* Use is subject to license terms.
*/
-/*
- * #pragma ident "@(#)dtrace_subr.c 1.8 07/06/05 SMI"
- */
-
#include <stdarg.h>
#include <string.h>
#include <sys/malloc.h>
#include <sys/dtrace.h>
#include <sys/dtrace_impl.h>
#include <sys/proc_internal.h>
+#include <sys/vnode.h>
#include <kern/debug.h>
#include <kern/sched_prim.h>
#include <kern/task.h>
#if CONFIG_CSR
#include <sys/codesign.h>
#include <sys/csr.h>
+
+#if defined(KERNEL_INTEGRITY_KTRR) || defined(KERNEL_INTEGRITY_CTRR)
+extern bool csr_unsafe_kernel_text;
+#endif
#endif
/*
* duty to resume the task.
*/
-lck_mtx_t dtrace_procwaitfor_lock;
+LCK_MTX_DECLARE_ATTR(dtrace_procwaitfor_lock, &dtrace_lck_grp, &dtrace_lck_attr);
typedef struct dtrace_proc_awaited_entry {
struct dtrace_procdesc *pdesc;
void (*dtrace_proc_waitfor_exec_ptr)(proc_t*) = NULL;
+static int
+dtrace_proc_get_execpath(proc_t *p, char *buffer, int *maxlen)
+{
+ int err = 0, vid = 0;
+ vnode_t tvp = NULLVP, nvp = NULLVP;
+
+ ASSERT(p);
+ ASSERT(buffer);
+ ASSERT(maxlen);
+
+ if ((tvp = p->p_textvp) == NULLVP)
+ return ESRCH;
+
+ vid = vnode_vid(tvp);
+ if ((err = vnode_getwithvid(tvp, vid)) != 0)
+ return err;
+
+ if ((err = vn_getpath_fsenter(tvp, buffer, maxlen)) != 0)
+ return err;
+ vnode_put(tvp);
+
+ if ((err = vnode_lookup(buffer, 0, &nvp, vfs_context_current())) != 0)
+ return err;
+ if (nvp != NULLVP)
+ vnode_put(nvp);
+
+ return 0;
+}
+
+
static void
dtrace_proc_exec_notification(proc_t *p) {
dtrace_proc_awaited_entry_t *entry, *tmp;
+ static char execpath[MAXPATHLEN];
ASSERT(p);
ASSERT(p->p_pid != -1);
lck_mtx_lock(&dtrace_procwaitfor_lock);
- /*
- * For each entry, if it has not been matched with a process yet we
- * try to match it with the newly created process. If they match, the
- * entry is initialized with the process id and the process task is
- * suspended. Finally, we wake up the client's waiting thread.
- */
LIST_FOREACH_SAFE(entry, &dtrace_proc_awaited_head, entries, tmp) {
- if ((entry->pdesc->p_pid == -1)
- && !strncmp(entry->pdesc->p_comm, &p->p_comm[0], sizeof(p->p_comm)))
- {
+ /* By default consider we're using p_comm. */
+ char *pname = p->p_comm;
+
+ /* Already matched with another process. */
+ if ((entry->pdesc->p_pid != -1))
+ continue;
+
+ /* p_comm is too short, use the execpath. */
+ if (entry->pdesc->p_name_length >= MAXCOMLEN) {
+ /*
+ * Retrieve the executable path. After the call, length contains
+ * the length of the string + 1.
+ */
+ int length = sizeof(execpath);
+ if (dtrace_proc_get_execpath(p, execpath, &length) != 0)
+ continue;
+ /* Move the cursor to the position after the last / */
+ pname = &execpath[length - 1];
+ while (pname != execpath && *pname != '/')
+ pname--;
+ pname = (*pname == '/') ? pname + 1 : pname;
+ }
+
+ if (!strcmp(entry->pdesc->p_name, pname)) {
entry->pdesc->p_pid = p->p_pid;
task_pidsuspend(p->task);
wakeup(entry);
int res;
ASSERT(pdesc);
- ASSERT(pdesc->p_comm);
+ ASSERT(pdesc->p_name);
+
+ /*
+ * Never trust user input, compute the length of the process name and ensure the
+ * string is null terminated.
+ */
+ pdesc->p_name_length = (int) strnlen(pdesc->p_name, sizeof(pdesc->p_name));
+ if (pdesc->p_name_length >= (int) sizeof(pdesc->p_name))
+ return -1;
lck_mtx_lock(&dtrace_procwaitfor_lock);
kmem_free(hdlr, sizeof (dtrace_invop_hdlr_t));
}
+void*
+dtrace_ptrauth_strip(void *ptr, uint64_t key)
+{
+#pragma unused(key)
+#if __has_feature(ptrauth_calls)
+ /*
+ * The key argument to ptrauth_strip needs to be a compile-time
+ * constant
+ */
+ switch (key) {
+ case ptrauth_key_asia:
+ return ptrauth_strip(ptr, ptrauth_key_asia);
+ case ptrauth_key_asib:
+ return ptrauth_strip(ptr, ptrauth_key_asib);
+ case ptrauth_key_asda:
+ return ptrauth_strip(ptr, ptrauth_key_asda);
+ case ptrauth_key_asdb:
+ return ptrauth_strip(ptr, ptrauth_key_asdb);
+ default:
+ return ptr;
+ }
+#else
+ return ptr;
+#endif // __has_feature(ptrauth_calls)
+}
+
+int
+dtrace_is_valid_ptrauth_key(uint64_t key)
+{
+#pragma unused(key)
+#if __has_feature(ptrauth_calls)
+ return (key == ptrauth_key_asia) || (key == ptrauth_key_asib) ||
+ (key == ptrauth_key_asda) || (key == ptrauth_key_asdb);
+#else
+ return (0);
+#endif /* __has_feature(ptrauth_calls) */
+}
+
+uint64_t
+dtrace_physmem_read(uint64_t addr, size_t size)
+{
+ switch (size) {
+ case 1:
+ return (uint64_t)ml_phys_read_byte_64((addr64_t)addr);
+ case 2:
+ return (uint64_t)ml_phys_read_half_64((addr64_t)addr);
+ case 4:
+ return (uint64_t)ml_phys_read_64((addr64_t)addr);
+ case 8:
+ return (uint64_t)ml_phys_read_double_64((addr64_t)addr);
+ }
+ DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
+
+ return (0);
+}
+
+void
+dtrace_physmem_write(uint64_t addr, uint64_t data, size_t size)
+{
+ switch (size) {
+ case 1:
+ ml_phys_write_byte_64((addr64_t)addr, (unsigned int)data);
+ break;
+ case 2:
+ ml_phys_write_half_64((addr64_t)addr, (unsigned int)data);
+ break;
+ case 4:
+ ml_phys_write_64((addr64_t)addr, (unsigned int)data);
+ break;
+ case 8:
+ ml_phys_write_double_64((addr64_t)addr, (unsigned long long)data);
+ break;
+ default:
+ DTRACE_CPUFLAG_SET(CPU_DTRACE_ILLOP);
+ }
+}
+
+static minor_t next_minor = 0;
+static dtrace_state_t* dtrace_clients[DTRACE_NCLIENTS] = {NULL};
+
+
+minor_t
+dtrace_state_reserve(void)
+{
+ for (int i = 0; i < DTRACE_NCLIENTS; i++) {
+ minor_t minor = os_atomic_inc_orig(&next_minor, relaxed) % DTRACE_NCLIENTS;
+ if (dtrace_clients[minor] == NULL)
+ return minor;
+ }
+ return 0;
+}
+
+dtrace_state_t*
+dtrace_state_get(minor_t minor)
+{
+ ASSERT(minor < DTRACE_NCLIENTS);
+ return dtrace_clients[minor];
+}
+
+dtrace_state_t*
+dtrace_state_allocate(minor_t minor)
+{
+ dtrace_state_t *state = _MALLOC(sizeof(dtrace_state_t), M_TEMP, M_ZERO | M_WAITOK);
+ if (dtrace_casptr(&dtrace_clients[minor], NULL, state) != NULL) {
+ // We have been raced by another client for this number, abort
+ _FREE(state, M_TEMP);
+ return NULL;
+ }
+ return state;
+}
+
+void
+dtrace_state_free(minor_t minor)
+{
+ dtrace_state_t *state = dtrace_clients[minor];
+ dtrace_clients[minor] = NULL;
+ _FREE(state, M_TEMP);
+}
+
+
+
+void
+dtrace_restriction_policy_load(void)
+{
+}
+
/*
* Check if DTrace has been restricted by the current security policy.
*/
return FALSE;
}
+boolean_t
+dtrace_are_restrictions_relaxed(void)
+{
+#if CONFIG_CSR
+ if (csr_check(CSR_ALLOW_APPLE_INTERNAL) == 0)
+ return TRUE;
+#endif
+
+ return FALSE;
+}
+
+boolean_t
+dtrace_fbt_probes_restricted(void)
+{
+
+#if CONFIG_CSR
+ if (dtrace_is_restricted() && !dtrace_are_restrictions_relaxed())
+ return TRUE;
+#endif
+
+ return FALSE;
+}
+
+boolean_t
+dtrace_sdt_probes_restricted(void)
+{
+
+ return FALSE;
+}
+
/*
* Check if the process can be attached.
*/
ASSERT(proc != NULL);
#if CONFIG_CSR
- if ((cs_entitlement_flags(proc) & CS_GET_TASK_ALLOW) == 0)
+ if (cs_restricted(proc))
return FALSE;
#endif