mirror of
https://github.com/RPCS3/llvm-mirror.git
synced 2024-11-22 10:42:39 +01:00
[lld-macho] add code signature for native arm64 macOS
Differential Revision: https://reviews.llvm.org/D96164
This commit is contained in:
parent
ee9cc55e48
commit
55af82cf1e
@ -2007,6 +2007,203 @@ union alignas(4) macho_load_command {
|
||||
};
|
||||
LLVM_PACKED_END
|
||||
|
||||
/* code signing attributes of a process */
|
||||
|
||||
enum CodeSignAttrs {
|
||||
CS_VALID = 0x00000001, /* dynamically valid */
|
||||
CS_ADHOC = 0x00000002, /* ad hoc signed */
|
||||
CS_GET_TASK_ALLOW = 0x00000004, /* has get-task-allow entitlement */
|
||||
CS_INSTALLER = 0x00000008, /* has installer entitlement */
|
||||
|
||||
CS_FORCED_LV =
|
||||
0x00000010, /* Library Validation required by Hardened System Policy */
|
||||
CS_INVALID_ALLOWED = 0x00000020, /* (macOS Only) Page invalidation allowed by
|
||||
task port policy */
|
||||
|
||||
CS_HARD = 0x00000100, /* don't load invalid pages */
|
||||
CS_KILL = 0x00000200, /* kill process if it becomes invalid */
|
||||
CS_CHECK_EXPIRATION = 0x00000400, /* force expiration checking */
|
||||
CS_RESTRICT = 0x00000800, /* tell dyld to treat restricted */
|
||||
|
||||
CS_ENFORCEMENT = 0x00001000, /* require enforcement */
|
||||
CS_REQUIRE_LV = 0x00002000, /* require library validation */
|
||||
CS_ENTITLEMENTS_VALIDATED =
|
||||
0x00004000, /* code signature permits restricted entitlements */
|
||||
CS_NVRAM_UNRESTRICTED =
|
||||
0x00008000, /* has com.apple.rootless.restricted-nvram-variables.heritable
|
||||
entitlement */
|
||||
|
||||
CS_RUNTIME = 0x00010000, /* Apply hardened runtime policies */
|
||||
CS_LINKER_SIGNED = 0x00020000, /* Automatically signed by the linker */
|
||||
|
||||
CS_ALLOWED_MACHO =
|
||||
(CS_ADHOC | CS_HARD | CS_KILL | CS_CHECK_EXPIRATION | CS_RESTRICT |
|
||||
CS_ENFORCEMENT | CS_REQUIRE_LV | CS_RUNTIME | CS_LINKER_SIGNED),
|
||||
|
||||
CS_EXEC_SET_HARD = 0x00100000, /* set CS_HARD on any exec'ed process */
|
||||
CS_EXEC_SET_KILL = 0x00200000, /* set CS_KILL on any exec'ed process */
|
||||
CS_EXEC_SET_ENFORCEMENT =
|
||||
0x00400000, /* set CS_ENFORCEMENT on any exec'ed process */
|
||||
CS_EXEC_INHERIT_SIP =
|
||||
0x00800000, /* set CS_INSTALLER on any exec'ed process */
|
||||
|
||||
CS_KILLED = 0x01000000, /* was killed by kernel for invalidity */
|
||||
CS_DYLD_PLATFORM =
|
||||
0x02000000, /* dyld used to load this is a platform binary */
|
||||
CS_PLATFORM_BINARY = 0x04000000, /* this is a platform binary */
|
||||
CS_PLATFORM_PATH =
|
||||
0x08000000, /* platform binary by the fact of path (osx only) */
|
||||
|
||||
CS_DEBUGGED = 0x10000000, /* process is currently or has previously been
|
||||
debugged and allowed to run with invalid pages */
|
||||
CS_SIGNED = 0x20000000, /* process has a signature (may have gone invalid) */
|
||||
CS_DEV_CODE =
|
||||
0x40000000, /* code is dev signed, cannot be loaded into prod signed code
|
||||
(will go away with rdar://problem/28322552) */
|
||||
CS_DATAVAULT_CONTROLLER =
|
||||
0x80000000, /* has Data Vault controller entitlement */
|
||||
|
||||
CS_ENTITLEMENT_FLAGS = (CS_GET_TASK_ALLOW | CS_INSTALLER |
|
||||
CS_DATAVAULT_CONTROLLER | CS_NVRAM_UNRESTRICTED),
|
||||
};
|
||||
|
||||
/* executable segment flags */
|
||||
|
||||
enum CodeSignExecSegFlags {
|
||||
|
||||
CS_EXECSEG_MAIN_BINARY = 0x1, /* executable segment denotes main binary */
|
||||
CS_EXECSEG_ALLOW_UNSIGNED = 0x10, /* allow unsigned pages (for debugging) */
|
||||
CS_EXECSEG_DEBUGGER = 0x20, /* main binary is debugger */
|
||||
CS_EXECSEG_JIT = 0x40, /* JIT enabled */
|
||||
CS_EXECSEG_SKIP_LV = 0x80, /* OBSOLETE: skip library validation */
|
||||
CS_EXECSEG_CAN_LOAD_CDHASH = 0x100, /* can bless cdhash for execution */
|
||||
CS_EXECSEG_CAN_EXEC_CDHASH = 0x200, /* can execute blessed cdhash */
|
||||
|
||||
};
|
||||
|
||||
/* Magic numbers used by Code Signing */
|
||||
|
||||
enum CodeSignMagic {
|
||||
CSMAGIC_REQUIREMENT = 0xfade0c00, /* single Requirement blob */
|
||||
CSMAGIC_REQUIREMENTS =
|
||||
0xfade0c01, /* Requirements vector (internal requirements) */
|
||||
CSMAGIC_CODEDIRECTORY = 0xfade0c02, /* CodeDirectory blob */
|
||||
CSMAGIC_EMBEDDED_SIGNATURE = 0xfade0cc0, /* embedded form of signature data */
|
||||
CSMAGIC_EMBEDDED_SIGNATURE_OLD = 0xfade0b02, /* XXX */
|
||||
CSMAGIC_EMBEDDED_ENTITLEMENTS = 0xfade7171, /* embedded entitlements */
|
||||
CSMAGIC_DETACHED_SIGNATURE =
|
||||
0xfade0cc1, /* multi-arch collection of embedded signatures */
|
||||
CSMAGIC_BLOBWRAPPER = 0xfade0b01, /* CMS Signature, among other things */
|
||||
|
||||
CS_SUPPORTSSCATTER = 0x20100,
|
||||
CS_SUPPORTSTEAMID = 0x20200,
|
||||
CS_SUPPORTSCODELIMIT64 = 0x20300,
|
||||
CS_SUPPORTSEXECSEG = 0x20400,
|
||||
CS_SUPPORTSRUNTIME = 0x20500,
|
||||
CS_SUPPORTSLINKAGE = 0x20600,
|
||||
|
||||
CSSLOT_CODEDIRECTORY = 0, /* slot index for CodeDirectory */
|
||||
CSSLOT_INFOSLOT = 1,
|
||||
CSSLOT_REQUIREMENTS = 2,
|
||||
CSSLOT_RESOURCEDIR = 3,
|
||||
CSSLOT_APPLICATION = 4,
|
||||
CSSLOT_ENTITLEMENTS = 5,
|
||||
|
||||
CSSLOT_ALTERNATE_CODEDIRECTORIES =
|
||||
0x1000, /* first alternate CodeDirectory, if any */
|
||||
CSSLOT_ALTERNATE_CODEDIRECTORY_MAX = 5, /* max number of alternate CD slots */
|
||||
CSSLOT_ALTERNATE_CODEDIRECTORY_LIMIT =
|
||||
CSSLOT_ALTERNATE_CODEDIRECTORIES +
|
||||
CSSLOT_ALTERNATE_CODEDIRECTORY_MAX, /* one past the last */
|
||||
|
||||
CSSLOT_SIGNATURESLOT = 0x10000, /* CMS Signature */
|
||||
CSSLOT_IDENTIFICATIONSLOT = 0x10001,
|
||||
CSSLOT_TICKETSLOT = 0x10002,
|
||||
|
||||
CSTYPE_INDEX_REQUIREMENTS = 0x00000002, /* compat with amfi */
|
||||
CSTYPE_INDEX_ENTITLEMENTS = 0x00000005, /* compat with amfi */
|
||||
|
||||
CS_HASHTYPE_SHA1 = 1,
|
||||
CS_HASHTYPE_SHA256 = 2,
|
||||
CS_HASHTYPE_SHA256_TRUNCATED = 3,
|
||||
CS_HASHTYPE_SHA384 = 4,
|
||||
|
||||
CS_SHA1_LEN = 20,
|
||||
CS_SHA256_LEN = 32,
|
||||
CS_SHA256_TRUNCATED_LEN = 20,
|
||||
|
||||
CS_CDHASH_LEN = 20, /* always - larger hashes are truncated */
|
||||
CS_HASH_MAX_SIZE = 48, /* max size of the hash we'll support */
|
||||
|
||||
/*
|
||||
* Currently only to support Legacy VPN plugins, and Mac App Store
|
||||
* but intended to replace all the various platform code, dev code etc. bits.
|
||||
*/
|
||||
CS_SIGNER_TYPE_UNKNOWN = 0,
|
||||
CS_SIGNER_TYPE_LEGACYVPN = 5,
|
||||
CS_SIGNER_TYPE_MAC_APP_STORE = 6,
|
||||
|
||||
CS_SUPPL_SIGNER_TYPE_UNKNOWN = 0,
|
||||
CS_SUPPL_SIGNER_TYPE_TRUSTCACHE = 7,
|
||||
CS_SUPPL_SIGNER_TYPE_LOCAL = 8,
|
||||
};
|
||||
|
||||
struct CS_CodeDirectory {
|
||||
uint32_t magic; /* magic number (CSMAGIC_CODEDIRECTORY) */
|
||||
uint32_t length; /* total length of CodeDirectory blob */
|
||||
uint32_t version; /* compatibility version */
|
||||
uint32_t flags; /* setup and mode flags */
|
||||
uint32_t hashOffset; /* offset of hash slot element at index zero */
|
||||
uint32_t identOffset; /* offset of identifier string */
|
||||
uint32_t nSpecialSlots; /* number of special hash slots */
|
||||
uint32_t nCodeSlots; /* number of ordinary (code) hash slots */
|
||||
uint32_t codeLimit; /* limit to main image signature range */
|
||||
uint8_t hashSize; /* size of each hash in bytes */
|
||||
uint8_t hashType; /* type of hash (cdHashType* constants) */
|
||||
uint8_t platform; /* platform identifier; zero if not platform binary */
|
||||
uint8_t pageSize; /* log2(page size in bytes); 0 => infinite */
|
||||
uint32_t spare2; /* unused (must be zero) */
|
||||
|
||||
/* Version 0x20100 */
|
||||
uint32_t scatterOffset; /* offset of optional scatter vector */
|
||||
|
||||
/* Version 0x20200 */
|
||||
uint32_t teamOffset; /* offset of optional team identifier */
|
||||
|
||||
/* Version 0x20300 */
|
||||
uint32_t spare3; /* unused (must be zero) */
|
||||
uint64_t codeLimit64; /* limit to main image signature range, 64 bits */
|
||||
|
||||
/* Version 0x20400 */
|
||||
uint64_t execSegBase; /* offset of executable segment */
|
||||
uint64_t execSegLimit; /* limit of executable segment */
|
||||
uint64_t execSegFlags; /* executable segment flags */
|
||||
};
|
||||
|
||||
static_assert(sizeof(CS_CodeDirectory) == 88, "");
|
||||
|
||||
struct CS_BlobIndex {
|
||||
uint32_t type; /* type of entry */
|
||||
uint32_t offset; /* offset of entry */
|
||||
};
|
||||
|
||||
struct CS_SuperBlob {
|
||||
uint32_t magic; /* magic number */
|
||||
uint32_t length; /* total length of SuperBlob */
|
||||
uint32_t count; /* number of index entries following */
|
||||
/* followed by Blobs in no particular order as indicated by index offsets */
|
||||
};
|
||||
|
||||
enum SecCSDigestAlgorithm {
|
||||
kSecCodeSignatureNoHash = 0, /* null value */
|
||||
kSecCodeSignatureHashSHA1 = 1, /* SHA-1 */
|
||||
kSecCodeSignatureHashSHA256 = 2, /* SHA-256 */
|
||||
kSecCodeSignatureHashSHA256Truncated =
|
||||
3, /* SHA-256 truncated to first 20 bytes */
|
||||
kSecCodeSignatureHashSHA384 = 4, /* SHA-384 */
|
||||
kSecCodeSignatureHashSHA512 = 5, /* SHA-512 */
|
||||
};
|
||||
|
||||
} // end namespace MachO
|
||||
} // end namespace llvm
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user