xref: /xnu-11215.41.3/doc/vm/sanitize.md (revision 33de042d024d46de5ff4e89f2471de6608e37fa4)
1*33de042dSApple OSS Distributions# VM API parameter sanitization
2*33de042dSApple OSS Distributions
3*33de042dSApple OSS DistributionsValidating parameter values passed to virtual memory APIs primarily from user
4*33de042dSApple OSS Distributionsspace.
5*33de042dSApple OSS Distributions
6*33de042dSApple OSS Distributions## Overview
7*33de042dSApple OSS Distributions
8*33de042dSApple OSS DistributionsVM parameter sanitization aims to eliminate shallow input validation
9*33de042dSApple OSS Distributionsbugs like overflows caused by rounding addresses to required page size,
10*33de042dSApple OSS Distributionsby providing a set of APIs that can be used to perform consistent, thorough
11*33de042dSApple OSS Distributionsmathematical checks on the input. This allows for the rest of the subsystem to
12*33de042dSApple OSS Distributionsfreely operate on the input without worrying that future computations may
13*33de042dSApple OSS Distributionsoverflow. Note that these APIs are meant to primarily catch issues with
14*33de042dSApple OSS Distributionsmathematical computation and are not responsible for checking if the input
15*33de042dSApple OSS Distributionsvalue is within certain expected bounds or valid in the context of a specific
16*33de042dSApple OSS DistributionsVM API.
17*33de042dSApple OSS Distributions
18*33de042dSApple OSS Distributions## Semantic types
19*33de042dSApple OSS Distributions
20*33de042dSApple OSS DistributionsTo enforce that sanitization is performed on input prior to use,
21*33de042dSApple OSS Distributionsunsafe input types are encapsulated as opaque types (i.e wrapped inside a
22*33de042dSApple OSS Distributionstransparent union) to the internal implementation of the VM APIs. Performing
23*33de042dSApple OSS Distributionsmathematical operations on these opaque values without calling the
24*33de042dSApple OSS Distributionsrespective sanitization functions (that validates and unwraps them)
25*33de042dSApple OSS Distributionswill generate a compiler error.
26*33de042dSApple OSS Distributions
27*33de042dSApple OSS DistributionsTypes that are typically considered unsafe (i.e require sanitization) include:
28*33de042dSApple OSS Distributions- Address/offset for example vm_offset_t and vm_address_t
29*33de042dSApple OSS Distributions- Size for example vm_size_t
30*33de042dSApple OSS Distributions- Various flags like vm_prot_t and vm_inherit_t
31*33de042dSApple OSS Distributions
32*33de042dSApple OSS Distributions## Sanitizer functions
33*33de042dSApple OSS Distributions
34*33de042dSApple OSS DistributionsThe functions that sanitize various types of input values are implemented
35*33de042dSApple OSS Distributionsin `vm_sanitize.c` and documented in their corresponding header
36*33de042dSApple OSS Distributions`vm_sanitize_internal.h`.
37*33de042dSApple OSS Distributions
38*33de042dSApple OSS Distributions## VM API boundary
39*33de042dSApple OSS Distributions
40*33de042dSApple OSS DistributionsVM functions can be called from three places: userspace, kexts, and xnu itself.
41*33de042dSApple OSS DistributionsFunctions callable from userspace should be fully sanitized. Functions
42*33de042dSApple OSS Distributionscallable from kexts and xnu are less thoroughly covered today.
43*33de042dSApple OSS Distributions
44*33de042dSApple OSS Distributions## Telemetry and error code compatibility
45*33de042dSApple OSS Distributions
46*33de042dSApple OSS DistributionsWhen VM parameter sanitization finds a problem, it does the following:
47*33de042dSApple OSS Distributions- returns an error to the API's caller
48*33de042dSApple OSS Distributions- optionally *rewrites* that error first, either to a different
49*33de042dSApple OSS Distributions  error code or to `KERN_SUCCESS`.
50*33de042dSApple OSS Distributions- optionally *telemeters* that error, sending it to CoreAnalytics and ktriage.
51*33de042dSApple OSS Distributions
52*33de042dSApple OSS DistributionsThe option to rewrite and/or telemeter is chosen based on the sanitizer
53*33de042dSApple OSS Distributionstype and on the identity of the VM API that called the sanitizer.
54*33de042dSApple OSS DistributionsThe VM API identity is the `vm_sanitize_caller_t` passed to the sanitizer
55*33de042dSApple OSS Distributionsfunction. This identity contains function pointers that override the
56*33de042dSApple OSS Distributionsdefault behavior (i.e. no rewrite, no telemetry). The overrides, if any, are set
57*33de042dSApple OSS Distributionsby `VM_SANITIZE_DEFINE_CALLER` in `vm_sanitize_error_compat.c`.
58*33de042dSApple OSS Distributions
59*33de042dSApple OSS DistributionsError code rewrites change the error code to better match historical
60*33de042dSApple OSS Distributionsbehavior for binary compatibility purposes. There are two possible rewrites:
61*33de042dSApple OSS Distributions1. rewrite an error code to be a different error code.
62*33de042dSApple OSS Distributions2. rewrite an error code to be `KERN_SUCCESS`. The VM API returns success
63*33de042dSApple OSS Distributions   immediately without executing the rest of its implementation.
64*33de042dSApple OSS DistributionsNot all changed error codes are (or could be) rewritten.
65*33de042dSApple OSS Distributions
66*33de042dSApple OSS DistributionsTelemetry similarly may record two cases:
67*33de042dSApple OSS Distributions1. The error code being returned differs from its historical value.
68*33de042dSApple OSS Distributions2. The error code being returned would be different from its historical
69*33de042dSApple OSS Distributions   value, but a rewrite has changed it to match the historical value instead.
70*33de042dSApple OSS DistributionsNot all changed error codes are (or could be) telemetered. Currently all
71*33de042dSApple OSS Distributionsrewrites performed are telemetered.
72*33de042dSApple OSS Distributions
73*33de042dSApple OSS DistributionsAn outline of the sequence:
74*33de042dSApple OSS Distributions1. VM API calls a sanitizer function, passing its own identity in `vms_caller`.
75*33de042dSApple OSS Distributions2. `vm_sanitize_<kind>` looks for invalid parameters.
76*33de042dSApple OSS Distributions3. If an invalid parameter is found, the sanitizer calls
77*33de042dSApple OSS Distributions   `vm_sanitize_err_compat_<kind>` to handle any rewrites or telemetry.
78*33de042dSApple OSS Distributions4. `vm_sanitize_err_compat_<kind>` looks for an override handler
79*33de042dSApple OSS Distributions   for that type in the caller's identity, and calls it if present.
80*33de042dSApple OSS Distributions5. `vm_sanitize_err_compat_<kind>_<caller>`, the override handler, examines the
81*33de042dSApple OSS Distributions   parameters and chooses whether to rewrite and/or telemeter this error.
82*33de042dSApple OSS Distributions   It returns a `vm_sanitize_compat_rewrite_t` containing its decision.
83*33de042dSApple OSS Distributions6. `vm_sanitize_err_compat_<kind>` applies any requested error code rewrite
84*33de042dSApple OSS Distributions   and sends any requested telemetry.
85*33de042dSApple OSS Distributions7. The VM API receives the error from the sanitizer and returns it.
86*33de042dSApple OSS Distributions
87*33de042dSApple OSS DistributionsThere is a complication in step #7: how do the error compat and
88*33de042dSApple OSS Distributionsthe sanitizer tell the VM API that it should halt and return `KERN_SUCCESS`
89*33de042dSApple OSS Distributionsimmediately, distinct from the sanitizer telling the VM API that
90*33de042dSApple OSS Distributionssanitization succeeded and the VM API should proceed normally?
91*33de042dSApple OSS DistributionsThe scheme looks like this:
92*33de042dSApple OSS Distributions- sanitizer returns `KERN_SUCCESS`: VM API may proceed normally
93*33de042dSApple OSS Distributions- sanitizer returns not-`KERN_SUCCESS`: VM API shall return immediately
94*33de042dSApple OSS Distributions  - sanitizer returns `VM_ERR_RETURN_NOW`: VM API shall return `KERN_SUCCESS` now
95*33de042dSApple OSS Distributions  - sanitizer returns any other error code: VM API shall return that error now
96*33de042dSApple OSS DistributionsThe mapping of `VM_ERR_RETURN_NOW` to `KERN_SUCCESS` is performed by
97*33de042dSApple OSS Distributions`vm_sanitize_get_kern_return`.
98*33de042dSApple OSS Distributions
99*33de042dSApple OSS Distributions## How to: add a new sanitizer or sanitized type
100*33de042dSApple OSS Distributions
101*33de042dSApple OSS DistributionsWhen a new type needs sanitization, use one of the following macros to declare
102*33de042dSApple OSS Distributionsand define the encapsulated opaque version:
103*33de042dSApple OSS Distributions- `VM_GENERATE_UNSAFE_ADDR`: Should be used for a new variant that represents
104*33de042dSApple OSS Distributions  address or offset
105*33de042dSApple OSS Distributions- `VM_GENERATE_UNSAFE_SIZE`: Should be used for a new variant that represents
106*33de042dSApple OSS Distributions  size
107*33de042dSApple OSS Distributions- `VM_GENERATE_UNSAFE_TYPE`: Should be used for other types that are not
108*33de042dSApple OSS Distributions  address or size. For example, this macro is currently used to define the
109*33de042dSApple OSS Distributions  opaque protections type `vm_prot_ut`.
110*33de042dSApple OSS Distributions
111*33de042dSApple OSS DistributionsThese opaque types are declared in `vm_types_unsafe.h`. There are also some
112*33de042dSApple OSS Distributionsvariants of these macros for specific purposes:
113*33de042dSApple OSS Distributions- 32 bit variants like `VM_GENERATE_UNSAFE_ADDR32` should be used for 32bit
114*33de042dSApple OSS Distributions  variants of address, offset and size.
115*33de042dSApple OSS Distributions- BSD variants like `VM_GENERATE_UNSAFE_BSD_ADDR` for types that are
116*33de042dSApple OSS Distributions  specifically used in the BSD subsystem and not in mach (for example:
117*33de042dSApple OSS Distributions  caddr_t).
118*33de042dSApple OSS Distributions- EXT variants like `VM_GENERATE_UNSAFE_EXT` should not be used directly. They
119*33de042dSApple OSS Distributions  are intermediate implementation macros.
120*33de042dSApple OSS Distributions- `VM_GENERATE_UNSAFE_WRAPPER` is a special macro that is needed to avoid
121*33de042dSApple OSS Distributions  compiler errors when pointers of opaque types of a specific kind are
122*33de042dSApple OSS Distributions  interchangeably used as pointer of another opaque type of the same kind for
123*33de042dSApple OSS Distributions  example:
124*33de042dSApple OSS Distributions  ```
125*33de042dSApple OSS Distributions  mach_vm_offset_ut *offset;
126*33de042dSApple OSS Distributions  ...
127*33de042dSApple OSS Distributions  mach_vm_address_ut *ptr = offset;
128*33de042dSApple OSS Distributions  ```
129*33de042dSApple OSS Distributions  These macros define a common opaque type for the entire kind that other
130*33de042dSApple OSS Distributions  `_ADDR`/`_SIZE` macros redirect to.
131*33de042dSApple OSS Distributions  ```
132*33de042dSApple OSS Distributions  VM_GENERATE_UNSAFE_WRAPPER(uint64_t, vm_addr_struct_t);
133*33de042dSApple OSS Distributions  ```
134*33de042dSApple OSS Distributions  generates the common opaque type for address and offset. All the `_ADDR`
135*33de042dSApple OSS Distributions  macros define respective opaque types as a typedef of
136*33de042dSApple OSS Distributions  `vm_addr_struct_t`.
137*33de042dSApple OSS Distributions  ```
138*33de042dSApple OSS Distributions  VM_GENERATE_UNSAFE_ADDR(mach_vm_address_t, mach_vm_address_ut);
139*33de042dSApple OSS Distributions  ```
140*33de042dSApple OSS Distributions  typedefs `mach_vm_address_ut` as a `vm_addr_struct_t`.
141*33de042dSApple OSS Distributions
142*33de042dSApple OSS Distributions## How to: add sanitization to new VM API
143*33de042dSApple OSS Distributions
144*33de042dSApple OSS DistributionsOnce the opaque type is available to use, modify the respective
145*33de042dSApple OSS Distributionsdeclaration/definition of the entry point to use the opaque types.
146*33de042dSApple OSS Distributions
147*33de042dSApple OSS Distributions### Opaque types in function prototype
148*33de042dSApple OSS Distributions
149*33de042dSApple OSS Distributions#### Adoption in MIG
150*33de042dSApple OSS Distributions
151*33de042dSApple OSS DistributionsFor APIs that are exposed via MIG, adopting the new opaque type in the
152*33de042dSApple OSS DistributionsAPI requires some additional steps as we want the opaque types to only appear
153*33de042dSApple OSS Distributionsin the kernel headers, leaving the userspace headers unchanged.
154*33de042dSApple OSS Distributions- Generate temporary type using `VM_GENERATE_MIG_TMPTYPE_*` macros. For
155*33de042dSApple OSS Distributions  example:
156*33de042dSApple OSS Distributions  ```
157*33de042dSApple OSS Distributions  VM_GENERATE_MIG_TMPTYPE_U64(mach_vm_address_t, mach_vm_address_ut);
158*33de042dSApple OSS Distributions  ```
159*33de042dSApple OSS Distributions  generates a temporary type (`mach_vm_address_t_tmp`) whose ctype is
160*33de042dSApple OSS Distributions  overloaded as `mach_vm_address_ut` in the generated kernel headers. This
161*33de042dSApple OSS Distributions  type will appear as the original type `mach_vm_address_t` in the userspace
162*33de042dSApple OSS Distributions  headers that are generated by MIG. The `_U64` variants will tell MIG that
163*33de042dSApple OSS Distributions  this type is `uint64_t` while `_I32` says that this is `int32_t`.
164*33de042dSApple OSS Distributions- Use temporary type generated in the MIG entry point using macro
165*33de042dSApple OSS Distributions  `VM_USE_TMPTYPE`. Here is a example:
166*33de042dSApple OSS Distributions  ```
167*33de042dSApple OSS Distributions  #if !defined(_MACH_VM_PUBLISH_AS_LOCAL_)
168*33de042dSApple OSS Distributions  routine PREFIX(mach_vm_read) (
169*33de042dSApple OSS Distributions  #else
170*33de042dSApple OSS Distributions  routine PREFIX(vm_read) (
171*33de042dSApple OSS Distributions  #endif
172*33de042dSApple OSS Distributions  		target_task	: vm_map_read_t;
173*33de042dSApple OSS Distributions  		address		: VM_USE_TMPTYPE(mach_vm_address_t);
174*33de042dSApple OSS Distributions		size		: VM_USE_TMPTYPE(mach_vm_size_t);
175*33de042dSApple OSS Distributions	out	data		: pointer_t);
176*33de042dSApple OSS Distributions  ```
177*33de042dSApple OSS Distributions- Ensure that `VM_KERNEL_SERVER` is defined at the top of the defs file before
178*33de042dSApple OSS Distributions  any includes.
179*33de042dSApple OSS Distributions- Adopt the opaque types in the function definition present in the `.c` file.
180*33de042dSApple OSS Distributions  ```
181*33de042dSApple OSS Distributions  kern_return_t
182*33de042dSApple OSS Distributions  mach_vm_read(
183*33de042dSApple OSS Distributions    	vm_map_t                map,
184*33de042dSApple OSS Distributions    	mach_vm_address_ut      addr,
185*33de042dSApple OSS Distributions    	mach_vm_size_ut         size,
186*33de042dSApple OSS Distributions    	pointer_t              *data,
187*33de042dSApple OSS Distributions    	mach_msg_type_number_t *data_size)
188*33de042dSApple OSS Distributions  ```
189*33de042dSApple OSS Distributions
190*33de042dSApple OSS Distributions#### Adoption in syscalls
191*33de042dSApple OSS Distributions
192*33de042dSApple OSS Distributions- Ensure that you have created the opaque types needed by the BSD subsystem
193*33de042dSApple OSS Distributions  using `VM_GENERATE_UNSAFE_BSD_*` in `osfmk/mach/vm_types_unsafe.h`.
194*33de042dSApple OSS Distributions- Add the new opaque type to `sys/_types/*` or `bsd/<arm or i386>/types.h`.
195*33de042dSApple OSS Distributions  `caddr_ut` was added to `bsd/sys/_types/_caddr_t.h` and `user_addr_ut` was
196*33de042dSApple OSS Distributions  added to `bsd/arm/types.h` and `bsd/i386/types.h`. When adding an opaque for
197*33de042dSApple OSS Distributions  `caddr_t` you may also need to add opaque types for corresponding types like
198*33de042dSApple OSS Distributions  `user_addr_t` as the syscall generated use those types.
199*33de042dSApple OSS Distributions- Also add the types to `libsyscall/xcodescripts/create-syscalls.pl`.
200*33de042dSApple OSS Distributions- Adopt the opaque type in the API in `syscalls.master`.
201*33de042dSApple OSS Distributions  ```
202*33de042dSApple OSS Distributions  203	AUE_MLOCK	ALL	{ int mlock(caddr_ut addr, size_ut len); }
203*33de042dSApple OSS Distributions  ```
204*33de042dSApple OSS Distributions  `mlock` uses opaque type `caddr_ut` for its address and `size_ut` for its
205*33de042dSApple OSS Distributions  size.
206*33de042dSApple OSS Distributions- Modify `bsd/kern/makesyscalls.sh` to handle the new types added.
207*33de042dSApple OSS Distributions
208*33de042dSApple OSS Distributions#### Adoption in mach traps
209*33de042dSApple OSS Distributions
210*33de042dSApple OSS DistributionsFunction prototypes aren't generated automatically for mach traps as is the
211*33de042dSApple OSS Distributionscase for syscalls. Therefore we need to modify the mach trap manually to use
212*33de042dSApple OSS Distributionsthe opaque type in `osfmk/mach/mach_traps.h`.
213*33de042dSApple OSS Distributions```
214*33de042dSApple OSS Distributionsstruct _kernelrpc_mach_vm_deallocate_args {
215*33de042dSApple OSS Distributions	PAD_ARG_(mach_port_name_t, target);     /* 1 word */
216*33de042dSApple OSS Distributions	PAD_ARG_(mach_vm_address_ut, address);  /* 2 words */
217*33de042dSApple OSS Distributions	PAD_ARG_(mach_vm_size_ut, size);        /* 2 words */
218*33de042dSApple OSS Distributions};                                              /* Total: 5 */
219*33de042dSApple OSS Distributionsextern kern_return_t _kernelrpc_mach_vm_deallocate_trap(
220*33de042dSApple OSS Distributions	struct _kernelrpc_mach_vm_deallocate_args *args);
221*33de042dSApple OSS Distributions```
222*33de042dSApple OSS Distributions### Perform sanitization
223*33de042dSApple OSS Distributions
224*33de042dSApple OSS DistributionsNow that the internal function definitions see the opaque types, we need to
225*33de042dSApple OSS Distributionsperform the required sanitization. If multiple entry points call the same
226*33de042dSApple OSS Distributionsinternal function, pass along the unsafe value and perform the check at the
227*33de042dSApple OSS Distributionsbest choke point further down. For example the best choke point for the
228*33de042dSApple OSS Distributionsfollowing APIs was `vm_map_copyin_internal`:
229*33de042dSApple OSS Distributions- `mach_vm_read`
230*33de042dSApple OSS Distributions- `vm_read`
231*33de042dSApple OSS Distributions- `mach_vm_read_list`
232*33de042dSApple OSS Distributions- `vm_read_list`
233*33de042dSApple OSS Distributions- `vm_map_copyin`
234*33de042dSApple OSS Distributions- `mach_vm_read_overwrite`
235*33de042dSApple OSS Distributions- `mach_vm_copy`
236*33de042dSApple OSS Distributions
237*33de042dSApple OSS DistributionsOnce you have determined the right choke point create a
238*33de042dSApple OSS Distributions`<function name>_sanitize` function that will sanitize all opaque types and
239*33de042dSApple OSS Distributionsreturn their unwrapped safe values. In this function you should call the
240*33de042dSApple OSS Distributionssanitization functions provided in `vm_sanitize.c` to validate all opaque
241*33de042dSApple OSS Distributionstypes adopted by the API. If you added a new type that doesn't have a
242*33de042dSApple OSS Distributionscorresponding sanitization function in `vm_sanitize.c`, please add one.
243*33de042dSApple OSS DistributionsFor existing types, try to reuse the functions provided instead of
244*33de042dSApple OSS Distributionswriting new ones with specific purposes. `vm_sanitize.c` is meant to
245*33de042dSApple OSS Distributionscontain the basic blocks that could be chained to meet your specific
246*33de042dSApple OSS Distributionsrequirements.
247*33de042dSApple OSS Distributions
248*33de042dSApple OSS Distributions#### Adding new functions to `vm_sanitize.c`
249*33de042dSApple OSS Distributions
250*33de042dSApple OSS Distributions- Mark function with `__attribute__((always_inline,
251*33de042dSApple OSS Distributions  warn_unused_result))`.
252*33de042dSApple OSS Distributions- Ensure that you return safe values on failure for all opaque types that
253*33de042dSApple OSS Distributions  were supposed to be sanitized by the function.
254*33de042dSApple OSS Distributions
255*33de042dSApple OSS Distributions### Enforcement
256*33de042dSApple OSS Distributions
257*33de042dSApple OSS DistributionsFor files outside `osfmk/vm` and `bsd/vm` that need to see the opaque type
258*33de042dSApple OSS Distributionsadd the following to their `conf/Makefile.template`:
259*33de042dSApple OSS Distributions```
260*33de042dSApple OSS Distributionskern_mman.o_CFLAGS_ADD += -DVM_UNSAFE_TYPES
261*33de042dSApple OSS Distributions```
262*33de042dSApple OSS Distributions
263*33de042dSApple OSS Distributions## Tests
264*33de042dSApple OSS Distributions
265*33de042dSApple OSS DistributionsMost VM API callable from userspace or kexts have tests that pass correct and
266*33de042dSApple OSS Distributionsincorrect input values, to verify that the functions return the expected error
267*33de042dSApple OSS Distributionscodes. These tests run every VM function that has sanitized parameters dozens
268*33de042dSApple OSS Distributionsor hundreds or thousands of times.
269*33de042dSApple OSS Distributions
270*33de042dSApple OSS DistributionsThe code for these tests is:
271*33de042dSApple OSS Distributions- `tests/vm/vm_parameter_validation.c` (test `vm_parameter_validation_user`
272*33de042dSApple OSS Distributionsfor userspace call sites)
273*33de042dSApple OSS Distributions- `osfmk/tests/vm_parameter_validation_kern.c` (test
274*33de042dSApple OSS Distributions`vm_parameter_validation_kern` for kernel or kext call sites)
275*33de042dSApple OSS Distributions
276*33de042dSApple OSS DistributionsThe expected error codes returned by these calls are stored in "golden" result
277*33de042dSApple OSS Distributionsfiles. If you change the error code of a VM API, or define a new flag bit that
278*33de042dSApple OSS Distributionswas previously unused, you may need to update the golden results.
279*33de042dSApple OSS DistributionsSee `tests/vm/vm_parameter_validation.c` for instructions.
280*33de042dSApple OSS Distributions
281*33de042dSApple OSS DistributionsYou can run these tests locally. See `tests/vm/vm_parameter_validation.c`
282*33de042dSApple OSS Distributionsfor instructions.
283*33de042dSApple OSS Distributions
284*33de042dSApple OSS DistributionsA *trial* is a single VM function called with a single set of argument values.
285*33de042dSApple OSS DistributionsFor example, `mach_vm_protect(VM_PROT_READ)` with address=0 and size=0 is a
286*33de042dSApple OSS Distributionssingle trial.
287*33de042dSApple OSS Distributions
288*33de042dSApple OSS DistributionsA *test* is made up of multiple trials: a single VM function called many
289*33de042dSApple OSS Distributionstimes with many values for one sanitized parameter (or group of related
290*33de042dSApple OSS Distributionsparameters). For example, `mach_vm_protect(VM_PROT_READ)` with many different
291*33de042dSApple OSS Distributionspairs of address and size is a single test. `mach_vm_protect` with a single
292*33de042dSApple OSS Distributionsvalid address+size and many different `vm_prot_t` values is another test.
293*33de042dSApple OSS Distributions
294*33de042dSApple OSS DistributionsThe trial values in these tests are generally intended to provoke bugs
295*33de042dSApple OSS Distributionsthat the sanitizers are supposed to catch. The list of trial values for
296*33de042dSApple OSS Distributionsaddress+size provokes various integer overflows if they are added and/or
297*33de042dSApple OSS Distributionsrounded. The list of trial values for flags like `vm_prot_t` includes at
298*33de042dSApple OSS Distributionsleast one trial for every possible set bit. The list of trial values for
299*33de042dSApple OSS Distributionsa sanitized type or group of types is produced by a "generator". Each
300*33de042dSApple OSS Distributionstrial generator is in `osfmk/tests/vm_parameter_validation.h`.
301*33de042dSApple OSS Distributions
302*33de042dSApple OSS DistributionsA test `harness` or `runner` is the loop that runs a VM function with
303*33de042dSApple OSS Distributionsevery trial value, performing any setup necessary and collecting the results.
304*33de042dSApple OSS DistributionsThese function names start with `test_`. For example,
305*33de042dSApple OSS Distributions`test_mach_with_allocated_vm_prot_t` runs `vm_prot_t` trials of a VM API,
306*33de042dSApple OSS Distributionseach time passing it the address and size of a valid allocation and a
307*33de042dSApple OSS Distributionsdifferent `vm_prot_t` value. This particular runner is used by some tests of
308*33de042dSApple OSS Distributions`mach_vm_protect`, `mach_vm_wire`, and others.
309*33de042dSApple OSS Distributions
310*33de042dSApple OSS DistributionsThe output of all trials in one test is collected as `results_t`, storing the
311*33de042dSApple OSS Distributionsname of the test, the name of each trial, and the error code from each trial.
312*33de042dSApple OSS DistributionsThe "error code" is also used for trial outcomes that are not return values
313*33de042dSApple OSS Distributionsfrom the VM API. For example, value `PANIC` means the trial was deliberately
314*33de042dSApple OSS Distributionsnot executed because if it were it would have panicked and the test machinery
315*33de042dSApple OSS Distributionscan't handle that.
316*33de042dSApple OSS Distributions
317*33de042dSApple OSS DistributionsAfter each test the collected results are processed. Normally this means
318*33de042dSApple OSS Distributionscomparing them to the expected results from the golden files. Test results
319*33de042dSApple OSS Distributionsmay also be used to generate new golden files. Test results may also be
320*33de042dSApple OSS Distributionsdumped to console in their entirety. You can pipe dumped output to
321*33de042dSApple OSS Distributions`tools/format_vm_parameter_validation.py`, which knows how to pretty-print
322*33de042dSApple OSS Distributionssome things.
323*33de042dSApple OSS Distributions
324*33de042dSApple OSS DistributionsThese tests are intended to exercise every kernel entry point from userspace
325*33de042dSApple OSS Distributionsdirectly, both MIG and syscall, even for functions that have no access via
326*33de042dSApple OSS DistributionsLibsystem or that Libsystem intercepts. For MIG entry points we generate our
327*33de042dSApple OSS Distributionsown MIG call sites; see `tests/Makefile` for details. For syscall entry points
328*33de042dSApple OSS Distributionswe sometimes call a `__function_name` entry point exported by Libsystem that
329*33de042dSApple OSS Distributionsis more direct than `function_name` would be. Examples: `__mmap`, `__msync`,
330*33de042dSApple OSS Distributions`__msync_nocancel`.
331*33de042dSApple OSS Distributions
332*33de042dSApple OSS DistributionsThere are two sets of kernel entrypoints that are not exercised by these tests
333*33de042dSApple OSS Distributionstoday:
334*33de042dSApple OSS Distributions1. the MIG entrypoints that use 32-bit addresses, on platforms other than
335*33de042dSApple OSS DistributionswatchOS. These kernels respond to these MIG messages but Libsystem never sends
336*33de042dSApple OSS Distributionsthem. We reviewed the vm32 implementations and decided they were safe and
337*33de042dSApple OSS Distributionsunlikely to do unsanitary things with the input values before passing them
338*33de042dSApple OSS Distributionsto VM API that perform sanitizations. These entrypoints should be disabled
339*33de042dSApple OSS Distributions(rdar://124030574).
340*33de042dSApple OSS Distributions2. the `kernelrpc` trap alternatives to some MIG entrypoints. We reviewed
341*33de042dSApple OSS Distributionsthe trap implementations and decided they were safe and unlikely to do
342*33de042dSApple OSS Distributionsunsanitary things with the input values before passing them to VM API that
343*33de042dSApple OSS Distributionsperform sanitizations.
344*33de042dSApple OSS Distributions
345*33de042dSApple OSS Distributions## How to: add a new test
346*33de042dSApple OSS Distributions
347*33de042dSApple OSS DistributionsYou may need to write new tests in `vm_parameter_validation` if you do
348*33de042dSApple OSS Distributionsone of the following:
349*33de042dSApple OSS Distributions- write a new VM API function (for userspace or kexts) that has parameters of
350*33de042dSApple OSS Distributionssanitized types
351*33de042dSApple OSS Distributions- implement sanitization in an existing VM API function for a parameter that
352*33de042dSApple OSS Distributionswas not previously sanitized
353*33de042dSApple OSS Distributions
354*33de042dSApple OSS DistributionsStep 1: are you testing userspace callers (`tests/vm/vm_parameter_validation.c`),
355*33de042dSApple OSS Distributionskernel/kext callers (`osfmk/tests/vm_parameter_validation_kern.c`), or both?
356*33de042dSApple OSS DistributionsIf you are testing both kernel and userspace you may be able to share much of
357*33de042dSApple OSS Distributionsthe implementation in the common file `osfmk/tests/vm_parameter_validation.h`.
358*33de042dSApple OSS Distributions
359*33de042dSApple OSS DistributionsStep 2: decide what functions you are testing. Each API function with sanitized
360*33de042dSApple OSS Distributionsparameters get at least one test. Some functions are divided into multiple
361*33de042dSApple OSS Distributionsindependent tests because the function has multiple modes of operation that
362*33de042dSApple OSS Distributionsuse different parameter validation paths internally. For example,
363*33de042dSApple OSS Distributions`mach_vm_allocate(VM_FLAGS_FIXED)` and `mach_vm_allocate(VM_FLAGS_ANYWHERE)`
364*33de042dSApple OSS Distributionseach get their own set of tests as if they were two different functions,
365*33de042dSApple OSS Distributionsbecause each handles their `addr/size` parameters differently.
366*33de042dSApple OSS Distributions
367*33de042dSApple OSS DistributionsStep 3: decide what parameters you are testing. Each sanitized parameter or
368*33de042dSApple OSS Distributionsgroup of related parameters gets its own test. For example, `mach_vm_protect`
369*33de042dSApple OSS Distributionshas two parameter tests to perform, one for the protection parameter and one
370*33de042dSApple OSS Distributionsfor the address and size parameters together. The sanitization of address and
371*33de042dSApple OSS Distributionssize are intertwined (we check for overflow of address+size), so they are
372*33de042dSApple OSS Distributionstested together. The sanitization of the protection parameter is independent
373*33de042dSApple OSS Distributionsof the address and size, so it is tested separately.
374*33de042dSApple OSS Distributions
375*33de042dSApple OSS DistributionsStep 4: for each parameter or group of parameters, decide what trial values
376*33de042dSApple OSS Distributionsshould be tested. The trials should be exhaustive for small values, and
377*33de042dSApple OSS Distributionsexercise edge cases and invalid state for large values and interconnected
378*33de042dSApple OSS Distributionsvalues. `vm_prot_t` is exhaustive at the bit level (each bit is set in at
379*33de042dSApple OSS Distributionsleast one trial) and probes edge cases like `rwx`. Address and size trials
380*33de042dSApple OSS Distributionsprobe for overflows when the values are added and/or rounded to page sizes.
381*33de042dSApple OSS DistributionsChoose existing trial value generators for your parameters, or write new
382*33de042dSApple OSS Distributionsgenerators if you want a new type or different values for an existing type.
383*33de042dSApple OSS DistributionsNote that the trial name strings produced by the generator are used by
384*33de042dSApple OSS Distributions`tools/format_vm_parameter_validation.py` to pretty-print your output;
385*33de042dSApple OSS Distributionsyou may even want to edit that script to recognize new things from your
386*33de042dSApple OSS Distributionscode. The trial names are also used in the golden files; each trial
387*33de042dSApple OSS Distributionsname must be unique within a single test.
388*33de042dSApple OSS Distributions
389*33de042dSApple OSS DistributionsStep 5: for each test, decide what setup is necessary for the test or for
390*33de042dSApple OSS Distributionseach trial in the test. Choose an existing test running or write a new
391*33de042dSApple OSS Distributionsrunner with that setup and those trials. The test runner loops through
392*33de042dSApple OSS Distributionsthe trial values produced by the trial generators above, performs the
393*33de042dSApple OSS Distributionsrequired setup for the test or for each trial, and calls the function
394*33de042dSApple OSS Distributionsto be tested. If there is an existing VM API with similar setup or
395*33de042dSApple OSS Distributionssimilar parameters to yours then you can use the same runner or implement
396*33de042dSApple OSS Distributionsa variation on that runner.
397*33de042dSApple OSS Distributions
398*33de042dSApple OSS DistributionsStep 6: if your VM API function has out parameters, test that they are
399*33de042dSApple OSS Distributionsmodified or not modified as expected. This is not strictly related to
400*33de042dSApple OSS Distributionsparameter sanitization, but the sanitization error paths often have
401*33de042dSApple OSS Distributionsinconsistent out parameter handling so these tests are a convenient
402*33de042dSApple OSS Distributionsplace to verify the desired behavior.
403*33de042dSApple OSS Distributions
404*33de042dSApple OSS DistributionsStep 7: call all of your new tests from the top-level test functions
405*33de042dSApple OSS Distributions`vm_parameter_validation_kern_test` and `vm_parameter_validation_user`.
406*33de042dSApple OSS DistributionsWrap your calls in the same processing and deallocation functions as the
407*33de042dSApple OSS Distributionsother tests. You should not need to modify either of them. Note that string
408*33de042dSApple OSS Distributionsused to label the test (with the function and parameters being tested) is
409*33de042dSApple OSS Distributionsused by the pretty-printing in `tools/format_vm_parameter_validation.py`
410*33de042dSApple OSS Distributionsso choose it wisely; you may even want to edit that script to recognize
411*33de042dSApple OSS Distributionsnew things from your code. The test name is also recorded in the golden
412*33de042dSApple OSS Distributionsfiles; each test name must be unique.
413*33de042dSApple OSS Distributions
414*33de042dSApple OSS DistributionsStep 8: run your new tests and verify that the patterns of success and
415*33de042dSApple OSS Distributionserror are what you want. `tools/format_vm_parameter_validation.py` can
416*33de042dSApple OSS Distributionspretty-print some of these outputs which makes them easier to examine.
417*33de042dSApple OSS DistributionsMake sure you test the platforms with unusual behavior, such as Intel
418*33de042dSApple OSS Distributionsand Rosetta where page sizes are different. See
419*33de042dSApple OSS Distributions`tests/vm/vm_parameter_validation.c` for instructions on how to run your
420*33de042dSApple OSS Distributionstests in BATS or locally.
421*33de042dSApple OSS Distributions
422*33de042dSApple OSS DistributionsStep 9: if you are adding sanitization to an existing VM API, decide if
423*33de042dSApple OSS Distributionsyou need error code compatibility handling. Run your new test before and
424*33de042dSApple OSS Distributionsafter your new sanitization code is in place and compare the output from
425*33de042dSApple OSS Distributions`DUMP_RESULTS=1`. If your new sanitization has changed the function's
426*33de042dSApple OSS Distributionserror code behavior then you may want to write error code compatibility
427*33de042dSApple OSS Distributionsrewrites and/or telemetry for binary compatibility.
428*33de042dSApple OSS Distributions
429*33de042dSApple OSS DistributionsStep 10: update the "golden" files of expected results. This is done last
430*33de042dSApple OSS Distributionswhen you are confident that your sanitization and tests are complete and
431*33de042dSApple OSS Distributionsstable. See `tests/vm/vm_parameter_validation.c` for instructions.
432