Commit Graph

97 Commits

Author SHA1 Message Date
Ariel Abreu
be9afe1fa5
Add a tid_for_thread call 2022-03-24 13:58:45 -04:00
Ariel Abreu
a4364df97b
Add a stop_after_exec call 2022-03-24 13:58:18 -04:00
Ariel Abreu
f1ba799ba9
Add a set_dyld_info call 2022-03-24 13:57:07 -04:00
Ariel Abreu
8bb81313a0
Add a set_tracer call (and implement get_tracer) 2022-03-24 13:47:32 -04:00
Ariel Abreu
ffcd17e5a7
Implement TASK_VM_INFO 2022-03-24 13:42:04 -04:00
Ariel Abreu
69c5a1d7ed
Add a method and a hook to send a signal to a thread 2022-03-24 13:40:27 -04:00
Ariel Abreu
a82cff6069
RPC changes for better interrupt/signal handling 2022-03-21 00:29:29 -04:00
Ariel Abreu
aee29954e2
Minor fixes for interrupt/signal handling 2022-03-21 00:27:28 -04:00
Ariel Abreu
bf2dce949a
Mount procfs in child
procfs can only be mounted once we're in the container's PID namespace;
otherwise, it shows the old PID namespace.
2022-03-21 00:23:46 -04:00
Ariel Abreu
878918aa18
dtape: Implement a few duct-taped functions for neofetch
`mach_vm_region`, `thread_info`, and `TASK_THREAD_TIMES_INFO`
2022-03-15 01:59:46 -04:00
Ariel Abreu
db67387fcd
Allow calls to be unmanaged
Unmanaged calls are those that can come from unmanaged processes,
i.e. processes that the server does not control. They can also come from
managed processes, but they don't have to.

This commit does not introduce any unmanaged calls, however.
During local development, I created one and later decided to discard it.
However, this does seem like a useful feature, so it's being added with
this commit.
2022-03-09 17:33:33 -05:00
Ariel Abreu
d33faaa3d8
Treat ECONNREFUSED like EPIPE when sending messages 2022-03-09 17:29:30 -05:00
Ariel Abreu
ddac152b11
Add some code useful for debugging
The main debugging code added is for keeping track of port names and
their associated IPC objects, as well as keeping track of the members of
port sets.

Additionally, when extended debugging is enabled, the server can now
wait for a debugger with the new env var `DSERVER_WAIT4DEBUGGER`.

The AsyncWriter class was originally written for some additional
debugging code I wrote but later decided wouldn't really be useful.
I kept the AsyncWriter class, however, as it seems it might be useful
for future code (it's basically fire-and-forget asynchronous writing).
Note that it has not been tested at all.
2022-03-09 17:28:37 -05:00
Ariel Abreu
bce5f3049b
Re-work sigexc handling code
We now handle the sigexc calls as normal calls, with the exception that
it's okay for them to become active while another call was active.

We also set the thread's wait result to THREAD_INTERRUPTED and handle
syscall returns in interrupted continuations by jumping back to the
sigexc_enter code.
2022-03-04 12:51:57 -05:00
Ariel Abreu
99da1d77c9
dtape: Partially implement mach_vm_remap
It doesn't support memory sharing or copying to a map other than the
current task yet. However, the LKM didn't support the latter case either,
so the only thing we're really missing is the ability to create a shared
region from a previously private one.
2022-03-04 12:49:17 -05:00
Ariel Abreu
06f9612fa2
Fix race for call destruction when sleeping a microthread
When a microthread went to sleep with a continuation, we discarded its
call. This would lead to the call being disposed before we had a chance
to reply to it. Instead, now we keep a reference to it in the thread
until we send a reply for it.
2022-03-04 00:29:21 -05:00
Ariel Abreu
a7e054c57e
Properly handle task and thread death
It was mainly thread death that needed fixing; we need to remove
duct-taped threads from their task's thread list.
2022-03-03 00:08:38 -05:00
Ariel Abreu
ba7ef096a2
Fix for systems without the "index" option in overlayfs 2022-03-03 00:05:47 -05:00
Ariel Abreu
8c2fc2e364
Inform ASAN about our microthreading business
If we don't tell ASAN about what we're doing with microthreads, it gets
majorly confused about what's going on and generates lots of false
positives.

This is mainly because it poisons the stack, which we re-use when we
start a microthread from a new point (e.g. from a continuation or a new
call). The solution is simple: just tell ASAN that that memory for the
stack is OK when we do this.

Informing ASAN about our microthreads (which it calls "fibers") is just
a neat bonus to have it recognize our microthread stacks as actual stacks
and not just random memory.
2022-03-03 00:04:49 -05:00
Ariel Abreu
3c8765b284
Prevent threads from being doubly impersonated
This means that it should now be impossible for microthread to be running
on two different threads simultaneously, impersonated or not.
2022-03-02 23:56:00 -05:00
Ariel Abreu
1ac70a952a
Make sure no microthreading occurs during dtape_init 2022-03-02 23:52:54 -05:00
Ariel Abreu
97e36ba645
calls: De-duplicate generated internal code a bit 2022-03-02 23:46:32 -05:00
Ariel Abreu
02e1023db1
calls: Add console_open
This RPC call gives the caller a socket to which it can write to to log
to the server's log stream.

This is used to give userspace a place to put messages for "/dev/console".
Most notably, launchd tries to log to this device for important log
messages. This allows us to capture those messages.
2022-03-02 23:44:00 -05:00
Ariel Abreu
edfad52389
Attempt to handle signals while call is active
This is an early attempt at getting signal handling working when there is a call already active.
2022-02-26 10:38:45 -05:00
Ariel Abreu
fcdd0c28c5
dtape: Partially implement task_info 2022-02-25 22:41:01 -05:00
Ariel Abreu
4897515c34
dtape: Implement task{,_name}_for_pid and pid_for_task 2022-02-25 21:57:14 -05:00
Ariel Abreu
2f4e4ef4f4
dtape_semaphore: Properly handle KERN_ABORTED
This indicates that the waiting was interrupted (with THREAD_INTERRUPTED) and we probably don't want to be panicking needlessly over it.
2022-02-25 16:57:05 -05:00
Ariel Abreu
35811342c4
kqchan: Check for events after sending messages
XNU's kevent filter code returns FILTER_ACTIVE when there are events still available after a filter call. This tells kevent to check for more events at its discretion. Thus, to mimic this behavior, whenever we send a message, we check for more events afterwards.

Note that we only do this once the message has been fully sent. For reasons that are still unclear, checking immediately after queueing the message and queueing a new notification message as a result of this check messes up the order of the messages that our peer sees.
2022-02-25 16:52:48 -05:00
Ariel Abreu
d95c18f39c
Logging improvements
Instances of classes that inherit from the new Loggable class can now be logged directly to a Log::Stream. This makes it easier to log objects that provide context for a message.

Additionally, the kqchan code has been updated to use this new functionality to log kqchannels along with messages and make it easier to identify them and their processes.

Finally, for every message, the thread and process logging it is now recorded along with the message.
2022-02-25 16:45:09 -05:00
Ariel Abreu
88282d5c81
Change thread execution deferral code a bit 2022-02-25 16:25:48 -05:00
Ariel Abreu
7274224d44
Implement psynch using pthread kext
This is an initial implementation that will probably need more tweaking and fixing down the line, but it seems to work for now.
2022-02-23 00:55:03 -05:00
Ariel Abreu
556f078514
Various minor fixes and cleanups
* Delete duct-tape/Makefile (it's a copy of the LKM's Makefile)
  * Add a slash between the prefix directory and the socket filename so the socket is actually *in* the prefix and not next to it.
  * Disable console logging by default and introduce a `DSERVER_LOG_STDERR` env var to optionally enable it
  * EPIPE means the peer of the first message in a message queue died, so just drop the message; the main event loop will soon notice (via pidfd) that the peer died.
2022-02-20 01:41:28 -05:00
Ariel Abreu
a0e95e0ee2
Fix Mach port set support in kqchannels
We use a kernel waiter thread to wait on the port set waitq. This is probably too much just for waiting on a port set; however, this is the best non-invasive solution. The other way to do this would be to modify the mqueue code to perform KNOTE on a port's port set (which is not easy to find; you'd have to walk through the port's waitq's waitq_sets looking for something that looks like a portset waitq_set).

Additionally, when a peer asks to read a Mach port kqchan and there are no events available, report it like we do for process kqchannels.
2022-02-20 01:36:26 -05:00
Ariel Abreu
9dc6253fa0
Implement task_is_64_bit RPC call 2022-02-20 01:30:11 -05:00
Ariel Abreu
03706a335c
Fix stupid mistakes with S2C and duct-taped memory manipulation
S2C calls were always failing because `_s2cPerform` was moving `_s2cReply` into a local variable (as it should) but then using `_s2cReply` (which is invalidated by the move) for error checking and returning that value instead of the moved local variable.

Also, copyinmap/copyout had the order of the arguments to memmove mixed up for the kernel_map case.
2022-02-20 01:28:26 -05:00
Ariel Abreu
fa20ec7673
Wait for thread to stop running before impersonating it
This commit also introduces the ability for thread execution to be deferred; this is used to prevent the thread from running while we're impersonating it.
2022-02-20 01:22:58 -05:00
Ariel Abreu
ba2844c82f
Change how kernel threads are started from duct-tape
Kernel threads can now be created and started in two separate actions (and it actually works now).

Also, this means we can remove the stupid hack we in dtape_thread_enter (that didn't even work); we should always clear TH_WAIT when the thread is going to run.
2022-02-20 01:19:57 -05:00
Ariel Abreu
81352063e1
Fix thread death logic
Weak pointers are considered invalid once an instance of a class enters its destructor, so we would never find the dying thread in the process thread vector. Instead, use a map keyed by NSTIDs.

Also, I'm now trying to break my commits up to be more focused on a single area/fix per-commit.
2022-02-20 01:10:47 -05:00
Ariel Abreu
d9bf20afc9
Implement remote mmap/munmap + various fixes
The most important change here is the ability to perform `mmap` and `munmap` in managed Darling processes. This is enabled via the new S2C call system.

Other notable changes:
  * Move the server socket to the prefix root because launchctl clears `var/run` on startup
  * Create an IPC importance structure for each duct-taped task; this is required by `ipc_importance_send`
  * Initialize the MPSC thread deallocation daemon; this is also used by turnstiles
  * Clean up a thread's timers and waits when destroying it
  * Check whether we should actually block in `thread_block_parameter` before doing so; this helps avoid missed wakeups
  * Support creating kernel threads without immediately starting them
  * Update a thread's address when receiving a message from it; this fixes an issue with keeping an outdated thread address when a process performs an exec (since we re-use its main thread)
2022-02-17 19:12:44 -05:00
Ariel Abreu
316ce5db20
Initial signal reprocessing implementation
Largely just ported over from the current LKM code.

Also, set XNU_TARGET_OS_OSX=1 to fix an incorrect default setting that was causing Mach messaging to fail trying to send a task control port (the task self port).

Additionally, with regards to RPC:
  * Send architecture information along with RPC calls
  * Log replies sent on the server side
  * Allow replies expecting FDs to handle the case when no valid FDs were sent back
2022-02-14 02:32:55 -05:00
Ariel Abreu
b4de4d55a9
Implement process kqueue channels + RPC wrapper fixes
In our previous in-kernel kqueue implementation, we followed suit with newer macOS version and dropped support for NOTE_TRACK and NOTE_CHILD. This implementation, however, reintroduces support for those flags to allow for backwards compatiblity with older software that makes use of these features.

Additionally, the RPC wrappers have been fixed to allow either side (both the client and the server) to specify a negative value for an FD parameter (in order to leave it absent and avoid actually sending an FD).
2022-02-12 00:44:45 -05:00
Ariel Abreu
52f1d6a4d1
Implement fork-waiting
This is almost a direct port of what we were previously doing in the LKM, except that we need to use duct-taped semaphores in order to put the calling microthread to sleep (rather than a real semaphore that would put the worker thread to sleep).
2022-02-10 21:15:55 -05:00
Ariel Abreu
7f02040c47
Implement Mach port kqueue channels + a few more things
Mach port kqchannels allow libkqueue to listen in on Mach port events that happen on the server side. The implementation consists of a socket pair used to communicate between the client and the server for that particular channel.

When the server receives an event, it sends a notification message on the socket, which makes the socket readable to the client and thus wakes up epoll. When the client is ready to read the event, it sends a message to the server asking it to read the event and send back the necessary data.

This is done this way (rather than proactively sending the event data over the socket) to closely mimic the actual process that kevent does when reading events. This is even more important when the client specifies MACH_MSG_RECEIVE, which asks the server to try to receive the message directly into a buffer (if there is enough space) when reading the event. In that case, we would *definitely* not want to read the Mach message before the client is actually ready to do so, as it could starve others from reading the Mach message while the client hasn't even acknowledged the event yet--or worse, the client could have died before reading our event and that message is now lost forever.

In other news, many different parts of the code have been updated to function properly now.

For example, all of the direct Mach traps can call thread_syscall_return now. This allows things like semaphores to work.

Timers (with timer_call) are also working now and have been tested in conjunction with timed semaphore waits.

Threads are now able to impersonate other threads for the purposes of running duct-taped code. The primary use case for this is for running code in a kernel microthread but pretending to be user microthread (e.g. kqchan does this). This makes current_map() and friends return the information for the thread we're impersonating (useful for e.g. copyout).
2022-02-10 13:57:21 -05:00
Ariel Abreu
89e7afe22e
Add a ton of RPC calls
This commit adds a bunch of RPC calls, mostly XNU trap calls (calls that go directly to duct-taped XNU Mach trap calls).

The wrapper generator can now automatically generate server-side wrapper/boilerplate code  these XNU trap calls.

These calls have not yet been tested and some (most of the non-IPC calls) probably require functions that haven't been implemented yet.
2022-01-28 00:07:03 -05:00
Ariel Abreu
a5627fddf1
Quite a few changes; check the description
Implement some general RPC calls (corresponding to calls from the LKM): mach_port_deallocate, thread_set_handles, uidgid (a combination of get_uidgid and set_uidgid), and vchroot.

Additionally, we now have some RPC calls that do pass descriptors. Surprisingly, the code I had previously written was *almost* functional (just 2 minor generation and compilation errors). However, that code has now been tested for sending FDs from clients to the server, not vice versa, so that other direction might have issues.

Additionally, a few fixes have been made in the duct-tape code. For example, tasks now handle audit and security tokens like we used to do in the LKM. They also properly initialize and destroy their semaphore queues. Both threads and tasks now properly free their allocated structures.

More importantly, threads and tasks are now properly destroyed. In order to do this, a "kernel" microthread had to be introduced to perform "kernel" work from the managing code (since certain duct-tape destruction operations expect to be running in a microthread context). Additionally, this had to be an additional microthread because the managing code can't use thread calls, since those already expect a microthread context.

The Server can now easily monitor arbitrary descriptors using Monitors. Process monitoring has been converted to this system as well.

Most importantly, however, is that we can now detect `execve`s. libsystem_kernel opens a close-on-exec pipe and sends the read end to the server. When `execve` succeeds, the pipe is simply closed. When `execve` fails, libsystem_kernel writes a single byte to the pipe and then closes it. On the server side, we listen for a hang-up (this indicates the write end of the pipe has been closed). If we are able to read a byte, we know the execve failed; otherwise, if we read nothing (EOF), then we know it succeeded.

Together with changes in libsystem_kernel, this commit allows startup to progress to vchroot doing its thing (vchrooting) and then executing launchd. launchd then proceeds to die when trying to open a kqueue (as this still uses the LKM API).
2022-01-23 22:41:55 -05:00
Ariel Abreu
be93cc46b7
Many additions + stubs; basic kernel MIG RPC working
Most of the newly added functions are just stubs for MIG calls. However, we now properly initialize IPC and related subsystems and we now have copyin/copyout that allows basic `mach_msg_overwrite_trap` usage.

dyld now progresses to `getHostInfo` and successfully retrieves `host_info` with a kernel MIG call (and then proceeds to die on `mach_port_deallocate`, since it hasn't been updated yet).
2022-01-20 00:11:51 -05:00
Ariel Abreu
3bfc652c9b
Initial commit 2022-01-18 00:46:28 -05:00