#include <kern/debug.h>
#include <kern/kern_types.h>
#include <kern/kalloc.h>
+#include <libkern/kernel_mach_header.h>
#include <os/overflow.h>
+#if defined(KERNEL_INTEGRITY_KTRR) || defined(KERNEL_INTEGRITY_CTRR)
+extern addr64_t kvtophys(vm_offset_t va);
+#endif /* defined(KERNEL_INTEGRITY_KTRR) || defined(KERNEL_INTEGRITY_CTRR) */
+
#include <sys/types.h>
-static int DTInitialized;
-static RealDTEntry DTRootNode;
+SECURITY_READ_ONLY_LATE(static int) DTInitialized;
+SECURITY_READ_ONLY_LATE(RealDTEntry) DTRootNode;
+SECURITY_READ_ONLY_LATE(static vm_size_t) DTSize;
+SECURITY_READ_ONLY_LATE(static vm_offset_t) DTEnd;
/*
+ *
* Support Routines
+ *
*/
-static inline DeviceTreeNodeProperty*
-next_prop(DeviceTreeNodeProperty* prop)
+
+static inline void
+assert_in_dt_region(vm_offset_t const start, vm_offset_t const end, void const *p)
+{
+ if ((vm_offset_t)p < start || (vm_offset_t)p > end) {
+ panic("Device tree pointer outside of device tree region: pointer %p, DTEnd %lx\n", p, (unsigned long)DTEnd);
+ }
+}
+#define ASSERT_IN_DT(p) assert_in_dt_region((vm_offset_t)DTRootNode, (vm_offset_t)DTEnd, (p))
+
+static inline void
+assert_prop_in_dt_region(vm_offset_t const start, vm_offset_t const end, DeviceTreeNodeProperty const *prop)
+{
+ vm_offset_t prop_end;
+
+ assert_in_dt_region(start, end, prop);
+ if (os_add3_overflow((vm_offset_t)prop, sizeof(DeviceTreeNodeProperty), prop->length, &prop_end)) {
+ panic("Device tree property overflow: prop %p, length 0x%x\n", prop, prop->length);
+ }
+ assert_in_dt_region(start, end, (void*)prop_end);
+}
+#define ASSERT_PROP_IN_DT(prop) assert_prop_in_dt_region((vm_offset_t)DTRootNode, (vm_offset_t)DTEnd, (prop))
+
+#define ASSERT_HEADER_IN_DT_REGION(start, end, p, size) assert_in_dt_region((start), (end), (uint8_t const *)(p) + (size))
+#define ASSERT_HEADER_IN_DT(p, size) ASSERT_IN_DT((uint8_t const *)(p) + (size))
+
+/*
+ * Since there is no way to know the size of a device tree node
+ * without fully walking it, we employ the following principle to make
+ * sure that the accessed device tree is fully within its memory
+ * region:
+ *
+ * Internally, we check anything we want to access just before we want
+ * to access it (not after creating a pointer).
+ *
+ * Then, before returning a DTEntry to the caller, we check whether
+ * the start address (only!) of the entry is still within the device
+ * tree region.
+ *
+ * Before returning a property value the caller, we check whether the
+ * property is fully within the region.
+ *
+ * "DTEntry"s are opaque to the caller, so only checking their
+ * starting address is enough to satisfy existence within the device
+ * tree region, while for property values we need to make sure that
+ * they are fully within the region.
+ */
+
+static inline DeviceTreeNodeProperty const *
+next_prop_region(vm_offset_t const start, vm_offset_t end, DeviceTreeNodeProperty const *prop)
{
uintptr_t next_addr;
+
+ ASSERT_HEADER_IN_DT_REGION(start, end, prop, sizeof(DeviceTreeNode));
+
if (os_add3_overflow((uintptr_t)prop, prop->length, sizeof(DeviceTreeNodeProperty) + 3, &next_addr)) {
panic("Device tree property overflow: prop %p, length 0x%x\n", prop, prop->length);
}
+
next_addr &= ~(3ULL);
+
return (DeviceTreeNodeProperty*)next_addr;
}
+#define next_prop(prop) next_prop_region((vm_offset_t)DTRootNode, (vm_offset_t)DTEnd, (prop))
static RealDTEntry
skipProperties(RealDTEntry entry)
{
- DeviceTreeNodeProperty *prop;
+ DeviceTreeNodeProperty const *prop;
unsigned int k;
- if (entry == NULL || entry->nProperties == 0) {
+ if (entry == NULL) {
+ return NULL;
+ }
+
+ ASSERT_HEADER_IN_DT(entry, sizeof(DeviceTreeNode));
+
+ if (entry->nProperties == 0) {
return NULL;
} else {
- prop = (DeviceTreeNodeProperty *) (entry + 1);
+ prop = (DeviceTreeNodeProperty const *) (entry + 1);
for (k = 0; k < entry->nProperties; k++) {
prop = next_prop(prop);
}
}
+ ASSERT_IN_DT(prop);
return (RealDTEntry) prop;
}
RealDTEntry entry;
unsigned int k;
+ ASSERT_HEADER_IN_DT(root, sizeof(DeviceTreeNode));
+
entry = skipProperties(root);
if (entry == NULL) {
return NULL;
{
RealDTEntry child;
unsigned long index;
- char * str;
+ char const * str;
unsigned int dummy;
+ ASSERT_HEADER_IN_DT(cur, sizeof(DeviceTreeNode));
+
if (cur->nChildren == 0) {
return NULL;
}
index = 1;
child = GetFirstChild(cur);
while (1) {
- if (DTGetProperty(child, "name", (void **)&str, &dummy) != kSuccess) {
+ if (SecureDTGetProperty(child, "name", (void const **)&str, &dummy) != kSuccess) {
break;
}
if (strcmp(str, buf) == 0) {
return NULL;
}
-
/*
* External Routines
*/
void
-DTInit(void *base)
+SecureDTInit(void const *base, size_t size)
{
- DTRootNode = (RealDTEntry) base;
+ if ((uintptr_t)base + size < (uintptr_t)base) {
+ panic("DeviceTree overflow: %p, size %#zx", base, size);
+ }
+ DTRootNode = base;
+ DTSize = size;
+ DTEnd = (vm_offset_t)DTRootNode + DTSize;
DTInitialized = (DTRootNode != 0);
}
+bool
+SecureDTIsLockedDown(void)
+{
+#if defined(KERNEL_INTEGRITY_KTRR) || defined(KERNEL_INTEGRITY_CTRR)
+ /*
+ * We cannot check if the DT is in the CTRR region early on,
+ * because knowledge of the CTRR region is set up later. But the
+ * DT is used in all kinds of early bootstrapping before that.
+ *
+ * Luckily, we know that the device tree must be in front of the
+ * kernel if set up in EXTRADATA (which means it's covered by
+ * CTRR), and after it otherwise.
+ */
+ addr64_t exec_header_phys = kvtophys((vm_offset_t)&_mh_execute_header);
+
+ if (kvtophys((vm_offset_t)DTRootNode) < exec_header_phys) {
+ assert(kvtophys(DTEnd) < exec_header_phys);
+ return true;
+ }
+
+#endif
+ return false;
+}
+
int
-DTEntryIsEqual(const DTEntry ref1, const DTEntry ref2)
+SecureDTEntryIsEqual(const DTEntry ref1, const DTEntry ref2)
{
/* equality of pointers */
return ref1 == ref2;
}
-static char *startingP; // needed for find_entry
+static char const *startingP; // needed for find_entry
int find_entry(const char *propName, const char *propValue, DTEntry *entryH);
int
-DTFindEntry(const char *propName, const char *propValue, DTEntry *entryH)
+SecureDTFindEntry(const char *propName, const char *propValue, DTEntry *entryH)
{
if (!DTInitialized) {
return kError;
}
- startingP = (char *)DTRootNode;
+ startingP = (char const *)DTRootNode;
return find_entry(propName, propValue, entryH);
}
int
find_entry(const char *propName, const char *propValue, DTEntry *entryH)
{
- DeviceTreeNode *nodeP = (DeviceTreeNode *) (void *) startingP;
+ DeviceTreeNode const *nodeP = (DeviceTreeNode const *) (void const *) startingP;
unsigned int k;
+ ASSERT_HEADER_IN_DT(nodeP, sizeof(DeviceTreeNode));
+
if (nodeP->nProperties == 0) {
return kError; // End of the list of nodes
}
- startingP = (char *) (nodeP + 1);
+ startingP = (char const *) (nodeP + 1);
// Search current entry
for (k = 0; k < nodeP->nProperties; ++k) {
- DeviceTreeNodeProperty *propP = (DeviceTreeNodeProperty *) (void *) startingP;
+ DeviceTreeNodeProperty const *propP = (DeviceTreeNodeProperty const *) (void const *) startingP;
+ ASSERT_PROP_IN_DT(propP);
startingP += sizeof(*propP) + ((propP->length + 3) & -4);
if (strcmp(propP->name, propName) == 0) {
- if (propValue == NULL || strcmp((char *)(propP + 1), propValue) == 0) {
+ if (propValue == NULL || strcmp((char const *)(propP + 1), propValue) == 0) {
*entryH = (DTEntry)nodeP;
+ ASSERT_HEADER_IN_DT(*entryH, sizeof(DeviceTreeNode));
return kSuccess;
}
}
}
int
-DTLookupEntry(const DTEntry searchPoint, const char *pathName, DTEntry *foundEntry)
+SecureDTLookupEntry(const DTEntry searchPoint, const char *pathName, DTEntry *foundEntry)
{
DTEntryNameBuf buf;
RealDTEntry cur;
} else {
cur = searchPoint;
}
+ ASSERT_IN_DT(cur);
cp = pathName;
if (*cp == kDTPathNameSeparator) {
cp++;
}
int
-DTInitEntryIterator(const DTEntry startEntry, DTEntryIterator iter)
+SecureDTInitEntryIterator(const DTEntry startEntry, DTEntryIterator iter)
{
if (!DTInitialized) {
return kError;
}
int
-DTEnterEntry(DTEntryIterator iter, DTEntry childEntry)
+SecureDTEnterEntry(DTEntryIterator iter, DTEntry childEntry)
{
DTSavedScopePtr newScope;
}
int
-DTExitEntry(DTEntryIterator iter, DTEntry *currentPosition)
+SecureDTExitEntry(DTEntryIterator iter, DTEntry *currentPosition)
{
DTSavedScopePtr newScope;
}
int
-DTIterateEntries(DTEntryIterator iter, DTEntry *nextEntry)
+SecureDTIterateEntries(DTEntryIterator iter, DTEntry *nextEntry)
{
if (iter->currentIndex >= iter->currentScope->nChildren) {
*nextEntry = NULL;
} else {
iter->currentEntry = GetNextChild(iter->currentEntry);
}
+ ASSERT_IN_DT(iter->currentEntry);
*nextEntry = iter->currentEntry;
return kSuccess;
}
}
int
-DTRestartEntryIteration(DTEntryIterator iter)
+SecureDTRestartEntryIteration(DTEntryIterator iter)
{
#if 0
// This commented out code allows a second argument (outer)
return kSuccess;
}
-int
-DTGetProperty(const DTEntry entry, const char *propertyName, void **propertyValue, unsigned int *propertySize)
+static int
+SecureDTGetPropertyInternal(const DTEntry entry, const char *propertyName, void const **propertyValue, unsigned int *propertySize, vm_offset_t const region_start, vm_size_t region_size)
{
- DeviceTreeNodeProperty *prop;
+ DeviceTreeNodeProperty const *prop;
unsigned int k;
- if (entry == NULL || entry->nProperties == 0) {
+ if (entry == NULL) {
+ return kError;
+ }
+
+ ASSERT_HEADER_IN_DT_REGION(region_start, region_start + region_size, entry, sizeof(DeviceTreeNode));
+
+ if (entry->nProperties == 0) {
return kError;
} else {
- prop = (DeviceTreeNodeProperty *) (entry + 1);
+ prop = (DeviceTreeNodeProperty const *) (entry + 1);
for (k = 0; k < entry->nProperties; k++) {
+ assert_prop_in_dt_region(region_start, region_start + region_size, prop);
if (strcmp(prop->name, propertyName) == 0) {
- *propertyValue = (void *) (((uintptr_t)prop)
+ *propertyValue = (void const *) (((uintptr_t)prop)
+ sizeof(DeviceTreeNodeProperty));
*propertySize = prop->length;
return kSuccess;
}
- prop = next_prop(prop);
+ prop = next_prop_region(region_start, region_start + region_size, prop);
}
}
return kError;
}
int
-DTInitPropertyIterator(const DTEntry entry, DTPropertyIterator iter)
+SecureDTGetProperty(const DTEntry entry, const char *propertyName, void const **propertyValue, unsigned int *propertySize)
+{
+ return SecureDTGetPropertyInternal(entry, propertyName, propertyValue, propertySize,
+ (vm_offset_t)DTRootNode, (vm_size_t)((uintptr_t)DTEnd - (uintptr_t)DTRootNode));
+}
+
+int
+SecureDTGetPropertyRegion(const DTEntry entry, const char *propertyName, void const **propertyValue, unsigned int *propertySize, vm_offset_t const region_start, vm_size_t region_size)
+{
+ return SecureDTGetPropertyInternal(entry, propertyName, propertyValue, propertySize,
+ region_start, region_size);
+}
+
+
+int
+SecureDTInitPropertyIterator(const DTEntry entry, DTPropertyIterator iter)
{
iter->entry = entry;
iter->currentProperty = NULL;
}
int
-DTIterateProperties(DTPropertyIterator iter, char **foundProperty)
+SecureDTIterateProperties(DTPropertyIterator iter, char const **foundProperty)
{
if (iter->currentIndex >= iter->entry->nProperties) {
*foundProperty = NULL;
} else {
iter->currentIndex++;
if (iter->currentIndex == 1) {
- iter->currentProperty = (DeviceTreeNodeProperty *) (iter->entry + 1);
+ iter->currentProperty = (DeviceTreeNodeProperty const *) (iter->entry + 1);
} else {
iter->currentProperty = next_prop(iter->currentProperty);
}
+ ASSERT_PROP_IN_DT(iter->currentProperty);
*foundProperty = iter->currentProperty->name;
return kSuccess;
}
}
int
-DTRestartPropertyIteration(DTPropertyIterator iter)
+SecureDTRestartPropertyIteration(DTPropertyIterator iter)
{
iter->currentProperty = NULL;
iter->currentIndex = 0;