1*19c3b8c2SApple OSS Distributions /* 2*19c3b8c2SApple OSS Distributions * Copyright (c) 2000-2021 Apple Inc. All rights reserved. 3*19c3b8c2SApple OSS Distributions * 4*19c3b8c2SApple OSS Distributions * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ 5*19c3b8c2SApple OSS Distributions * 6*19c3b8c2SApple OSS Distributions * This file contains Original Code and/or Modifications of Original Code 7*19c3b8c2SApple OSS Distributions * as defined in and that are subject to the Apple Public Source License 8*19c3b8c2SApple OSS Distributions * Version 2.0 (the 'License'). You may not use this file except in 9*19c3b8c2SApple OSS Distributions * compliance with the License. The rights granted to you under the License 10*19c3b8c2SApple OSS Distributions * may not be used to create, or enable the creation or redistribution of, 11*19c3b8c2SApple OSS Distributions * unlawful or unlicensed copies of an Apple operating system, or to 12*19c3b8c2SApple OSS Distributions * circumvent, violate, or enable the circumvention or violation of, any 13*19c3b8c2SApple OSS Distributions * terms of an Apple operating system software license agreement. 14*19c3b8c2SApple OSS Distributions * 15*19c3b8c2SApple OSS Distributions * Please obtain a copy of the License at 16*19c3b8c2SApple OSS Distributions * http://www.opensource.apple.com/apsl/ and read it before using this file. 17*19c3b8c2SApple OSS Distributions * 18*19c3b8c2SApple OSS Distributions * The Original Code and all software distributed under the License are 19*19c3b8c2SApple OSS Distributions * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER 20*19c3b8c2SApple OSS Distributions * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, 21*19c3b8c2SApple OSS Distributions * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, 22*19c3b8c2SApple OSS Distributions * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. 23*19c3b8c2SApple OSS Distributions * Please see the License for the specific language governing rights and 24*19c3b8c2SApple OSS Distributions * limitations under the License. 25*19c3b8c2SApple OSS Distributions * 26*19c3b8c2SApple OSS Distributions * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ 27*19c3b8c2SApple OSS Distributions */ 28*19c3b8c2SApple OSS Distributions 29*19c3b8c2SApple OSS Distributions #ifndef _KASAN_INTERNAL_H_ 30*19c3b8c2SApple OSS Distributions #define _KASAN_INTERNAL_H_ 31*19c3b8c2SApple OSS Distributions 32*19c3b8c2SApple OSS Distributions #include <stdbool.h> 33*19c3b8c2SApple OSS Distributions #include <mach/mach_vm.h> 34*19c3b8c2SApple OSS Distributions #include <kern/zalloc.h> 35*19c3b8c2SApple OSS Distributions #include <sys/sysctl.h> 36*19c3b8c2SApple OSS Distributions 37*19c3b8c2SApple OSS Distributions typedef uintptr_t uptr; 38*19c3b8c2SApple OSS Distributions #define MiB(x) ((x) * 1024UL * 1024) 39*19c3b8c2SApple OSS Distributions #define BIT(x) (1U << (x)) 40*19c3b8c2SApple OSS Distributions 41*19c3b8c2SApple OSS Distributions /* Sanity checks */ 42*19c3b8c2SApple OSS Distributions #ifndef KASAN 43*19c3b8c2SApple OSS Distributions #error KASAN undefined 44*19c3b8c2SApple OSS Distributions #endif 45*19c3b8c2SApple OSS Distributions 46*19c3b8c2SApple OSS Distributions #ifndef KASAN_OFFSET 47*19c3b8c2SApple OSS Distributions #error KASAN_OFFSET undefined 48*19c3b8c2SApple OSS Distributions #endif 49*19c3b8c2SApple OSS Distributions 50*19c3b8c2SApple OSS Distributions #ifndef KASAN_SCALE 51*19c3b8c2SApple OSS Distributions #error KASAN_SCALE undefined 52*19c3b8c2SApple OSS Distributions #endif 53*19c3b8c2SApple OSS Distributions 54*19c3b8c2SApple OSS Distributions #if defined(__x86_64__) 55*19c3b8c2SApple OSS Distributions # define _JBLEN ((9 * 2) + 3 + 16) 56*19c3b8c2SApple OSS Distributions #elif defined(__arm64__) 57*19c3b8c2SApple OSS Distributions # define _JBLEN ((14 + 8 + 2) * 2) 58*19c3b8c2SApple OSS Distributions #else 59*19c3b8c2SApple OSS Distributions # error "Unknown arch" 60*19c3b8c2SApple OSS Distributions #endif 61*19c3b8c2SApple OSS Distributions 62*19c3b8c2SApple OSS Distributions #if KASAN_DEBUG 63*19c3b8c2SApple OSS Distributions #define NOINLINE OS_NOINLINE 64*19c3b8c2SApple OSS Distributions #else 65*19c3b8c2SApple OSS Distributions #define NOINLINE 66*19c3b8c2SApple OSS Distributions #endif 67*19c3b8c2SApple OSS Distributions #define ALWAYS_INLINE inline __attribute__((always_inline)) 68*19c3b8c2SApple OSS Distributions #define CLANG_MIN_VERSION(x) (defined(__apple_build_version__) && (__apple_build_version__ >= (x))) 69*19c3b8c2SApple OSS Distributions 70*19c3b8c2SApple OSS Distributions #if KASAN_CLASSIC 71*19c3b8c2SApple OSS Distributions #define KASAN_MODEL_STR "kasan-classic" 72*19c3b8c2SApple OSS Distributions #define KASAN_STRIP_ADDR(_x) (_x) 73*19c3b8c2SApple OSS Distributions #elif KASAN_TBI 74*19c3b8c2SApple OSS Distributions #define KASAN_MODEL_STR "kasan-tbi" 75*19c3b8c2SApple OSS Distributions #define KASAN_STRIP_ADDR(_x) (VM_KERNEL_STRIP_UPTR(_x)) 76*19c3b8c2SApple OSS Distributions #else 77*19c3b8c2SApple OSS Distributions #error "No kasan model specified" 78*19c3b8c2SApple OSS Distributions #endif /* KASAN_CLASSIC || KASAN_TBI */ 79*19c3b8c2SApple OSS Distributions 80*19c3b8c2SApple OSS Distributions extern vm_address_t kernel_vbase; 81*19c3b8c2SApple OSS Distributions extern vm_address_t kernel_vtop; 82*19c3b8c2SApple OSS Distributions extern unsigned shadow_pages_used; 83*19c3b8c2SApple OSS Distributions 84*19c3b8c2SApple OSS Distributions /* boot-arg configurable */ 85*19c3b8c2SApple OSS Distributions extern unsigned kasan_enabled; 86*19c3b8c2SApple OSS Distributions extern int fakestack_enabled; 87*19c3b8c2SApple OSS Distributions extern bool report_suppressed_checks; 88*19c3b8c2SApple OSS Distributions 89*19c3b8c2SApple OSS Distributions #define KASAN_GRANULE (1UL << KASAN_SCALE) 90*19c3b8c2SApple OSS Distributions #define KASAN_GRANULE_MASK (KASAN_GRANULE - 1UL) 91*19c3b8c2SApple OSS Distributions #define kasan_granule_trunc(x) (x & ~KASAN_GRANULE_MASK) 92*19c3b8c2SApple OSS Distributions #define kasan_granule_round(x) ((x + KASAN_GRANULE_MASK) & ~KASAN_GRANULE_MASK) 93*19c3b8c2SApple OSS Distributions #define kasan_granule_partial(x) (x & KASAN_GRANULE_MASK) 94*19c3b8c2SApple OSS Distributions 95*19c3b8c2SApple OSS Distributions #define ADDRESS_FOR_SHADOW(x) (((KASAN_STRIP_ADDR(x)) - KASAN_OFFSET) << KASAN_SCALE) 96*19c3b8c2SApple OSS Distributions #define SHADOW_FOR_ADDRESS(x) (uint8_t *)(((KASAN_STRIP_ADDR(x)) >> KASAN_SCALE) + KASAN_OFFSET) 97*19c3b8c2SApple OSS Distributions 98*19c3b8c2SApple OSS Distributions enum __attribute__((flag_enum)) kasan_access_types { 99*19c3b8c2SApple OSS Distributions /* Common to all KASAN versions */ 100*19c3b8c2SApple OSS Distributions TYPE_LOAD = BIT(0), /* regular memory load */ 101*19c3b8c2SApple OSS Distributions TYPE_STORE = BIT(1), /* regular store */ 102*19c3b8c2SApple OSS Distributions TYPE_MEMR = BIT(2), /* memory intrinsic (read) */ 103*19c3b8c2SApple OSS Distributions TYPE_MEMW = BIT(3), /* memory intrinsic (write) */ 104*19c3b8c2SApple OSS Distributions TYPE_STRR = BIT(4), /* string intrinsic (read) */ 105*19c3b8c2SApple OSS Distributions TYPE_STRW = BIT(5), /* string intrinsic (write) */ 106*19c3b8c2SApple OSS Distributions 107*19c3b8c2SApple OSS Distributions /* KASAN-classic specific */ 108*19c3b8c2SApple OSS Distributions TYPE_KFREE = BIT(6), /* kfree() */ 109*19c3b8c2SApple OSS Distributions TYPE_ZFREE = BIT(7), /* zfree() */ 110*19c3b8c2SApple OSS Distributions TYPE_FSFREE = BIT(8), /* fakestack free */ 111*19c3b8c2SApple OSS Distributions 112*19c3b8c2SApple OSS Distributions TYPE_UAF = BIT(12), 113*19c3b8c2SApple OSS Distributions TYPE_POISON_GLOBAL = BIT(13), 114*19c3b8c2SApple OSS Distributions TYPE_POISON_HEAP = BIT(14), 115*19c3b8c2SApple OSS Distributions /* no TYPE_POISON_STACK, because the runtime does not control stack poisoning */ 116*19c3b8c2SApple OSS Distributions TYPE_TEST = BIT(15), 117*19c3b8c2SApple OSS Distributions 118*19c3b8c2SApple OSS Distributions /* masks */ 119*19c3b8c2SApple OSS Distributions TYPE_MEM = TYPE_MEMR | TYPE_MEMW, /* memory intrinsics */ 120*19c3b8c2SApple OSS Distributions TYPE_STR = TYPE_STRR | TYPE_STRW, /* string intrinsics */ 121*19c3b8c2SApple OSS Distributions TYPE_READ = TYPE_LOAD | TYPE_MEMR | TYPE_STRR, /* all reads */ 122*19c3b8c2SApple OSS Distributions TYPE_WRITE = TYPE_STORE | TYPE_MEMW | TYPE_STRW, /* all writes */ 123*19c3b8c2SApple OSS Distributions TYPE_RW = TYPE_READ | TYPE_WRITE, /* reads and writes */ 124*19c3b8c2SApple OSS Distributions TYPE_FREE = TYPE_KFREE | TYPE_ZFREE | TYPE_FSFREE, 125*19c3b8c2SApple OSS Distributions TYPE_NORMAL = TYPE_RW | TYPE_FREE, 126*19c3b8c2SApple OSS Distributions TYPE_DYNAMIC = TYPE_NORMAL | TYPE_UAF, 127*19c3b8c2SApple OSS Distributions TYPE_POISON = TYPE_POISON_GLOBAL | TYPE_POISON_HEAP, 128*19c3b8c2SApple OSS Distributions TYPE_ALL = ~0U, 129*19c3b8c2SApple OSS Distributions }; 130*19c3b8c2SApple OSS Distributions 131*19c3b8c2SApple OSS Distributions enum kasan_violation_types { 132*19c3b8c2SApple OSS Distributions REASON_POISONED = 0, /* read or write of poisoned data */ 133*19c3b8c2SApple OSS Distributions REASON_BAD_METADATA = 1, /* incorrect kasan metadata */ 134*19c3b8c2SApple OSS Distributions REASON_INVALID_SIZE = 2, /* free size did not match alloc size */ 135*19c3b8c2SApple OSS Distributions REASON_MOD_AFTER_FREE = 3, /* object modified after free */ 136*19c3b8c2SApple OSS Distributions REASON_MOD_OOB = 4, /* out of bounds modification of object */ 137*19c3b8c2SApple OSS Distributions }; 138*19c3b8c2SApple OSS Distributions 139*19c3b8c2SApple OSS Distributions typedef enum kasan_access_types access_t; 140*19c3b8c2SApple OSS Distributions typedef enum kasan_violation_types violation_t; 141*19c3b8c2SApple OSS Distributions 142*19c3b8c2SApple OSS Distributions /* 143*19c3b8c2SApple OSS Distributions * KASAN may support different shadow table formats and different checking 144*19c3b8c2SApple OSS Distributions * strategies. _impl functions are called from the format-independent 145*19c3b8c2SApple OSS Distributions * kasan code to the format dependent implementations. 146*19c3b8c2SApple OSS Distributions */ 147*19c3b8c2SApple OSS Distributions void kasan_impl_report_internal(uptr, uptr, access_t, violation_t, bool); 148*19c3b8c2SApple OSS Distributions void kasan_impl_poison_range(vm_offset_t, vm_size_t, uint8_t); 149*19c3b8c2SApple OSS Distributions void kasan_impl_kdp_disable(void); 150*19c3b8c2SApple OSS Distributions void kasan_impl_init(void); 151*19c3b8c2SApple OSS Distributions void kasan_impl_late_init(void); 152*19c3b8c2SApple OSS Distributions void kasan_impl_fill_valid_range(uintptr_t, size_t); 153*19c3b8c2SApple OSS Distributions 154*19c3b8c2SApple OSS Distributions /* 155*19c3b8c2SApple OSS Distributions * Poisoning comes from KASAN CLASSIC nomenclature. KASAN CLASSIC is based on 156*19c3b8c2SApple OSS Distributions * identifying valid memory vs poisoned memory (memory that shouldn't be accessed). 157*19c3b8c2SApple OSS Distributions * This terminology isn't great for KASAN TBI, but is kept for compatibility. 158*19c3b8c2SApple OSS Distributions */ 159*19c3b8c2SApple OSS Distributions void kasan_poison(vm_offset_t, vm_size_t, vm_size_t, vm_size_t, uint8_t); 160*19c3b8c2SApple OSS Distributions 161*19c3b8c2SApple OSS Distributions /* 162*19c3b8c2SApple OSS Distributions * Runtime checking. kasan_check_range() is consumed by the inlined 163*19c3b8c2SApple OSS Distributions * instrumentation. See kasan-helper.c 164*19c3b8c2SApple OSS Distributions */ 165*19c3b8c2SApple OSS Distributions bool kasan_check_enabled(access_t); 166*19c3b8c2SApple OSS Distributions bool kasan_impl_check_enabled(access_t); 167*19c3b8c2SApple OSS Distributions void kasan_check_range(const void *, size_t, access_t); 168*19c3b8c2SApple OSS Distributions 169*19c3b8c2SApple OSS Distributions /* dynamic blacklist */ 170*19c3b8c2SApple OSS Distributions void kasan_init_dybl(void); 171*19c3b8c2SApple OSS Distributions bool kasan_is_blacklisted(access_t); 172*19c3b8c2SApple OSS Distributions void kasan_dybl_load_kext(uintptr_t, const char *); 173*19c3b8c2SApple OSS Distributions void kasan_dybl_unload_kext(uintptr_t); 174*19c3b8c2SApple OSS Distributions 175*19c3b8c2SApple OSS Distributions /* arch-specific interface */ 176*19c3b8c2SApple OSS Distributions void kasan_arch_init(void); 177*19c3b8c2SApple OSS Distributions bool kasan_is_shadow_mapped(uintptr_t); 178*19c3b8c2SApple OSS Distributions 179*19c3b8c2SApple OSS Distributions /* Locking */ 180*19c3b8c2SApple OSS Distributions void kasan_lock_init(void); 181*19c3b8c2SApple OSS Distributions void kasan_lock(boolean_t *); 182*19c3b8c2SApple OSS Distributions void kasan_unlock(boolean_t); 183*19c3b8c2SApple OSS Distributions bool kasan_lock_held(thread_t); 184*19c3b8c2SApple OSS Distributions 185*19c3b8c2SApple OSS Distributions /* Subsystem helpers */ 186*19c3b8c2SApple OSS Distributions void kasan_free_internal(void **addrp, vm_size_t *sizep, int type, zone_t *, vm_size_t user_size, int locked, bool doquarantine); 187*19c3b8c2SApple OSS Distributions void kasan_init_fakestack(void); 188*19c3b8c2SApple OSS Distributions 189*19c3b8c2SApple OSS Distributions /* 190*19c3b8c2SApple OSS Distributions * Global variables need to be explicitly handled at runtime, both for xnu 191*19c3b8c2SApple OSS Distributions * and for KEXTs. 192*19c3b8c2SApple OSS Distributions */ 193*19c3b8c2SApple OSS Distributions void kasan_init_globals(vm_offset_t, vm_size_t); 194*19c3b8c2SApple OSS Distributions 195*19c3b8c2SApple OSS Distributions /* 196*19c3b8c2SApple OSS Distributions * Handle KASAN detected issues. If modifying kasan_crash_report(), remember 197*19c3b8c2SApple OSS Distributions * that is called by the instrumentation as well, see kasan-helper.c. 198*19c3b8c2SApple OSS Distributions */ 199*19c3b8c2SApple OSS Distributions void kasan_violation(uintptr_t, size_t, access_t, violation_t); 200*19c3b8c2SApple OSS Distributions size_t kasan_impl_decode_issue(char *, size_t, uptr, uptr, access_t, violation_t); 201*19c3b8c2SApple OSS Distributions void NOINLINE OS_NORETURN kasan_crash_report(uptr, uptr, access_t, violation_t); 202*19c3b8c2SApple OSS Distributions 203*19c3b8c2SApple OSS Distributions void kasan_handle_test(void); 204*19c3b8c2SApple OSS Distributions 205*19c3b8c2SApple OSS Distributions SYSCTL_DECL(kasan); 206*19c3b8c2SApple OSS Distributions SYSCTL_DECL(_kern_kasan); 207*19c3b8c2SApple OSS Distributions 208*19c3b8c2SApple OSS Distributions #endif /* _KASAN_INTERNAL_H_ */ 209