1*2c2f96dcSApple OSS Distributions# The Read-Only Allocator 2*2c2f96dcSApple OSS Distributions 3*2c2f96dcSApple OSS DistributionsAllocating read-only data in xnu. 4*2c2f96dcSApple OSS Distributions 5*2c2f96dcSApple OSS Distributions## Introduction 6*2c2f96dcSApple OSS Distributions 7*2c2f96dcSApple OSS DistributionsThe Read-Only Allocator is an extension of the zone allocator that facilitates 8*2c2f96dcSApple OSS Distributions"read-only" allocations. Data allocated from a read-only zone can only be 9*2c2f96dcSApple OSS Distributionsmodified programmatically through the `zalloc_ro_mut` function. 10*2c2f96dcSApple OSS Distributions 11*2c2f96dcSApple OSS DistributionsRead-only zones are intended for very specific use cases where the data being 12*2c2f96dcSApple OSS Distributionsmanaged directly affects runtime security decisions. 13*2c2f96dcSApple OSS Distributions 14*2c2f96dcSApple OSS Distributions## Discussion 15*2c2f96dcSApple OSS Distributions 16*2c2f96dcSApple OSS DistributionsThe purpose of the Read-Only Allocator is to protect security- 17*2c2f96dcSApple OSS Distributionssensitive data from being targeted by memory corruption vulnerabilities. 18*2c2f96dcSApple OSS Distributions 19*2c2f96dcSApple OSS DistributionsWhile, historically, the modus operandi for an advanced attacker is to seize 20*2c2f96dcSApple OSS Distributionscontrol of kernel execution, advances in control flow integrity defenses, such 21*2c2f96dcSApple OSS Distributionsas PAC, means that today's attacker favors data-only attacks to achieve 22*2c2f96dcSApple OSS Distributionscompromise. Typically this involves using a controlled write primitive to 23*2c2f96dcSApple OSS Distributionstarget data structures in the kernel's memory that effectively disables or 24*2c2f96dcSApple OSS Distributionsbypasses obstacles standing in the way of the desired data. 25*2c2f96dcSApple OSS Distributions 26*2c2f96dcSApple OSS DistributionsBy necessity, we store lots of data on the heap that informs the various 27*2c2f96dcSApple OSS Distributionssecurity mechanisms on our platforms. The heap traditionally dispenses 28*2c2f96dcSApple OSS Distributionsdirectly mutable allocations because this fits what we need the memory for: 29*2c2f96dcSApple OSS Distributionsfrequent, fast and easy read/write access to memory. Unfortunately, these are 30*2c2f96dcSApple OSS Distributionsalso the requirements for an attacker looking to exploit a controllable write 31*2c2f96dcSApple OSS Distributionsinto kernel memory. 32*2c2f96dcSApple OSS Distributions 33*2c2f96dcSApple OSS DistributionsFor globals, `SECURITY_READ_ONLY_(EARLY|LATE)` provides an elegant protection 34*2c2f96dcSApple OSS Distributionsmechanism, but unfortunately that doesn't cater for dynamic runtime 35*2c2f96dcSApple OSS Distributionsallocations. 36*2c2f96dcSApple OSS Distributions 37*2c2f96dcSApple OSS DistributionsThis is where the Read-Only Allocator provides its defense: we observe that 38*2c2f96dcSApple OSS Distributionsthe majority of security-sensitive data that we allocate on the heap tends to 39*2c2f96dcSApple OSS Distributionsbe written into memory once and seldom changed thereafter. We can therefore 40*2c2f96dcSApple OSS Distributionstrade some of this ease of access in exchange for stronger guarantees on the 41*2c2f96dcSApple OSS Distributionsintegrity of the data. 42*2c2f96dcSApple OSS Distributions 43*2c2f96dcSApple OSS DistributionsData under the control of the Read-Only Allocator can be read from just as 44*2c2f96dcSApple OSS Distributionscheaply and easily as other data, but writing to it must be done through the 45*2c2f96dcSApple OSS Distributionsrelatively expensive `zalloc_ro_mut` function. By insisting that data be 46*2c2f96dcSApple OSS Distributionswritten programmatically (i.e. through calling a function), we raise the cost 47*2c2f96dcSApple OSS Distributionsof targeting that data towards the cost of seizing control of kernel 48*2c2f96dcSApple OSS Distributionsexecution. 49*2c2f96dcSApple OSS Distributions 50*2c2f96dcSApple OSS Distributions 51*2c2f96dcSApple OSS Distributions## Data Structure Strategies 52*2c2f96dcSApple OSS Distributions 53*2c2f96dcSApple OSS DistributionsTo make best use of the Read-Only Allocator, some simple advice should be 54*2c2f96dcSApple OSS Distributionsfollowed: 55*2c2f96dcSApple OSS Distributions 56*2c2f96dcSApple OSS Distributions1. Pointers to read-only elements should either reside in read-only memory 57*2c2f96dcSApple OSS Distributions themselves, or be protected by PAC. 58*2c2f96dcSApple OSS Distributions2. Where there is a 1:1 mapping between read/write and read-only elements, the 59*2c2f96dcSApple OSS Distributions read-only element should include a pointer back to the read/write side (a 60*2c2f96dcSApple OSS Distributions "back reference") that is validated when traversing from read/write to 61*2c2f96dcSApple OSS Distributions read-only. 62*2c2f96dcSApple OSS Distributions 63*2c2f96dcSApple OSS DistributionsOn Point 1: data structures are typically stored through chains of pointers -- 64*2c2f96dcSApple OSS Distributionse.g. a thread points to its task, which points to its proc, which points to 65*2c2f96dcSApple OSS Distributionsits credential. The principle here is to ensure the integrity of the entire 66*2c2f96dcSApple OSS Distributionschain from source pointer (e.g. thread) to destination data (e.g. credential). 67*2c2f96dcSApple OSS Distributions 68*2c2f96dcSApple OSS DistributionsOn Point 2: by storing a back reference on the read-only side of 1:1 69*2c2f96dcSApple OSS Distributionsrelationships, we can validate the ownership invariant that we expect to hold. 70*2c2f96dcSApple OSS DistributionsIf this is violated, it suggests that a use-after-free has happened -- perhaps 71*2c2f96dcSApple OSS Distributionsthrough a genuine bug, or perhaps by an attacker targeting the zone allocator 72*2c2f96dcSApple OSS Distributionsitself. 73*2c2f96dcSApple OSS Distributions 74*2c2f96dcSApple OSS Distributions## Should I Use the Read-Only Allocator? 75*2c2f96dcSApple OSS Distributions 76*2c2f96dcSApple OSS DistributionsThe Read-Only Allocator is intended to protect data from very specific 77*2c2f96dcSApple OSS Distributionsthreats. This means that for most data, it simply doesn't make sense to use 78*2c2f96dcSApple OSS Distributionsit. Its use is primarily geared toward allocations supporting security 79*2c2f96dcSApple OSS Distributionsboundaries such as labels, sandboxing, audit tokens, etc. 80*2c2f96dcSApple OSS Distributions 81*2c2f96dcSApple OSS Distributions 82*2c2f96dcSApple OSS Distributions## API 83*2c2f96dcSApple OSS Distributions 84*2c2f96dcSApple OSS DistributionsRead-only zones cannot be created after lockdown. To create a new read-only 85*2c2f96dcSApple OSS Distributionszone, a new identifier must be added to the `zone_reserved_id_t` enumeration 86*2c2f96dcSApple OSS Distributionsand it must be created by passing `ZC_READONLY` through either `ZONE_INIT` or 87*2c2f96dcSApple OSS Distributions`zone_create_ext`. 88*2c2f96dcSApple OSS Distributions 89*2c2f96dcSApple OSS DistributionsWe require identifiers for read-only zones for two reasons: firstly to ensure 90*2c2f96dcSApple OSS Distributionsthat we're making conscious, considered choices over which zones are made 91*2c2f96dcSApple OSS Distributionsread-only, and secondly to allow for more stringent validation at the API 92*2c2f96dcSApple OSS Distributionsboundary. 93*2c2f96dcSApple OSS Distributions 94*2c2f96dcSApple OSS DistributionsOnce a read-only zone is created, the API for using it is small and simple. 95*2c2f96dcSApple OSS DistributionsThe key functions are: 96*2c2f96dcSApple OSS Distributions 97*2c2f96dcSApple OSS Distributions- `zalloc_ro`: Allocate an element from a read-only zone. 98*2c2f96dcSApple OSS Distributions- `zfree_ro`: Free an element back to a read-only zone. Note that this is a 99*2c2f96dcSApple OSS Distributions macro that automatically zeroes the pointer after freeing. 100*2c2f96dcSApple OSS Distributions- `zone_require_ro`: Verify that an element belongs to a given read-only zone 101*2c2f96dcSApple OSS Distributions and panic if it doesn't. 102*2c2f96dcSApple OSS Distributions- `zalloc_ro_mut`: Modify part of an element allocated from a read-only zone. 103*2c2f96dcSApple OSS Distributions Think of this as a special `memcpy` to write into your elements. 104*2c2f96dcSApple OSS Distributions- `zalloc_ro_update_elem`: A convenience function for calling `zalloc_ro_mut` 105*2c2f96dcSApple OSS Distributions over the entirety of an element: simply passes an offset of zero and size 106*2c2f96dcSApple OSS Distributions equal to the size of the elements in the zone. 107*2c2f96dcSApple OSS Distributions 108*2c2f96dcSApple OSS DistributionsNote that `zfree_ro`, `zalloc_ro_mut` and `zalloc_ro_update_elem` will 109*2c2f96dcSApple OSS Distributionsperform a `zone_require_ro` on the element themselves; there's no need to do 110*2c2f96dcSApple OSS Distributionsthis manually beforehand. 111