]> git.saurik.com Git - apple/xnu.git/blob - tests/kernel_inspection.c
xnu-7195.101.1.tar.gz
[apple/xnu.git] / tests / kernel_inspection.c
1 #ifdef T_NAMESPACE
2 #undef T_NAMESPACE
3 #endif
4
5 #include <darwintest.h>
6
7 #include <mach/host_priv.h>
8 #include <mach/mach.h>
9 #include <mach/mach_types.h>
10 #include <mach/mach_vm.h>
11 #include <mach/processor_set.h>
12 #include <mach/task.h>
13 #include <sys/sysctl.h>
14 #include <mach_debug/ipc_info.h>
15 #include <unistd.h>
16
17 T_GLOBAL_META(T_META_NAMESPACE("xnu.ipc"),
18 T_META_RUN_CONCURRENTLY(true));
19
20 /*
21 * Attempt to inspect kernel_task using a task_inspect_t. Interact with the
22 * kernel in the same way top(1) and lsmp(1) do.
23 */
24
25 static int found_kernel_task = 0;
26
27 static void
28 check_secure_kernel(void)
29 {
30 int secure_kern = 0;
31 size_t secure_kern_size = sizeof(secure_kern);
32
33 T_ASSERT_POSIX_SUCCESS(sysctlbyname("kern.secure_kernel", &secure_kern,
34 &secure_kern_size, NULL, 0), NULL);
35
36 if (secure_kern) {
37 T_SKIP("secure kernel: processor_set_tasks will not return kernel_task");
38 }
39 }
40
41 static void
42 attempt_kernel_inspection(task_t task)
43 {
44 pid_t pid = (pid_t)-1;
45 mach_msg_type_number_t i, count, thcnt;
46 struct task_basic_info_64 ti;
47 thread_act_array_t threads;
48
49 if (pid_for_task(task, &pid)) {
50 return;
51 }
52
53 T_QUIET; T_LOG("Checking pid %d", pid);
54
55 if (pid != 0) {
56 return;
57 }
58
59 T_LOG("found kernel_task, attempting to inspect");
60 found_kernel_task++;
61
62 count = TASK_BASIC_INFO_64_COUNT;
63 T_EXPECT_MACH_SUCCESS(task_info(task, TASK_BASIC_INFO_64, (task_info_t)&ti,
64 &count), "task_info(... TASK_BASIC_INFO_64 ...)");
65
66 T_EXPECT_MACH_SUCCESS(task_threads(task, &threads, &thcnt), "task_threads");
67 T_LOG("Found %d kernel threads.", thcnt);
68 for (i = 0; i < thcnt; i++) {
69 kern_return_t kr;
70 thread_basic_info_data_t basic_info;
71 mach_msg_type_number_t bi_count = THREAD_BASIC_INFO_COUNT;
72
73 kr = thread_info(threads[i], THREAD_BASIC_INFO,
74 (thread_info_t)&basic_info, &bi_count);
75 /*
76 * Ignore threads that have gone away.
77 */
78 if (kr == MACH_SEND_INVALID_DEST) {
79 T_LOG("ignoring thread that has been destroyed");
80 continue;
81 }
82 T_QUIET; T_EXPECT_MACH_SUCCESS(kr, "thread_info(... THREAD_BASIC_INFO ...)");
83
84 /* Now try out READ (skip eval) interfaces on kernel thread */
85 mach_msg_type_number_t msk_count = EXC_TYPES_COUNT;
86 exception_mask_t masks[EXC_TYPES_COUNT];
87 ipc_info_port_t ports_info[EXC_TYPES_COUNT];
88 exception_behavior_t behaviors[EXC_TYPES_COUNT];
89 thread_state_flavor_t flavors[EXC_TYPES_COUNT];
90 kr = thread_get_exception_ports_info(threads[i], EXC_MASK_ALL, masks, &msk_count, ports_info, behaviors, flavors);
91 T_QUIET; T_EXPECT_MACH_SUCCESS(kr, "thread_get_exception_ports_info() on kernel thread: 0x%x", kr);
92
93 /* READ (with eval) interfaces should fail */
94 mach_port_t voucher;
95 kr = thread_get_mach_voucher(threads[i], 0, &voucher);
96 T_QUIET; T_EXPECT_EQ(kr, KERN_INVALID_ARGUMENT, "thread_get_mach_voucher() should fail with KERN_INVALID_ARGUMENT");
97
98 (void)mach_port_deallocate(mach_task_self(), threads[i]);
99 }
100 mach_vm_deallocate(mach_task_self(),
101 (mach_vm_address_t)(uintptr_t)threads,
102 thcnt * sizeof(*threads));
103
104 ipc_info_space_basic_t basic_info;
105 T_EXPECT_MACH_SUCCESS(mach_port_space_basic_info(task, &basic_info), "mach_port_space_basic_info");
106
107 ipc_info_space_t info_space;
108 ipc_info_name_array_t table;
109 ipc_info_tree_name_array_t tree;
110 mach_msg_type_number_t tblcnt = 0, treecnt = 0;
111 T_EXPECT_MACH_SUCCESS(mach_port_space_info(task, &info_space, &table,
112 &tblcnt, &tree, &treecnt), "mach_port_space_info");
113 if (tblcnt > 0) {
114 mach_vm_deallocate(mach_task_self(),
115 (mach_vm_address_t)(uintptr_t)table,
116 tblcnt * sizeof(*table));
117 }
118 if (treecnt > 0) {
119 mach_vm_deallocate(mach_task_self(),
120 (mach_vm_address_t)(uintptr_t)tree,
121 treecnt * sizeof(*tree));
122 }
123
124 /* Now try out READ (skip eval) interfaces on kernel task */
125 mach_msg_type_number_t msk_count = EXC_TYPES_COUNT;
126 exception_mask_t masks[EXC_TYPES_COUNT];
127 ipc_info_port_t ports_info[EXC_TYPES_COUNT];
128 exception_behavior_t behaviors[EXC_TYPES_COUNT];
129 thread_state_flavor_t flavors[EXC_TYPES_COUNT];
130 kern_return_t kr = task_get_exception_ports_info(task, EXC_MASK_ALL, masks, &msk_count, ports_info, behaviors, flavors);
131 T_EXPECT_MACH_SUCCESS(kr, "task_get_exception_ports_info() on kernel_task: 0x%x", kr);
132
133 /* READ (with eval) interfaces should fail */
134 vm_offset_t data;
135 mach_msg_type_number_t cnt;
136 mach_vm_address_t addr = 0x10000000; /* can be whatever, the call should fail before getting to VM */
137
138 kr = mach_vm_read(task, (mach_vm_address_t)addr, 8, &data, &cnt);
139 T_EXPECT_EQ(kr, KERN_INVALID_ARGUMENT, "mach_vm_read() should fail with KERN_INVALID_ARGUMENT");
140
141 mach_port_t voucher;
142 kr = task_get_mach_voucher(task, 0, &voucher);
143 T_EXPECT_EQ(kr, KERN_INVALID_TASK, "task_get_mach_voucher() should fail with KERN_INVALID_TASK");
144
145 /* Control interfaces should absolutely fail */
146 kr = task_set_mach_voucher(task, mach_task_self()); /* voucher arg is unused, can be whatever port */
147 T_EXPECT_EQ(kr, KERN_INVALID_TASK, "task_set_mach_voucher() should fail with KERN_INVALID_TASK");
148 }
149
150 T_DECL(inspect_kernel_task,
151 "ensure that kernel task can be inspected",
152 T_META_CHECK_LEAKS(false),
153 T_META_ASROOT(true))
154 {
155 processor_set_name_array_t psets;
156 processor_set_t pset;
157 task_array_t tasks;
158 mach_msg_type_number_t i, j, tcnt, pcnt = 0;
159 mach_port_t self = mach_host_self();
160
161 check_secure_kernel();
162
163 T_ASSERT_MACH_SUCCESS(host_processor_sets(self, &psets, &pcnt),
164 NULL);
165
166 for (i = 0; i < pcnt; i++) {
167 T_ASSERT_MACH_SUCCESS(host_processor_set_priv(self, psets[i], &pset), NULL);
168 T_LOG("Checking pset %d/%d", i, pcnt - 1);
169
170 tcnt = 0;
171 T_LOG("Attempting kernel inspection with control port...");
172 T_ASSERT_MACH_SUCCESS(processor_set_tasks(pset, &tasks, &tcnt), NULL);
173
174 for (j = 0; j < tcnt; j++) {
175 attempt_kernel_inspection(tasks[j]);
176 mach_port_deallocate(self, tasks[j]);
177 }
178
179 /* free tasks array */
180 mach_vm_deallocate(mach_task_self(),
181 (mach_vm_address_t)(uintptr_t)tasks,
182 tcnt * sizeof(*tasks));
183
184 T_LOG("Attempting kernel inspection with read port...");
185 T_ASSERT_MACH_SUCCESS(processor_set_tasks_with_flavor(pset, TASK_FLAVOR_READ, &tasks, &tcnt), NULL);
186
187 for (j = 0; j < tcnt; j++) {
188 attempt_kernel_inspection(tasks[j]);
189 mach_port_deallocate(self, tasks[j]);
190 }
191
192 mach_vm_deallocate(mach_task_self(),
193 (mach_vm_address_t)(uintptr_t)tasks,
194 tcnt * sizeof(*tasks));
195
196 mach_port_deallocate(mach_task_self(), pset);
197 mach_port_deallocate(mach_task_self(), psets[i]);
198 }
199 mach_vm_deallocate(mach_task_self(),
200 (mach_vm_address_t)(uintptr_t)psets,
201 pcnt * sizeof(*psets));
202
203 if (found_kernel_task != 2) {
204 /* One for kernel control port test, one for kernel read port test. */
205 T_FAIL("could not find kernel_task in list of tasks returned");
206 }
207 }