void ** profile_obj)86*699cd480SApple OSS Distributions ppl_register_provisioning_profile(
87*699cd480SApple OSS Distributions 	const void *profile_blob,
88*699cd480SApple OSS Distributions 	const size_t profile_blob_size,
89*699cd480SApple OSS Distributions 	void **profile_obj)
90*699cd480SApple OSS Distributions {
91*699cd480SApple OSS Distributions 	pmap_profile_payload_t *pmap_payload = NULL;
92*699cd480SApple OSS Distributions 	vm_address_t payload_addr = 0;
93*699cd480SApple OSS Distributions 	vm_size_t payload_size = 0;
94*699cd480SApple OSS Distributions 	vm_size_t payload_size_aligned = 0;
95*699cd480SApple OSS Distributions 	kern_return_t ret = KERN_DENIED;
96*699cd480SApple OSS Distributions 
97*699cd480SApple OSS Distributions 	if (os_add_overflow(sizeof(*pmap_payload), profile_blob_size, &payload_size)) {
98*699cd480SApple OSS Distributions 		panic("attempted to load a too-large profile: %lu bytes", profile_blob_size);
99*699cd480SApple OSS Distributions 	}
100*699cd480SApple OSS Distributions 	payload_size_aligned = round_page(payload_size);
101*699cd480SApple OSS Distributions 
102*699cd480SApple OSS Distributions 	ret = kmem_alloc(kernel_map, &payload_addr, payload_size_aligned,
103*699cd480SApple OSS Distributions 	    KMA_KOBJECT | KMA_DATA | KMA_ZERO, VM_KERN_MEMORY_SECURITY);
104*699cd480SApple OSS Distributions 	if (ret != KERN_SUCCESS) {
105*699cd480SApple OSS Distributions 		printf("unable to allocate memory for pmap profile payload: %d\n", ret);
106*699cd480SApple OSS Distributions 		goto exit;
107*699cd480SApple OSS Distributions 	}
108*699cd480SApple OSS Distributions 
109*699cd480SApple OSS Distributions 	/* We need to setup the payload before we send it to the PPL */
110*699cd480SApple OSS Distributions 	pmap_payload = (pmap_profile_payload_t*)payload_addr;
111*699cd480SApple OSS Distributions 
112*699cd480SApple OSS Distributions 	pmap_payload->profile_blob_size = profile_blob_size;
113*699cd480SApple OSS Distributions 	memcpy(pmap_payload->profile_blob, profile_blob, profile_blob_size);
114*699cd480SApple OSS Distributions 
115*699cd480SApple OSS Distributions 	ret = pmap_register_provisioning_profile(payload_addr, payload_size_aligned);
116*699cd480SApple OSS Distributions 	if (ret == KERN_SUCCESS) {
117*699cd480SApple OSS Distributions 		*profile_obj = &pmap_payload->profile_obj_storage;
118*699cd480SApple OSS Distributions 		*profile_obj = (pmap_cs_profile_t*)phystokv(kvtophys_nofail((vm_offset_t)*profile_obj));
119*699cd480SApple OSS Distributions 	}
120*699cd480SApple OSS Distributions 
121*699cd480SApple OSS Distributions exit:
122*699cd480SApple OSS Distributions 	if ((ret != KERN_SUCCESS) && (payload_addr != 0)) {
123*699cd480SApple OSS Distributions 		kmem_free(kernel_map, payload_addr, payload_size_aligned);
124*699cd480SApple OSS Distributions 		payload_addr = 0;
125*699cd480SApple OSS Distributions 		payload_size_aligned = 0;
126*699cd480SApple OSS Distributions 	}
127*699cd480SApple OSS Distributions 
128*699cd480SApple OSS Distributions 	return ret;
129*699cd480SApple OSS Distributions }
130*699cd480SApple OSS Distributions 
131*699cd480SApple OSS Distributions kern_return_t
ppl_unregister_provisioning_profile(void * profile_obj)132*699cd480SApple OSS Distributions ppl_unregister_provisioning_profile(
133*699cd480SApple OSS Distributions 	void *profile_obj)
134*699cd480SApple OSS Distributions {
135*699cd480SApple OSS Distributions 	pmap_cs_profile_t *ppl_profile_obj = profile_obj;
136*699cd480SApple OSS Distributions 	kern_return_t ret = KERN_DENIED;
137*699cd480SApple OSS Distributions 
138*699cd480SApple OSS Distributions 	ret = pmap_unregister_provisioning_profile(ppl_profile_obj);
139*699cd480SApple OSS Distributions 	if (ret != KERN_SUCCESS) {
140*699cd480SApple OSS Distributions 		return ret;
141*699cd480SApple OSS Distributions 	}
142*699cd480SApple OSS Distributions 
143*699cd480SApple OSS Distributions 	/* Get the original payload address */
144*699cd480SApple OSS Distributions 	const pmap_profile_payload_t *pmap_payload = ppl_profile_obj->original_payload;
145*699cd480SApple OSS Distributions 	const vm_address_t payload_addr = (const vm_address_t)pmap_payload;
146*699cd480SApple OSS Distributions 
147*699cd480SApple OSS Distributions 	/* Get the original payload size */
148*699cd480SApple OSS Distributions 	vm_size_t payload_size = pmap_payload->profile_blob_size + sizeof(*pmap_payload);
149*699cd480SApple OSS Distributions 	payload_size = round_page(payload_size);
150*699cd480SApple OSS Distributions 
151*699cd480SApple OSS Distributions 	/* Free the payload */
152*699cd480SApple OSS Distributions 	kmem_free(kernel_map, payload_addr, payload_size);
153*699cd480SApple OSS Distributions 	pmap_payload = NULL;
154*699cd480SApple OSS Distributions 
155*699cd480SApple OSS Distributions 	return KERN_SUCCESS;
156*699cd480SApple OSS Distributions }
157*699cd480SApple OSS Distributions 
158*699cd480SApple OSS Distributions kern_return_t
ppl_associate_provisioning_profile(void * sig_obj,void * profile_obj)159*699cd480SApple OSS Distributions ppl_associate_provisioning_profile(
160*699cd480SApple OSS Distributions 	void *sig_obj,
161*699cd480SApple OSS Distributions 	void *profile_obj)
162*699cd480SApple OSS Distributions {
163*699cd480SApple OSS Distributions 	return pmap_associate_provisioning_profile(sig_obj, profile_obj);
164*699cd480SApple OSS Distributions }
165*699cd480SApple OSS Distributions 
166*699cd480SApple OSS Distributions kern_return_t
ppl_disassociate_provisioning_profile(void * sig_obj)167*699cd480SApple OSS Distributions ppl_disassociate_provisioning_profile(
168*699cd480SApple OSS Distributions 	void *sig_obj)
169*699cd480SApple OSS Distributions {
170*699cd480SApple OSS Distributions 	return pmap_disassociate_provisioning_profile(sig_obj);
171*699cd480SApple OSS Distributions }
172*699cd480SApple OSS Distributions 
173*699cd480SApple OSS Distributions void
ppl_set_compilation_service_cdhash(const uint8_t cdhash[CS_CDHASH_LEN])174*699cd480SApple OSS Distributions ppl_set_compilation_service_cdhash(
175*699cd480SApple OSS Distributions 	const uint8_t cdhash[CS_CDHASH_LEN])
176*699cd480SApple OSS Distributions {
177*699cd480SApple OSS Distributions 	pmap_set_compilation_service_cdhash(cdhash);
178*699cd480SApple OSS Distributions }
179*699cd480SApple OSS Distributions 
180*699cd480SApple OSS Distributions bool
ppl_match_compilation_service_cdhash(const uint8_t cdhash[CS_CDHASH_LEN])181*699cd480SApple OSS Distributions ppl_match_compilation_service_cdhash(
182*699cd480SApple OSS Distributions 	const uint8_t cdhash[CS_CDHASH_LEN])
183*699cd480SApple OSS Distributions {
184*699cd480SApple OSS Distributions 	return pmap_match_compilation_service_cdhash(cdhash);
185*699cd480SApple OSS Distributions }
186*699cd480SApple OSS Distributions 
187*699cd480SApple OSS Distributions void
ppl_set_local_signing_public_key(const uint8_t public_key[XNU_LOCAL_SIGNING_KEY_SIZE])188*699cd480SApple OSS Distributions ppl_set_local_signing_public_key(
189*699cd480SApple OSS Distributions 	const uint8_t public_key[XNU_LOCAL_SIGNING_KEY_SIZE])
190*699cd480SApple OSS Distributions {
191*699cd480SApple OSS Distributions 	return pmap_set_local_signing_public_key(public_key);
192*699cd480SApple OSS Distributions }
193*699cd480SApple OSS Distributions 
194*699cd480SApple OSS Distributions uint8_t*
ppl_get_local_signing_public_key(void)195*699cd480SApple OSS Distributions ppl_get_local_signing_public_key(void)
196*699cd480SApple OSS Distributions {
197*699cd480SApple OSS Distributions 	return pmap_get_local_signing_public_key();
198*699cd480SApple OSS Distributions }
199*699cd480SApple OSS Distributions 
200*699cd480SApple OSS Distributions void
ppl_unrestrict_local_signing_cdhash(const uint8_t cdhash[CS_CDHASH_LEN])201*699cd480SApple OSS Distributions ppl_unrestrict_local_signing_cdhash(
202*699cd480SApple OSS Distributions 	const uint8_t cdhash[CS_CDHASH_LEN])
203*699cd480SApple OSS Distributions {
204*699cd480SApple OSS Distributions 	pmap_unrestrict_local_signing(cdhash);
205*699cd480SApple OSS Distributions }
206*699cd480SApple OSS Distributions 
207*699cd480SApple OSS Distributions vm_size_t
ppl_managed_code_signature_size(void)208*699cd480SApple OSS Distributions ppl_managed_code_signature_size(void)
209*699cd480SApple OSS Distributions {
210*699cd480SApple OSS Distributions 	return pmap_cs_blob_limit;
211*699cd480SApple OSS Distributions }
212*699cd480SApple OSS Distributions 
213*699cd480SApple OSS Distributions kern_return_t
ppl_register_code_signature(const vm_address_t signature_addr,const vm_size_t signature_size,const vm_offset_t code_directory_offset,const char * signature_path,void ** sig_obj,vm_address_t * ppl_signature_addr)214*699cd480SApple OSS Distributions ppl_register_code_signature(
215*699cd480SApple OSS Distributions 	const vm_address_t signature_addr,
216*699cd480SApple OSS Distributions 	const vm_size_t signature_size,
217*699cd480SApple OSS Distributions 	const vm_offset_t code_directory_offset,
218*699cd480SApple OSS Distributions 	const char *signature_path,
219*699cd480SApple OSS Distributions 	void **sig_obj,
220*699cd480SApple OSS Distributions 	vm_address_t *ppl_signature_addr)
221*699cd480SApple OSS Distributions {
222*699cd480SApple OSS Distributions 	pmap_cs_code_directory_t *cd_entry = NULL;
223*699cd480SApple OSS Distributions 
224*699cd480SApple OSS Distributions 	/* PPL doesn't care about the signature path */
225*699cd480SApple OSS Distributions 	(void)signature_path;
226*699cd480SApple OSS Distributions 
227*699cd480SApple OSS Distributions 	kern_return_t ret = pmap_cs_register_code_signature_blob(
228*699cd480SApple OSS Distributions 		signature_addr,
229*699cd480SApple OSS Distributions 		signature_size,
230*699cd480SApple OSS Distributions 		code_directory_offset,
231*699cd480SApple OSS Distributions 		(pmap_cs_code_directory_t**)sig_obj);
232*699cd480SApple OSS Distributions 
233*699cd480SApple OSS Distributions 	if (ret != KERN_SUCCESS) {
234*699cd480SApple OSS Distributions 		return ret;
235*699cd480SApple OSS Distributions 	}
236*699cd480SApple OSS Distributions 	cd_entry = *((pmap_cs_code_directory_t**)sig_obj);
237*699cd480SApple OSS Distributions 
238*699cd480SApple OSS Distributions 	if (ppl_signature_addr) {
239*699cd480SApple OSS Distributions 		*ppl_signature_addr = (vm_address_t)cd_entry->superblob;
240*699cd480SApple OSS Distributions 	}
241*699cd480SApple OSS Distributions 
242*699cd480SApple OSS Distributions 	return KERN_SUCCESS;
243*699cd480SApple OSS Distributions }
244*699cd480SApple OSS Distributions 
245*699cd480SApple OSS Distributions kern_return_t
ppl_unregister_code_signature(void * sig_obj)246*699cd480SApple OSS Distributions ppl_unregister_code_signature(
247*699cd480SApple OSS Distributions 	void *sig_obj)
248*699cd480SApple OSS Distributions {
249*699cd480SApple OSS Distributions 	return pmap_cs_unregister_code_signature_blob(sig_obj);
250*699cd480SApple OSS Distributions }
251*699cd480SApple OSS Distributions 
252*699cd480SApple OSS Distributions kern_return_t
ppl_verify_code_signature(void * sig_obj)253*699cd480SApple OSS Distributions ppl_verify_code_signature(
254*699cd480SApple OSS Distributions 	void *sig_obj)
255*699cd480SApple OSS Distributions {
256*699cd480SApple OSS Distributions 	return pmap_cs_verify_code_signature_blob(sig_obj);
257*699cd480SApple OSS Distributions }
258*699cd480SApple OSS Distributions 
259*699cd480SApple OSS Distributions kern_return_t
ppl_reconstitute_code_signature(void * sig_obj,vm_address_t * unneeded_addr,vm_size_t * unneeded_size)260*699cd480SApple OSS Distributions ppl_reconstitute_code_signature(
261*699cd480SApple OSS Distributions 	void *sig_obj,
262*699cd480SApple OSS Distributions 	vm_address_t *unneeded_addr,
263*699cd480SApple OSS Distributions 	vm_size_t *unneeded_size)
264*699cd480SApple OSS Distributions {
265*699cd480SApple OSS Distributions 	return pmap_cs_unlock_unneeded_code_signature(
266*699cd480SApple OSS Distributions 		sig_obj,
267*699cd480SApple OSS Distributions 		unneeded_addr,
268*699cd480SApple OSS Distributions 		unneeded_size);
269*699cd480SApple OSS Distributions }
270*699cd480SApple OSS Distributions 
271*699cd480SApple OSS Distributions #pragma mark Address Spaces
272*699cd480SApple OSS Distributions 
273*699cd480SApple OSS Distributions kern_return_t
ppl_associate_code_signature(pmap_t pmap,void * sig_obj,const vm_address_t region_addr,const vm_size_t region_size,const vm_offset_t region_offset)274*699cd480SApple OSS Distributions ppl_associate_code_signature(
275*699cd480SApple OSS Distributions 	pmap_t pmap,
276*699cd480SApple OSS Distributions 	void *sig_obj,
277*699cd480SApple OSS Distributions 	const vm_address_t region_addr,
278*699cd480SApple OSS Distributions 	const vm_size_t region_size,
279*699cd480SApple OSS Distributions 	const vm_offset_t region_offset)
280*699cd480SApple OSS Distributions {
281*699cd480SApple OSS Distributions 	return pmap_cs_associate(
282*699cd480SApple OSS Distributions 		pmap,
283*699cd480SApple OSS Distributions 		sig_obj,
284*699cd480SApple OSS Distributions 		region_addr,
285*699cd480SApple OSS Distributions 		region_size,
286*699cd480SApple OSS Distributions 		region_offset);
287*699cd480SApple OSS Distributions }
288*699cd480SApple OSS Distributions 
289*699cd480SApple OSS Distributions kern_return_t
ppl_allow_jit_region(__unused pmap_t pmap)290*699cd480SApple OSS Distributions ppl_allow_jit_region(
291*699cd480SApple OSS Distributions 	__unused pmap_t pmap)
292*699cd480SApple OSS Distributions {
293*699cd480SApple OSS Distributions 	/* PPL does not support this API */
294*699cd480SApple OSS Distributions 	return KERN_NOT_SUPPORTED;
295*699cd480SApple OSS Distributions }
296*699cd480SApple OSS Distributions 
297*699cd480SApple OSS Distributions kern_return_t
ppl_associate_jit_region(pmap_t pmap,const vm_address_t region_addr,const vm_size_t region_size)298*699cd480SApple OSS Distributions ppl_associate_jit_region(
299*699cd480SApple OSS Distributions 	pmap_t pmap,
300*699cd480SApple OSS Distributions 	const vm_address_t region_addr,
301*699cd480SApple OSS Distributions 	const vm_size_t region_size)
302*699cd480SApple OSS Distributions {
303*699cd480SApple OSS Distributions 	return pmap_cs_associate(
304*699cd480SApple OSS Distributions 		pmap,
305*699cd480SApple OSS Distributions 		PMAP_CS_ASSOCIATE_JIT,
306*699cd480SApple OSS Distributions 		region_addr,
307*699cd480SApple OSS Distributions 		region_size,
308*699cd480SApple OSS Distributions 		0);
309*699cd480SApple OSS Distributions }
310*699cd480SApple OSS Distributions 
311*699cd480SApple OSS Distributions kern_return_t
ppl_associate_debug_region(pmap_t pmap,const vm_address_t region_addr,const vm_size_t region_size)312*699cd480SApple OSS Distributions ppl_associate_debug_region(
313*699cd480SApple OSS Distributions 	pmap_t pmap,
314*699cd480SApple OSS Distributions 	const vm_address_t region_addr,
315*699cd480SApple OSS Distributions 	const vm_size_t region_size)
316*699cd480SApple OSS Distributions {
317*699cd480SApple OSS Distributions 	return pmap_cs_associate(
318*699cd480SApple OSS Distributions 		pmap,
319*699cd480SApple OSS Distributions 		PMAP_CS_ASSOCIATE_COW,
320*699cd480SApple OSS Distributions 		region_addr,
321*699cd480SApple OSS Distributions 		region_size,
322*699cd480SApple OSS Distributions 		0);
323*699cd480SApple OSS Distributions }
324*699cd480SApple OSS Distributions 
325*699cd480SApple OSS Distributions kern_return_t
ppl_address_space_debugged(pmap_t pmap)326*699cd480SApple OSS Distributions ppl_address_space_debugged(
327*699cd480SApple OSS Distributions 	pmap_t pmap)
328*699cd480SApple OSS Distributions {
329*699cd480SApple OSS Distributions 	/*
330*699cd480SApple OSS Distributions 	 * ppl_associate_debug_region is a fairly idempotent function which simply
331*699cd480SApple OSS Distributions 	 * checks if an address space is already debugged or not and returns a value
332*699cd480SApple OSS Distributions 	 * based on that. The actual memory region is not inserted into the address
333*699cd480SApple OSS Distributions 	 * space, so we can pass whatever in this case. The only caveat here though
334*699cd480SApple OSS Distributions 	 * is that the memory region needs to be page-aligned and cannot be NULL.
335*699cd480SApple OSS Distributions 	 */
336*699cd480SApple OSS Distributions 	return ppl_associate_debug_region(pmap, PAGE_SIZE, PAGE_SIZE);
337*699cd480SApple OSS Distributions }
338*699cd480SApple OSS Distributions 
339*699cd480SApple OSS Distributions kern_return_t
ppl_allow_invalid_code(pmap_t pmap)340*699cd480SApple OSS Distributions ppl_allow_invalid_code(
341*699cd480SApple OSS Distributions 	pmap_t pmap)
342*699cd480SApple OSS Distributions {
343*699cd480SApple OSS Distributions 	return pmap_cs_allow_invalid(pmap);
344*699cd480SApple OSS Distributions }
345*699cd480SApple OSS Distributions 
346*699cd480SApple OSS Distributions kern_return_t
ppl_get_trust_level_kdp(pmap_t pmap,uint32_t * trust_level)347*699cd480SApple OSS Distributions ppl_get_trust_level_kdp(
348*699cd480SApple OSS Distributions 	pmap_t pmap,
349*699cd480SApple OSS Distributions 	uint32_t *trust_level)
350*699cd480SApple OSS Distributions {
351*699cd480SApple OSS Distributions 	return pmap_get_trust_level_kdp(pmap, trust_level);
352*699cd480SApple OSS Distributions }
353*699cd480SApple OSS Distributions 
354*699cd480SApple OSS Distributions kern_return_t
ppl_address_space_exempt(const pmap_t pmap)355*699cd480SApple OSS Distributions ppl_address_space_exempt(
356*699cd480SApple OSS Distributions 	const pmap_t pmap)
357*699cd480SApple OSS Distributions {
358*699cd480SApple OSS Distributions 	if (pmap_performs_stage2_translations(pmap) == true) {
359*699cd480SApple OSS Distributions 		return KERN_SUCCESS;
360*699cd480SApple OSS Distributions 	}
361*699cd480SApple OSS Distributions 
362*699cd480SApple OSS Distributions 	return KERN_DENIED;
363*699cd480SApple OSS Distributions }
364*699cd480SApple OSS Distributions 
365*699cd480SApple OSS Distributions kern_return_t
ppl_fork_prepare(pmap_t old_pmap,pmap_t new_pmap)366*699cd480SApple OSS Distributions ppl_fork_prepare(
367*699cd480SApple OSS Distributions 	pmap_t old_pmap,
368*699cd480SApple OSS Distributions 	pmap_t new_pmap)
369*699cd480SApple OSS Distributions {
370*699cd480SApple OSS Distributions 	return pmap_cs_fork_prepare(old_pmap, new_pmap);
371*699cd480SApple OSS Distributions }
372*699cd480SApple OSS Distributions 
373*699cd480SApple OSS Distributions kern_return_t
ppl_acquire_signing_identifier(const void * sig_obj,const char ** signing_id)374*699cd480SApple OSS Distributions ppl_acquire_signing_identifier(
375*699cd480SApple OSS Distributions 	const void *sig_obj,
376*699cd480SApple OSS Distributions 	const char **signing_id)
377*699cd480SApple OSS Distributions {
378*699cd480SApple OSS Distributions 	const pmap_cs_code_directory_t *cd_entry = sig_obj;
379*699cd480SApple OSS Distributions 
380*699cd480SApple OSS Distributions 	/* If we reach here, the identifier must have been setup */
381*699cd480SApple OSS Distributions 	assert(cd_entry->identifier != NULL);
382*699cd480SApple OSS Distributions 
383*699cd480SApple OSS Distributions 	if (signing_id) {
384*699cd480SApple OSS Distributions 		*signing_id = cd_entry->identifier;
385*699cd480SApple OSS Distributions 	}
386*699cd480SApple OSS Distributions 
387*699cd480SApple OSS Distributions 	return KERN_SUCCESS;
388*699cd480SApple OSS Distributions }
389*699cd480SApple OSS Distributions 
390*699cd480SApple OSS Distributions #pragma mark Entitlements
391*699cd480SApple OSS Distributions 
392*699cd480SApple OSS Distributions kern_return_t
ppl_associate_kernel_entitlements(void * sig_obj,const void * kernel_entitlements)393*699cd480SApple OSS Distributions ppl_associate_kernel_entitlements(
394*699cd480SApple OSS Distributions 	void *sig_obj,
395*699cd480SApple OSS Distributions 	const void *kernel_entitlements)
396*699cd480SApple OSS Distributions {
397*699cd480SApple OSS Distributions 	pmap_cs_code_directory_t *cd_entry = sig_obj;
398*699cd480SApple OSS Distributions 	return pmap_associate_kernel_entitlements(cd_entry, kernel_entitlements);
399*699cd480SApple OSS Distributions }
400*699cd480SApple OSS Distributions 
401*699cd480SApple OSS Distributions kern_return_t
ppl_resolve_kernel_entitlements(pmap_t pmap,const void ** kernel_entitlements)402*699cd480SApple OSS Distributions ppl_resolve_kernel_entitlements(
403*699cd480SApple OSS Distributions 	pmap_t pmap,
404*699cd480SApple OSS Distributions 	const void **kernel_entitlements)
405*699cd480SApple OSS Distributions {
406*699cd480SApple OSS Distributions 	kern_return_t ret = KERN_DENIED;
407*699cd480SApple OSS Distributions 	const void *entitlements = NULL;
408*699cd480SApple OSS Distributions 
409*699cd480SApple OSS Distributions 	ret = pmap_resolve_kernel_entitlements(pmap, &entitlements);
410*699cd480SApple OSS Distributions 	if ((ret == KERN_SUCCESS) && (kernel_entitlements != NULL)) {
411*699cd480SApple OSS Distributions 		*kernel_entitlements = entitlements;
412*699cd480SApple OSS Distributions 	}
413*699cd480SApple OSS Distributions 
414*699cd480SApple OSS Distributions 	return ret;
415*699cd480SApple OSS Distributions }
416*699cd480SApple OSS Distributions 
417*699cd480SApple OSS Distributions kern_return_t
ppl_accelerate_entitlements(void * sig_obj,CEQueryContext_t * ce_ctx)418*699cd480SApple OSS Distributions ppl_accelerate_entitlements(
419*699cd480SApple OSS Distributions 	void *sig_obj,
420*699cd480SApple OSS Distributions 	CEQueryContext_t *ce_ctx)
421*699cd480SApple OSS Distributions {
422*699cd480SApple OSS Distributions 	pmap_cs_code_directory_t *cd_entry = sig_obj;
423*699cd480SApple OSS Distributions 	kern_return_t ret = KERN_DENIED;
424*699cd480SApple OSS Distributions 
425*699cd480SApple OSS Distributions 	ret = pmap_accelerate_entitlements(cd_entry);
426*699cd480SApple OSS Distributions 
427*699cd480SApple OSS Distributions 	/*
428*699cd480SApple OSS Distributions 	 * We only ever get KERN_ABORTED when we cannot accelerate the entitlements
429*699cd480SApple OSS Distributions 	 * because it would consume too much memory. In this case, we still want to
430*699cd480SApple OSS Distributions 	 * return the ce_ctx since we don't want the system to fall-back to non-PPL
431*699cd480SApple OSS Distributions 	 * locked down memory, so we switch this to a success case.
432*699cd480SApple OSS Distributions 	 */
433*699cd480SApple OSS Distributions 	if (ret == KERN_ABORTED) {
434*699cd480SApple OSS Distributions 		ret = KERN_SUCCESS;
435*699cd480SApple OSS Distributions 	}
436*699cd480SApple OSS Distributions 
437*699cd480SApple OSS Distributions 	/* Return the accelerated context to the caller */
438*699cd480SApple OSS Distributions 	if ((ret == KERN_SUCCESS) && (ce_ctx != NULL)) {
439*699cd480SApple OSS Distributions 		*ce_ctx = cd_entry->ce_ctx;
440*699cd480SApple OSS Distributions 	}
441*699cd480SApple OSS Distributions 
442*699cd480SApple OSS Distributions 	return ret;
443*699cd480SApple OSS Distributions }
444*699cd480SApple OSS Distributions 
445*699cd480SApple OSS Distributions #pragma mark Image4
446*699cd480SApple OSS Distributions 
447*699cd480SApple OSS Distributions void*
ppl_image4_storage_data(size_t * allocated_size)448*699cd480SApple OSS Distributions ppl_image4_storage_data(
449*699cd480SApple OSS Distributions 	size_t *allocated_size)
450*699cd480SApple OSS Distributions {
451*699cd480SApple OSS Distributions 	return pmap_image4_pmap_data(allocated_size);
452*699cd480SApple OSS Distributions }
453*699cd480SApple OSS Distributions 
454*699cd480SApple OSS Distributions void
ppl_image4_set_nonce(const img4_nonce_domain_index_t ndi,const img4_nonce_t * nonce)455*699cd480SApple OSS Distributions ppl_image4_set_nonce(
456*699cd480SApple OSS Distributions 	const img4_nonce_domain_index_t ndi,
457*699cd480SApple OSS Distributions 	const img4_nonce_t *nonce)
458*699cd480SApple OSS Distributions {
459*699cd480SApple OSS Distributions 	return pmap_image4_set_nonce(ndi, nonce);
460*699cd480SApple OSS Distributions }
461*699cd480SApple OSS Distributions 
462*699cd480SApple OSS Distributions void
ppl_image4_roll_nonce(const img4_nonce_domain_index_t ndi)463*699cd480SApple OSS Distributions ppl_image4_roll_nonce(
464*699cd480SApple OSS Distributions 	const img4_nonce_domain_index_t ndi)
465*699cd480SApple OSS Distributions {
466*699cd480SApple OSS Distributions 	return pmap_image4_roll_nonce(ndi);
467*699cd480SApple OSS Distributions }
468*699cd480SApple OSS Distributions 
469*699cd480SApple OSS Distributions errno_t
ppl_image4_copy_nonce(const img4_nonce_domain_index_t ndi,img4_nonce_t * nonce_out)470*699cd480SApple OSS Distributions ppl_image4_copy_nonce(
471*699cd480SApple OSS Distributions 	const img4_nonce_domain_index_t ndi,
472*699cd480SApple OSS Distributions 	img4_nonce_t *nonce_out)
473*699cd480SApple OSS Distributions {
474*699cd480SApple OSS Distributions 	return pmap_image4_copy_nonce(ndi, nonce_out);
475*699cd480SApple OSS Distributions }
476*699cd480SApple OSS Distributions 
477*699cd480SApple OSS Distributions errno_t
ppl_image4_execute_object(img4_runtime_object_spec_index_t obj_spec_index,const img4_buff_t * payload,const img4_buff_t * manifest)478*699cd480SApple OSS Distributions ppl_image4_execute_object(
479*699cd480SApple OSS Distributions 	img4_runtime_object_spec_index_t obj_spec_index,
480*699cd480SApple OSS Distributions 	const img4_buff_t *payload,
481*699cd480SApple OSS Distributions 	const img4_buff_t *manifest)
482*699cd480SApple OSS Distributions {
483*699cd480SApple OSS Distributions 	errno_t err = EINVAL;
484*699cd480SApple OSS Distributions 	kern_return_t kr = KERN_DENIED;
485*699cd480SApple OSS Distributions 	img4_buff_t payload_aligned = IMG4_BUFF_INIT;
486*699cd480SApple OSS Distributions 	img4_buff_t manifest_aligned = IMG4_BUFF_INIT;
487*699cd480SApple OSS Distributions 	vm_address_t payload_addr = 0;
488*699cd480SApple OSS Distributions 	vm_size_t payload_len_aligned = 0;
489*699cd480SApple OSS Distributions 	vm_address_t manifest_addr = 0;
490*699cd480SApple OSS Distributions 	vm_size_t manifest_len_aligned = 0;
491*699cd480SApple OSS Distributions 
492*699cd480SApple OSS Distributions 	if (payload == NULL) {
493*699cd480SApple OSS Distributions 		printf("invalid object execution request: no payload\n");
494*699cd480SApple OSS Distributions 		goto out;
495*699cd480SApple OSS Distributions 	}
496*699cd480SApple OSS Distributions 
497*699cd480SApple OSS Distributions 	/*
498*699cd480SApple OSS Distributions 	 * The PPL will attempt to lockdown both the payload and the manifest before executing
499*699cd480SApple OSS Distributions 	 * the object. In order for that to happen, both the artifacts need to be page-aligned.
500*699cd480SApple OSS Distributions 	 */
501*699cd480SApple OSS Distributions 	payload_len_aligned = round_page(payload->i4b_len);
502*699cd480SApple OSS Distributions 	if (manifest != NULL) {
503*699cd480SApple OSS Distributions 		manifest_len_aligned = round_page(manifest->i4b_len);
504*699cd480SApple OSS Distributions 	}
505*699cd480SApple OSS Distributions 
506*699cd480SApple OSS Distributions 	kr = kmem_alloc(
507*699cd480SApple OSS Distributions 		kernel_map,
508*699cd480SApple OSS Distributions 		&payload_addr,
509*699cd480SApple OSS Distributions 		payload_len_aligned,
510*699cd480SApple OSS Distributions 		KMA_KOBJECT,
511*699cd480SApple OSS Distributions 		VM_KERN_MEMORY_SECURITY);
512*699cd480SApple OSS Distributions 
513*699cd480SApple OSS Distributions 	if (kr != KERN_SUCCESS) {
514*699cd480SApple OSS Distributions 		printf("unable to allocate memory for image4 payload: %d\n", kr);
515*699cd480SApple OSS Distributions 		err = ENOMEM;
516*699cd480SApple OSS Distributions 		goto out;
517*699cd480SApple OSS Distributions 	}
518*699cd480SApple OSS Distributions 
519*699cd480SApple OSS Distributions 	/* Copy in the payload */
520*699cd480SApple OSS Distributions 	memcpy((uint8_t*)payload_addr, payload->i4b_bytes, payload->i4b_len);
521*699cd480SApple OSS Distributions 
522*699cd480SApple OSS Distributions 	/* Construct the aligned payload buffer */
523*699cd480SApple OSS Distributions 	payload_aligned.i4b_bytes = (uint8_t*)payload_addr;
524*699cd480SApple OSS Distributions 	payload_aligned.i4b_len = payload->i4b_len;
525*699cd480SApple OSS Distributions 
526*699cd480SApple OSS Distributions 	if (manifest != NULL) {
527*699cd480SApple OSS Distributions 		kr = kmem_alloc(
528*699cd480SApple OSS Distributions 			kernel_map,
529*699cd480SApple OSS Distributions 			&manifest_addr,
530*699cd480SApple OSS Distributions 			manifest_len_aligned,
531*699cd480SApple OSS Distributions 			KMA_KOBJECT,
532*699cd480SApple OSS Distributions 			VM_KERN_MEMORY_SECURITY);
533*699cd480SApple OSS Distributions 
534*699cd480SApple OSS Distributions 		if (kr != KERN_SUCCESS) {
535*699cd480SApple OSS Distributions 			printf("unable to allocate memory for image4 manifest: %d\n", kr);
536*699cd480SApple OSS Distributions 			err = ENOMEM;
537*699cd480SApple OSS Distributions 			goto out;
538*699cd480SApple OSS Distributions 		}
539*699cd480SApple OSS Distributions 
540*699cd480SApple OSS Distributions 		/* Construct the aligned manifest buffer */
541*699cd480SApple OSS Distributions 		manifest_aligned.i4b_bytes = (uint8_t*)manifest_addr;
542*699cd480SApple OSS Distributions 		manifest_aligned.i4b_len = manifest->i4b_len;
543*699cd480SApple OSS Distributions 
544*699cd480SApple OSS Distributions 		/* Copy in the manifest */
545*699cd480SApple OSS Distributions 		memcpy((uint8_t*)manifest_addr, manifest->i4b_bytes, manifest->i4b_len);
546*699cd480SApple OSS Distributions 	}
547*699cd480SApple OSS Distributions 
548*699cd480SApple OSS Distributions 	err = pmap_image4_execute_object(obj_spec_index, &payload_aligned, &manifest_aligned);
549*699cd480SApple OSS Distributions 	if (err != 0) {
550*699cd480SApple OSS Distributions 		printf("unable to execute image4 object: %d\n", err);
551*699cd480SApple OSS Distributions 		goto out;
552*699cd480SApple OSS Distributions 	}
553*699cd480SApple OSS Distributions 
554*699cd480SApple OSS Distributions out:
555*699cd480SApple OSS Distributions 	/* We always free the manifest as it isn't required anymore */
556*699cd480SApple OSS Distributions 	if (manifest_addr != 0) {
557*699cd480SApple OSS Distributions 		kmem_free(kernel_map, manifest_addr, manifest_len_aligned);
558*699cd480SApple OSS Distributions 		manifest_addr = 0;
559*699cd480SApple OSS Distributions 		manifest_len_aligned = 0;
560*699cd480SApple OSS Distributions 	}
561*699cd480SApple OSS Distributions 
562*699cd480SApple OSS Distributions 	/* If we encountered an error -- free the allocated payload */
563*699cd480SApple OSS Distributions 	if ((err != 0) && (payload_addr != 0)) {
564*699cd480SApple OSS Distributions 		kmem_free(kernel_map, payload_addr, payload_len_aligned);
565*699cd480SApple OSS Distributions 		payload_addr = 0;
566*699cd480SApple OSS Distributions 		payload_len_aligned = 0;
567*699cd480SApple OSS Distributions 	}
568*699cd480SApple OSS Distributions 
569*699cd480SApple OSS Distributions 	return err;
570*699cd480SApple OSS Distributions }
571*699cd480SApple OSS Distributions 
572*699cd480SApple OSS Distributions errno_t
ppl_image4_copy_object(img4_runtime_object_spec_index_t obj_spec_index,vm_address_t object_out,size_t * object_length)573*699cd480SApple OSS Distributions ppl_image4_copy_object(
574*699cd480SApple OSS Distributions 	img4_runtime_object_spec_index_t obj_spec_index,
575*699cd480SApple OSS Distributions 	vm_address_t object_out,
576*699cd480SApple OSS Distributions 	size_t *object_length)
577*699cd480SApple OSS Distributions {
578*699cd480SApple OSS Distributions 	errno_t err = EINVAL;
579*699cd480SApple OSS Distributions 	kern_return_t kr = KERN_DENIED;
580*699cd480SApple OSS Distributions 	vm_address_t object_addr = 0;
581*699cd480SApple OSS Distributions 	vm_size_t object_len_aligned = 0;
582*699cd480SApple OSS Distributions 
583*699cd480SApple OSS Distributions 	if (object_out == 0) {
584*699cd480SApple OSS Distributions 		printf("invalid object copy request: no object input buffer\n");
585*699cd480SApple OSS Distributions 		goto out;
586*699cd480SApple OSS Distributions 	} else if (object_length == NULL) {
587*699cd480SApple OSS Distributions 		printf("invalid object copy request: no object input length\n");
588*699cd480SApple OSS Distributions 		goto out;
589*699cd480SApple OSS Distributions 	}
590*699cd480SApple OSS Distributions 
591*699cd480SApple OSS Distributions 	/*
592*699cd480SApple OSS Distributions 	 * The PPL will attempt to pin the input buffer in order to ensure that the kernel
593*699cd480SApple OSS Distributions 	 * didn't pass in PPL-owned buffers. The PPL cannot pin the same page more than once,
594*699cd480SApple OSS Distributions 	 * and attempting to do so will panic the system. Hence, we allocate fresh pages for
595*699cd480SApple OSS Distributions 	 * for the PPL to pin.
596*699cd480SApple OSS Distributions 	 *
597*699cd480SApple OSS Distributions 	 * We can send in the address for the length pointer since that is allocated on the
598*699cd480SApple OSS Distributions 	 * stack, so the PPL can pin our stack for the duration of the call as no other
599*699cd480SApple OSS Distributions 	 * thread can be using our stack, meaning the PPL will never attempt to double-pin
600*699cd480SApple OSS Distributions 	 * the page.
601*699cd480SApple OSS Distributions 	 */
602*699cd480SApple OSS Distributions 	object_len_aligned = round_page(*object_length);
603*699cd480SApple OSS Distributions 
604*699cd480SApple OSS Distributions 	kr = kmem_alloc(
605*699cd480SApple OSS Distributions 		kernel_map,
606*699cd480SApple OSS Distributions 		&object_addr,
607*699cd480SApple OSS Distributions 		object_len_aligned,
608*699cd480SApple OSS Distributions 		KMA_KOBJECT,
609*699cd480SApple OSS Distributions 		VM_KERN_MEMORY_SECURITY);
610*699cd480SApple OSS Distributions 
611*699cd480SApple OSS Distributions 	if (kr != KERN_SUCCESS) {
612*699cd480SApple OSS Distributions 		printf("unable to allocate memory for image4 object: %d\n", kr);
613*699cd480SApple OSS Distributions 		err = ENOMEM;
614*699cd480SApple OSS Distributions 		goto out;
615*699cd480SApple OSS Distributions 	}
616*699cd480SApple OSS Distributions 
617*699cd480SApple OSS Distributions 	err = pmap_image4_copy_object(obj_spec_index, object_addr, object_length);
618*699cd480SApple OSS Distributions 	if (err != 0) {
619*699cd480SApple OSS Distributions 		printf("unable to copy image4 object: %d\n", err);
620*699cd480SApple OSS Distributions 		goto out;
621*699cd480SApple OSS Distributions 	}
622*699cd480SApple OSS Distributions 
623*699cd480SApple OSS Distributions 	/* Copy the data back into the caller passed buffer */
624*699cd480SApple OSS Distributions 	memcpy((void*)object_out, (void*)object_addr, *object_length);
625*699cd480SApple OSS Distributions 
626*699cd480SApple OSS Distributions out:
627*699cd480SApple OSS Distributions 	/* We don't ever need to keep around our page-aligned buffer */
628*699cd480SApple OSS Distributions 	if (object_addr != 0) {
629*699cd480SApple OSS Distributions 		kmem_free(kernel_map, object_addr, object_len_aligned);
630*699cd480SApple OSS Distributions 		object_addr = 0;
631*699cd480SApple OSS Distributions 		object_len_aligned = 0;
632*699cd480SApple OSS Distributions 	}
633*699cd480SApple OSS Distributions 
634*699cd480SApple OSS Distributions 	return err;
635*699cd480SApple OSS Distributions }
636*699cd480SApple OSS Distributions 
637*699cd480SApple OSS Distributions const void*
ppl_image4_get_monitor_exports(void)638*699cd480SApple OSS Distributions ppl_image4_get_monitor_exports(void)
639*699cd480SApple OSS Distributions {
640*699cd480SApple OSS Distributions 	/*
641*699cd480SApple OSS Distributions 	 * AppleImage4 can query the PMAP_CS runtime on its own since the PMAP_CS
642*699cd480SApple OSS Distributions 	 * runtime is compiled within the kernel extension itself. As a result, we
643*699cd480SApple OSS Distributions 	 * never expect this KPI to be called when the system uses the PPL monitor.
644*699cd480SApple OSS Distributions 	 */
645*699cd480SApple OSS Distributions 
646*699cd480SApple OSS Distributions 	printf("explicit monitor-exports-get not required for the PPL\n");
647*699cd480SApple OSS Distributions 	return NULL;
648*699cd480SApple OSS Distributions }
649*699cd480SApple OSS Distributions 
650*699cd480SApple OSS Distributions errno_t
ppl_image4_set_release_type(__unused const char * release_type)651*699cd480SApple OSS Distributions ppl_image4_set_release_type(
652*699cd480SApple OSS Distributions 	__unused const char *release_type)
653*699cd480SApple OSS Distributions {
654*699cd480SApple OSS Distributions 	/*
655*699cd480SApple OSS Distributions 	 * AppleImage4 stores the release type in the CTRR protected memory region
656*699cd480SApple OSS Distributions 	 * of its kernel extension. This is accessible by the PMAP_CS runtime as the
657*699cd480SApple OSS Distributions 	 * runtime is compiled alongside the kernel extension. As a result, we never
658*699cd480SApple OSS Distributions 	 * expect this KPI to be called when the system uses the PPL monitor.
659*699cd480SApple OSS Distributions 	 */
660*699cd480SApple OSS Distributions 
661*699cd480SApple OSS Distributions 	printf("explicit release-type-set set not required for the PPL\n");
662*699cd480SApple OSS Distributions 	return ENOTSUP;
663*699cd480SApple OSS Distributions }
664*699cd480SApple OSS Distributions 
665*699cd480SApple OSS Distributions errno_t
ppl_image4_set_bnch_shadow(__unused const img4_nonce_domain_index_t ndi)666*699cd480SApple OSS Distributions ppl_image4_set_bnch_shadow(
667*699cd480SApple OSS Distributions 	__unused const img4_nonce_domain_index_t ndi)
668*699cd480SApple OSS Distributions {
669*699cd480SApple OSS Distributions 	/*
670*699cd480SApple OSS Distributions 	 * AppleImage4 stores the BNCH shadow in the CTRR protected memory region
671*699cd480SApple OSS Distributions 	 * of its kernel extension. This is accessible by the PMAP_CS runtime as the
672*699cd480SApple OSS Distributions 	 * runtime is compiled alongside the kernel extension. As a result, we never
673*699cd480SApple OSS Distributions 	 * expect this KPI to be called when the system uses the PPL monitor.
674*699cd480SApple OSS Distributions 	 */
675*699cd480SApple OSS Distributions 
676*699cd480SApple OSS Distributions 	printf("explicit BNCH-shadow-set not required for the PPL\n");
677*699cd480SApple OSS Distributions 	return ENOTSUP;
678*699cd480SApple OSS Distributions }
679*699cd480SApple OSS Distributions 
680*699cd480SApple OSS Distributions #endif /* PMAP_CS_PPL_MONITOR */
681