1*0f4c859eSApple OSS Distributions /* 2*0f4c859eSApple OSS Distributions * Copyright (c) 2000-2021 Apple Inc. All rights reserved. 3*0f4c859eSApple OSS Distributions * 4*0f4c859eSApple OSS Distributions * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ 5*0f4c859eSApple OSS Distributions * 6*0f4c859eSApple OSS Distributions * This file contains Original Code and/or Modifications of Original Code 7*0f4c859eSApple OSS Distributions * as defined in and that are subject to the Apple Public Source License 8*0f4c859eSApple OSS Distributions * Version 2.0 (the 'License'). You may not use this file except in 9*0f4c859eSApple OSS Distributions * compliance with the License. The rights granted to you under the License 10*0f4c859eSApple OSS Distributions * may not be used to create, or enable the creation or redistribution of, 11*0f4c859eSApple OSS Distributions * unlawful or unlicensed copies of an Apple operating system, or to 12*0f4c859eSApple OSS Distributions * circumvent, violate, or enable the circumvention or violation of, any 13*0f4c859eSApple OSS Distributions * terms of an Apple operating system software license agreement. 14*0f4c859eSApple OSS Distributions * 15*0f4c859eSApple OSS Distributions * Please obtain a copy of the License at 16*0f4c859eSApple OSS Distributions * http://www.opensource.apple.com/apsl/ and read it before using this file. 17*0f4c859eSApple OSS Distributions * 18*0f4c859eSApple OSS Distributions * The Original Code and all software distributed under the License are 19*0f4c859eSApple OSS Distributions * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER 20*0f4c859eSApple OSS Distributions * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, 21*0f4c859eSApple OSS Distributions * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, 22*0f4c859eSApple OSS Distributions * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. 23*0f4c859eSApple OSS Distributions * Please see the License for the specific language governing rights and 24*0f4c859eSApple OSS Distributions * limitations under the License. 25*0f4c859eSApple OSS Distributions * 26*0f4c859eSApple OSS Distributions * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ 27*0f4c859eSApple OSS Distributions */ 28*0f4c859eSApple OSS Distributions 29*0f4c859eSApple OSS Distributions #ifndef _KASAN_INTERNAL_H_ 30*0f4c859eSApple OSS Distributions #define _KASAN_INTERNAL_H_ 31*0f4c859eSApple OSS Distributions 32*0f4c859eSApple OSS Distributions #include <stdbool.h> 33*0f4c859eSApple OSS Distributions #include <mach/mach_vm.h> 34*0f4c859eSApple OSS Distributions #include <kern/zalloc.h> 35*0f4c859eSApple OSS Distributions #include <sys/sysctl.h> 36*0f4c859eSApple OSS Distributions 37*0f4c859eSApple OSS Distributions typedef uintptr_t uptr; 38*0f4c859eSApple OSS Distributions #define MiB(x) ((x) * 1024UL * 1024) 39*0f4c859eSApple OSS Distributions #define BIT(x) (1U << (x)) 40*0f4c859eSApple OSS Distributions 41*0f4c859eSApple OSS Distributions /* Sanity checks */ 42*0f4c859eSApple OSS Distributions #ifndef KASAN 43*0f4c859eSApple OSS Distributions #error KASAN undefined 44*0f4c859eSApple OSS Distributions #endif 45*0f4c859eSApple OSS Distributions 46*0f4c859eSApple OSS Distributions #ifndef KASAN_OFFSET 47*0f4c859eSApple OSS Distributions #error KASAN_OFFSET undefined 48*0f4c859eSApple OSS Distributions #endif 49*0f4c859eSApple OSS Distributions 50*0f4c859eSApple OSS Distributions #ifndef KASAN_SCALE 51*0f4c859eSApple OSS Distributions #error KASAN_SCALE undefined 52*0f4c859eSApple OSS Distributions #endif 53*0f4c859eSApple OSS Distributions 54*0f4c859eSApple OSS Distributions #if defined(__x86_64__) 55*0f4c859eSApple OSS Distributions # define _JBLEN ((9 * 2) + 3 + 16) 56*0f4c859eSApple OSS Distributions #elif defined(__arm64__) 57*0f4c859eSApple OSS Distributions # define _JBLEN ((14 + 8 + 2) * 2) 58*0f4c859eSApple OSS Distributions #else 59*0f4c859eSApple OSS Distributions # error "Unknown arch" 60*0f4c859eSApple OSS Distributions #endif 61*0f4c859eSApple OSS Distributions 62*0f4c859eSApple OSS Distributions #if KASAN_DEBUG 63*0f4c859eSApple OSS Distributions #define NOINLINE OS_NOINLINE 64*0f4c859eSApple OSS Distributions #else 65*0f4c859eSApple OSS Distributions #define NOINLINE 66*0f4c859eSApple OSS Distributions #endif 67*0f4c859eSApple OSS Distributions #define ALWAYS_INLINE inline __attribute__((always_inline)) 68*0f4c859eSApple OSS Distributions #define CLANG_MIN_VERSION(x) (defined(__apple_build_version__) && (__apple_build_version__ >= (x))) 69*0f4c859eSApple OSS Distributions 70*0f4c859eSApple OSS Distributions #if KASAN_CLASSIC 71*0f4c859eSApple OSS Distributions #define KASAN_MODEL_STR "kasan-classic" 72*0f4c859eSApple OSS Distributions #define KASAN_STRIP_ADDR(_x) (_x) 73*0f4c859eSApple OSS Distributions #elif KASAN_TBI 74*0f4c859eSApple OSS Distributions #define KASAN_MODEL_STR "kasan-tbi" 75*0f4c859eSApple OSS Distributions #define KASAN_STRIP_ADDR(_x) (VM_KERNEL_STRIP_UPTR(_x)) 76*0f4c859eSApple OSS Distributions #else 77*0f4c859eSApple OSS Distributions #error "No kasan model specified" 78*0f4c859eSApple OSS Distributions #endif /* KASAN_CLASSIC || KASAN_TBI */ 79*0f4c859eSApple OSS Distributions 80*0f4c859eSApple OSS Distributions extern vm_address_t kernel_vbase; 81*0f4c859eSApple OSS Distributions extern vm_address_t kernel_vtop; 82*0f4c859eSApple OSS Distributions extern unsigned shadow_pages_used; 83*0f4c859eSApple OSS Distributions 84*0f4c859eSApple OSS Distributions /* boot-arg configurable */ 85*0f4c859eSApple OSS Distributions extern unsigned kasan_enabled; 86*0f4c859eSApple OSS Distributions extern int fakestack_enabled; 87*0f4c859eSApple OSS Distributions extern bool report_suppressed_checks; 88*0f4c859eSApple OSS Distributions 89*0f4c859eSApple OSS Distributions #define KASAN_GRANULE (1UL << KASAN_SCALE) 90*0f4c859eSApple OSS Distributions #define KASAN_GRANULE_MASK (KASAN_GRANULE - 1UL) 91*0f4c859eSApple OSS Distributions #define kasan_granule_trunc(x) (x & ~KASAN_GRANULE_MASK) 92*0f4c859eSApple OSS Distributions #define kasan_granule_round(x) ((x + KASAN_GRANULE_MASK) & ~KASAN_GRANULE_MASK) 93*0f4c859eSApple OSS Distributions #define kasan_granule_partial(x) (x & KASAN_GRANULE_MASK) 94*0f4c859eSApple OSS Distributions 95*0f4c859eSApple OSS Distributions #define ADDRESS_FOR_SHADOW(x) (((KASAN_STRIP_ADDR(x)) - KASAN_OFFSET) << KASAN_SCALE) 96*0f4c859eSApple OSS Distributions #define SHADOW_FOR_ADDRESS(x) (uint8_t *)(((KASAN_STRIP_ADDR(x)) >> KASAN_SCALE) + KASAN_OFFSET) 97*0f4c859eSApple OSS Distributions 98*0f4c859eSApple OSS Distributions enum __attribute__((flag_enum)) kasan_access_types { 99*0f4c859eSApple OSS Distributions /* Common to all KASAN versions */ 100*0f4c859eSApple OSS Distributions TYPE_LOAD = BIT(0), /* regular memory load */ 101*0f4c859eSApple OSS Distributions TYPE_STORE = BIT(1), /* regular store */ 102*0f4c859eSApple OSS Distributions TYPE_MEMR = BIT(2), /* memory intrinsic (read) */ 103*0f4c859eSApple OSS Distributions TYPE_MEMW = BIT(3), /* memory intrinsic (write) */ 104*0f4c859eSApple OSS Distributions TYPE_STRR = BIT(4), /* string intrinsic (read) */ 105*0f4c859eSApple OSS Distributions TYPE_STRW = BIT(5), /* string intrinsic (write) */ 106*0f4c859eSApple OSS Distributions 107*0f4c859eSApple OSS Distributions /* KASAN-classic specific */ 108*0f4c859eSApple OSS Distributions TYPE_ZFREE = BIT(6), /* zfree() */ 109*0f4c859eSApple OSS Distributions TYPE_FSFREE = BIT(7), /* fakestack free */ 110*0f4c859eSApple OSS Distributions 111*0f4c859eSApple OSS Distributions TYPE_UAF = BIT(12), 112*0f4c859eSApple OSS Distributions TYPE_POISON_GLOBAL = BIT(13), 113*0f4c859eSApple OSS Distributions TYPE_POISON_HEAP = BIT(14), 114*0f4c859eSApple OSS Distributions /* no TYPE_POISON_STACK, because the runtime does not control stack poisoning */ 115*0f4c859eSApple OSS Distributions TYPE_TEST = BIT(15), 116*0f4c859eSApple OSS Distributions 117*0f4c859eSApple OSS Distributions /* masks */ 118*0f4c859eSApple OSS Distributions TYPE_MEM = TYPE_MEMR | TYPE_MEMW, /* memory intrinsics */ 119*0f4c859eSApple OSS Distributions TYPE_STR = TYPE_STRR | TYPE_STRW, /* string intrinsics */ 120*0f4c859eSApple OSS Distributions TYPE_READ = TYPE_LOAD | TYPE_MEMR | TYPE_STRR, /* all reads */ 121*0f4c859eSApple OSS Distributions TYPE_WRITE = TYPE_STORE | TYPE_MEMW | TYPE_STRW, /* all writes */ 122*0f4c859eSApple OSS Distributions TYPE_RW = TYPE_READ | TYPE_WRITE, /* reads and writes */ 123*0f4c859eSApple OSS Distributions TYPE_FREE = TYPE_ZFREE | TYPE_FSFREE, 124*0f4c859eSApple OSS Distributions TYPE_NORMAL = TYPE_RW | TYPE_FREE, 125*0f4c859eSApple OSS Distributions TYPE_DYNAMIC = TYPE_NORMAL | TYPE_UAF, 126*0f4c859eSApple OSS Distributions TYPE_POISON = TYPE_POISON_GLOBAL | TYPE_POISON_HEAP, 127*0f4c859eSApple OSS Distributions TYPE_ALL = ~0U, 128*0f4c859eSApple OSS Distributions }; 129*0f4c859eSApple OSS Distributions 130*0f4c859eSApple OSS Distributions enum kasan_violation_types { 131*0f4c859eSApple OSS Distributions REASON_POISONED = 0, /* read or write of poisoned data */ 132*0f4c859eSApple OSS Distributions REASON_BAD_METADATA = 1, /* incorrect kasan metadata */ 133*0f4c859eSApple OSS Distributions REASON_INVALID_SIZE = 2, /* free size did not match alloc size */ 134*0f4c859eSApple OSS Distributions REASON_MOD_AFTER_FREE = 3, /* object modified after free */ 135*0f4c859eSApple OSS Distributions REASON_MOD_OOB = 4, /* out of bounds modification of object */ 136*0f4c859eSApple OSS Distributions }; 137*0f4c859eSApple OSS Distributions 138*0f4c859eSApple OSS Distributions typedef enum kasan_access_types access_t; 139*0f4c859eSApple OSS Distributions typedef enum kasan_violation_types violation_t; 140*0f4c859eSApple OSS Distributions 141*0f4c859eSApple OSS Distributions /* 142*0f4c859eSApple OSS Distributions * KASAN may support different shadow table formats and different checking 143*0f4c859eSApple OSS Distributions * strategies. _impl functions are called from the format-independent 144*0f4c859eSApple OSS Distributions * kasan code to the format dependent implementations. 145*0f4c859eSApple OSS Distributions */ 146*0f4c859eSApple OSS Distributions void kasan_impl_report_internal(uptr, uptr, access_t, violation_t, bool); 147*0f4c859eSApple OSS Distributions void kasan_impl_poison_range(vm_offset_t, vm_size_t, uint8_t); 148*0f4c859eSApple OSS Distributions void kasan_impl_kdp_disable(void); 149*0f4c859eSApple OSS Distributions void kasan_impl_init(void); 150*0f4c859eSApple OSS Distributions void kasan_impl_late_init(void); 151*0f4c859eSApple OSS Distributions void kasan_impl_fill_valid_range(uintptr_t, size_t); 152*0f4c859eSApple OSS Distributions 153*0f4c859eSApple OSS Distributions /* 154*0f4c859eSApple OSS Distributions * Poisoning comes from KASAN CLASSIC nomenclature. KASAN CLASSIC is based on 155*0f4c859eSApple OSS Distributions * identifying valid memory vs poisoned memory (memory that shouldn't be accessed). 156*0f4c859eSApple OSS Distributions * This terminology isn't great for KASAN TBI, but is kept for compatibility. 157*0f4c859eSApple OSS Distributions */ 158*0f4c859eSApple OSS Distributions void kasan_poison(vm_offset_t, vm_size_t, vm_size_t, vm_size_t, uint8_t); 159*0f4c859eSApple OSS Distributions 160*0f4c859eSApple OSS Distributions /* 161*0f4c859eSApple OSS Distributions * Runtime checking. kasan_check_range() is consumed by the inlined 162*0f4c859eSApple OSS Distributions * instrumentation. See kasan-helper.c 163*0f4c859eSApple OSS Distributions */ 164*0f4c859eSApple OSS Distributions bool kasan_check_enabled(access_t); 165*0f4c859eSApple OSS Distributions bool kasan_impl_check_enabled(access_t); 166*0f4c859eSApple OSS Distributions void kasan_check_range(const void *, size_t, access_t); 167*0f4c859eSApple OSS Distributions 168*0f4c859eSApple OSS Distributions /* dynamic blacklist */ 169*0f4c859eSApple OSS Distributions void kasan_init_dybl(void); 170*0f4c859eSApple OSS Distributions bool kasan_is_blacklisted(access_t); 171*0f4c859eSApple OSS Distributions void kasan_dybl_load_kext(uintptr_t, const char *); 172*0f4c859eSApple OSS Distributions void kasan_dybl_unload_kext(uintptr_t); 173*0f4c859eSApple OSS Distributions 174*0f4c859eSApple OSS Distributions /* arch-specific interface */ 175*0f4c859eSApple OSS Distributions void kasan_arch_init(void); 176*0f4c859eSApple OSS Distributions bool kasan_is_shadow_mapped(uintptr_t); 177*0f4c859eSApple OSS Distributions 178*0f4c859eSApple OSS Distributions /* Locking */ 179*0f4c859eSApple OSS Distributions void kasan_lock_init(void); 180*0f4c859eSApple OSS Distributions void kasan_lock(boolean_t *); 181*0f4c859eSApple OSS Distributions void kasan_unlock(boolean_t); 182*0f4c859eSApple OSS Distributions bool kasan_lock_held(thread_t); 183*0f4c859eSApple OSS Distributions 184*0f4c859eSApple OSS Distributions /* Subsystem helpers */ 185*0f4c859eSApple OSS Distributions void kasan_init_fakestack(void); 186*0f4c859eSApple OSS Distributions 187*0f4c859eSApple OSS Distributions /* 188*0f4c859eSApple OSS Distributions * Global variables need to be explicitly handled at runtime, both for xnu 189*0f4c859eSApple OSS Distributions * and for KEXTs. 190*0f4c859eSApple OSS Distributions */ 191*0f4c859eSApple OSS Distributions void kasan_init_globals(vm_offset_t, vm_size_t); 192*0f4c859eSApple OSS Distributions 193*0f4c859eSApple OSS Distributions /* 194*0f4c859eSApple OSS Distributions * Handle KASAN detected issues. If modifying kasan_crash_report(), remember 195*0f4c859eSApple OSS Distributions * that is called by the instrumentation as well, see kasan-helper.c. 196*0f4c859eSApple OSS Distributions */ 197*0f4c859eSApple OSS Distributions void kasan_violation(uintptr_t, size_t, access_t, violation_t); 198*0f4c859eSApple OSS Distributions size_t kasan_impl_decode_issue(char *, size_t, uptr, uptr, access_t, violation_t); 199*0f4c859eSApple OSS Distributions void NOINLINE OS_NORETURN kasan_crash_report(uptr, uptr, access_t, violation_t); 200*0f4c859eSApple OSS Distributions 201*0f4c859eSApple OSS Distributions void kasan_handle_test(void); 202*0f4c859eSApple OSS Distributions 203*0f4c859eSApple OSS Distributions SYSCTL_DECL(kasan); 204*0f4c859eSApple OSS Distributions SYSCTL_DECL(_kern_kasan); 205*0f4c859eSApple OSS Distributions 206*0f4c859eSApple OSS Distributions #endif /* _KASAN_INTERNAL_H_ */ 207