2 * Test voucher trap APIs.
3 * There was an unfortunate bug in the trap interface that used the user space
4 * _address_ of a trap parameter as a copyin size. This test validates there
5 * are no other kernel panics in the voucher create and voucher attribute
6 * extraction mach traps.
8 * clang -o voucher_traps voucher_traps.c -ldarwintest -Weverything -Wno-gnu-flexible-array-initializer
10 * <rdar://problem/29379175>
15 #include <mach/mach.h>
16 #include <mach/mach_vm.h>
17 #include <mach/mach_traps.h>
19 #include <atm/atm_types.h>
21 #include <darwintest.h>
23 T_GLOBAL_META(T_META_RUN_CONCURRENTLY(true));
26 get_user_data_port(mach_msg_type_number_t
*size
)
28 #define DATA "Hello World!"
30 mach_voucher_attr_recipe_data_t recipe
;
31 char data
[sizeof(DATA
)];
34 .key
= MACH_VOUCHER_ATTR_KEY_USER_DATA
,
35 .command
= MACH_VOUCHER_ATTR_USER_DATA_STORE
,
36 .content_size
= sizeof(DATA
),
41 mach_port_t port
= MACH_PORT_NULL
;
42 kern_return_t kr
= host_create_mach_voucher(mach_host_self(),
43 (mach_voucher_attr_raw_recipe_array_t
)&buf
,
45 T_ASSERT_MACH_SUCCESS(kr
, "Create USER_DATA voucher: 0x%x",
55 T_DECL(voucher_extract_attr_recipe
, "voucher_extract_attr_recipe")
58 mach_vm_size_t alloc_sz
;
60 mach_vm_address_t alloc_addr
;
61 mach_msg_type_number_t expected_size
;
63 /* map at least a page of memory at some arbitrary location */
64 alloc_sz
= (mach_vm_size_t
)round_page(MACH_VOUCHER_TRAP_STACK_LIMIT
+ 1);
67 * We could theoretically ask for a fixed location, but this is more
68 * reliable, and we're not actually trying to exploit anything - a
69 * kernel panic on failure should suffice :-)
71 alloc_addr
= (mach_vm_address_t
)round_page(MACH_VOUCHER_ATTR_MAX_RAW_RECIPE_ARRAY_SIZE
+ 1);
72 kr
= mach_vm_allocate(mach_task_self(), &alloc_addr
,
73 alloc_sz
, VM_FLAGS_ANYWHERE
);
76 * Make sure that the address of the allocation is larger than the
77 * maximum recipe size: this will test for the bug that was fixed in
78 * <rdar://problem/29379175>.
80 T_ASSERT_GT_ULLONG((uint64_t)alloc_addr
,
81 (uint64_t)MACH_VOUCHER_ATTR_MAX_RAW_RECIPE_ARRAY_SIZE
,
82 "Recipe addr (%llu bytes): 0x%llx > max recipe sz: %llu",
83 (uint64_t)alloc_sz
, (uint64_t)alloc_addr
,
84 (uint64_t)MACH_VOUCHER_ATTR_MAX_RAW_RECIPE_ARRAY_SIZE
);
86 /* make the allocation look like a pointer to an int */
87 mach_msg_type_number_t
*recipe_size
;
88 recipe_size
= (mach_msg_type_number_t
*)((uintptr_t)alloc_addr
);
89 bzero(recipe_size
, (unsigned long)alloc_sz
);
90 if (alloc_sz
> MACH_VOUCHER_ATTR_MAX_RAW_RECIPE_ARRAY_SIZE
) {
91 *recipe_size
= MACH_VOUCHER_ATTR_MAX_RAW_RECIPE_ARRAY_SIZE
;
93 *recipe_size
= (mach_msg_type_number_t
)alloc_sz
;
96 /* recipe buffer on the heap: memset it so panics show up loudly */
97 size_t size
= (size_t)(10 * 1024 * 1024);
98 void *recipe
= malloc(size
);
99 memset(recipe
, 0x41, size
);
101 port
= get_user_data_port(&expected_size
);
104 * This should try to extract the USER_DATA attribute using a buffer on the
105 * kernel heap (probably zone memory).
107 kr
= mach_voucher_extract_attr_recipe_trap(port
,
108 MACH_VOUCHER_ATTR_KEY_USER_DATA
, recipe
, recipe_size
);
109 T_ASSERT_MACH_SUCCESS(kr
, "Extract attribute data with recipe: heap");
110 T_ASSERT_EQ(*recipe_size
, expected_size
, "size should match");
112 /* reset the recipe memory */
113 memset(recipe
, 0x41, size
);
114 /* reduce the size to get an allocation on the kernel stack */
115 *recipe_size
= MACH_VOUCHER_TRAP_STACK_LIMIT
- 1;
118 * This should try to extract the USER_DATA attribute using a buffer on the
121 kr
= mach_voucher_extract_attr_recipe_trap(port
,
122 MACH_VOUCHER_ATTR_KEY_USER_DATA
, recipe
, recipe_size
);
123 T_ASSERT_MACH_SUCCESS(kr
, "Extract attribute data with recipe: stack");
124 T_ASSERT_EQ(*recipe_size
, expected_size
, "size should match");
129 kr
= mach_vm_deallocate(mach_task_self(), alloc_addr
, alloc_sz
);
130 T_ASSERT_MACH_SUCCESS(kr
, "Deallocate recipe buffers");