1*0f4c859eSApple OSS Distributions /*
2*0f4c859eSApple OSS Distributions * Copyright (c) 2016-2021 Apple Inc. All rights reserved.
3*0f4c859eSApple OSS Distributions *
4*0f4c859eSApple OSS Distributions * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5*0f4c859eSApple OSS Distributions *
6*0f4c859eSApple OSS Distributions * This file contains Original Code and/or Modifications of Original Code
7*0f4c859eSApple OSS Distributions * as defined in and that are subject to the Apple Public Source License
8*0f4c859eSApple OSS Distributions * Version 2.0 (the 'License'). You may not use this file except in
9*0f4c859eSApple OSS Distributions * compliance with the License. The rights granted to you under the License
10*0f4c859eSApple OSS Distributions * may not be used to create, or enable the creation or redistribution of,
11*0f4c859eSApple OSS Distributions * unlawful or unlicensed copies of an Apple operating system, or to
12*0f4c859eSApple OSS Distributions * circumvent, violate, or enable the circumvention or violation of, any
13*0f4c859eSApple OSS Distributions * terms of an Apple operating system software license agreement.
14*0f4c859eSApple OSS Distributions *
15*0f4c859eSApple OSS Distributions * Please obtain a copy of the License at
16*0f4c859eSApple OSS Distributions * http://www.opensource.apple.com/apsl/ and read it before using this file.
17*0f4c859eSApple OSS Distributions *
18*0f4c859eSApple OSS Distributions * The Original Code and all software distributed under the License are
19*0f4c859eSApple OSS Distributions * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20*0f4c859eSApple OSS Distributions * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21*0f4c859eSApple OSS Distributions * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22*0f4c859eSApple OSS Distributions * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23*0f4c859eSApple OSS Distributions * Please see the License for the specific language governing rights and
24*0f4c859eSApple OSS Distributions * limitations under the License.
25*0f4c859eSApple OSS Distributions *
26*0f4c859eSApple OSS Distributions * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27*0f4c859eSApple OSS Distributions */
28*0f4c859eSApple OSS Distributions
29*0f4c859eSApple OSS Distributions #include <stdint.h>
30*0f4c859eSApple OSS Distributions #include <string.h>
31*0f4c859eSApple OSS Distributions #include <vm/vm_kern.h>
32*0f4c859eSApple OSS Distributions #include <vm/vm_map.h>
33*0f4c859eSApple OSS Distributions #include <kern/assert.h>
34*0f4c859eSApple OSS Distributions #include <machine/machine_routines.h>
35*0f4c859eSApple OSS Distributions #include <kern/thread.h>
36*0f4c859eSApple OSS Distributions #include <kern/simple_lock.h>
37*0f4c859eSApple OSS Distributions #include <kern/debug.h>
38*0f4c859eSApple OSS Distributions #include <mach/mach_vm.h>
39*0f4c859eSApple OSS Distributions #include <mach/vm_param.h>
40*0f4c859eSApple OSS Distributions #include <libkern/libkern.h>
41*0f4c859eSApple OSS Distributions #include <sys/queue.h>
42*0f4c859eSApple OSS Distributions #include <vm/pmap.h>
43*0f4c859eSApple OSS Distributions #include "kasan.h"
44*0f4c859eSApple OSS Distributions #include "kasan_internal.h"
45*0f4c859eSApple OSS Distributions #include "memintrinsics.h"
46*0f4c859eSApple OSS Distributions
47*0f4c859eSApple OSS Distributions #include <pexpert/device_tree.h>
48*0f4c859eSApple OSS Distributions #include <pexpert/arm64/boot.h>
49*0f4c859eSApple OSS Distributions #include <arm64/tlb.h>
50*0f4c859eSApple OSS Distributions
51*0f4c859eSApple OSS Distributions #include <libkern/kernel_mach_header.h>
52*0f4c859eSApple OSS Distributions
53*0f4c859eSApple OSS Distributions #if KASAN_CLASSIC
54*0f4c859eSApple OSS Distributions #include "kasan-classic-arm64.h"
55*0f4c859eSApple OSS Distributions #elif KASAN_TBI
56*0f4c859eSApple OSS Distributions #include "kasan-tbi-arm64.h"
57*0f4c859eSApple OSS Distributions _Static_assert((VM_MEMTAG_PTR_SIZE > VM_KERNEL_POINTER_SIGNIFICANT_BITS), "Kernel pointers leave no room for tagging");
58*0f4c859eSApple OSS Distributions #else /* KASAN_CLASSIC || KASAN_TBI */
59*0f4c859eSApple OSS Distributions #error "No model defined for the shadow table"
60*0f4c859eSApple OSS Distributions #endif /* KASAN_CLASSIC || KASAN_TBI */
61*0f4c859eSApple OSS Distributions
62*0f4c859eSApple OSS Distributions #if KASAN_LIGHT
63*0f4c859eSApple OSS Distributions extern bool kasan_zone_maps_owned(vm_address_t, vm_size_t);
64*0f4c859eSApple OSS Distributions #endif /* KASAN_LIGHT */
65*0f4c859eSApple OSS Distributions
66*0f4c859eSApple OSS Distributions extern thread_t kasan_lock_holder;
67*0f4c859eSApple OSS Distributions
68*0f4c859eSApple OSS Distributions extern uint64_t *cpu_tte;
69*0f4c859eSApple OSS Distributions extern unsigned long gVirtBase, gPhysBase;
70*0f4c859eSApple OSS Distributions
71*0f4c859eSApple OSS Distributions typedef uint64_t pmap_paddr_t __kernel_ptr_semantics;
72*0f4c859eSApple OSS Distributions extern vm_map_address_t phystokv(pmap_paddr_t pa);
73*0f4c859eSApple OSS Distributions
74*0f4c859eSApple OSS Distributions vm_offset_t physmap_vbase;
75*0f4c859eSApple OSS Distributions vm_offset_t physmap_vtop;
76*0f4c859eSApple OSS Distributions
77*0f4c859eSApple OSS Distributions vm_offset_t shadow_pbase;
78*0f4c859eSApple OSS Distributions vm_offset_t shadow_ptop;
79*0f4c859eSApple OSS Distributions #if HIBERNATION
80*0f4c859eSApple OSS Distributions // if we're building a kernel with hibernation support, hibernate_write_image depends on this symbol
81*0f4c859eSApple OSS Distributions vm_offset_t shadow_pnext;
82*0f4c859eSApple OSS Distributions #else
83*0f4c859eSApple OSS Distributions static vm_offset_t shadow_pnext;
84*0f4c859eSApple OSS Distributions #endif
85*0f4c859eSApple OSS Distributions
86*0f4c859eSApple OSS Distributions static vm_offset_t unmutable_valid_access_page;
87*0f4c859eSApple OSS Distributions static vm_offset_t bootstrap_pgtable_phys;
88*0f4c859eSApple OSS Distributions
89*0f4c859eSApple OSS Distributions extern vm_offset_t intstack, intstack_top;
90*0f4c859eSApple OSS Distributions extern vm_offset_t excepstack, excepstack_top;
91*0f4c859eSApple OSS Distributions
92*0f4c859eSApple OSS Distributions static lck_grp_t kasan_vm_lock_grp;
93*0f4c859eSApple OSS Distributions static lck_ticket_t kasan_vm_lock;
94*0f4c859eSApple OSS Distributions
95*0f4c859eSApple OSS Distributions void kasan_bootstrap(boot_args *, vm_offset_t pgtable);
96*0f4c859eSApple OSS Distributions
97*0f4c859eSApple OSS Distributions _Static_assert(KASAN_OFFSET == KASAN_OFFSET_ARM64, "KASan inconsistent shadow offset");
98*0f4c859eSApple OSS Distributions _Static_assert(VM_MAX_KERNEL_ADDRESS < KASAN_SHADOW_MIN, "KASan shadow overlaps with kernel VM");
99*0f4c859eSApple OSS Distributions _Static_assert((VM_MIN_KERNEL_ADDRESS >> KASAN_SCALE) + KASAN_OFFSET_ARM64 >= KASAN_SHADOW_MIN, "KASan shadow does not cover kernel VM");
100*0f4c859eSApple OSS Distributions _Static_assert((VM_MAX_KERNEL_ADDRESS >> KASAN_SCALE) + KASAN_OFFSET_ARM64 < KASAN_SHADOW_MAX, "KASan shadow does not cover kernel VM");
101*0f4c859eSApple OSS Distributions
102*0f4c859eSApple OSS Distributions #define KASAN_ARM64_MAP_STATIC_VALID_PAGE 0x1
103*0f4c859eSApple OSS Distributions #define KASAN_ARM64_PREALLOCATE_L1L2 0x2
104*0f4c859eSApple OSS Distributions #define KASAN_ARM64_NO_PHYSMAP 0x4
105*0f4c859eSApple OSS Distributions
106*0f4c859eSApple OSS Distributions #define KASAN_ARM64_MAP (0)
107*0f4c859eSApple OSS Distributions #define KASAN_ARM64_STATIC_VALID_MAP (KASAN_ARM64_MAP | KASAN_ARM64_MAP_STATIC_VALID_PAGE)
108*0f4c859eSApple OSS Distributions #define KASAN_ARM64_PREALLOCATE_TRANSLATION (KASAN_ARM64_PREALLOCATE_L1L2)
109*0f4c859eSApple OSS Distributions #define KASAN_ARM64_MAP_EARLY (KASAN_ARM64_MAP | KASAN_ARM64_NO_PHYSMAP)
110*0f4c859eSApple OSS Distributions #define KASAN_ARM64_MAP_STATIC_EARLY (KASAN_ARM64_STATIC_VALID_MAP | KASAN_ARM64_NO_PHYSMAP)
111*0f4c859eSApple OSS Distributions
112*0f4c859eSApple OSS Distributions
113*0f4c859eSApple OSS Distributions /*
114*0f4c859eSApple OSS Distributions * KASAN runs both early on, when the 1:1 mapping hasn't been established yet,
115*0f4c859eSApple OSS Distributions * and later when memory management is fully set up. This internal version of
116*0f4c859eSApple OSS Distributions * phystokv switches between accessing physical memory directly and using the
117*0f4c859eSApple OSS Distributions * physmap.
118*0f4c859eSApple OSS Distributions */
119*0f4c859eSApple OSS Distributions static vm_map_address_t
kasan_arm64_phystokv(uintptr_t pa,bool early)120*0f4c859eSApple OSS Distributions kasan_arm64_phystokv(uintptr_t pa, bool early)
121*0f4c859eSApple OSS Distributions {
122*0f4c859eSApple OSS Distributions return early ? (pa) : phystokv(pa);
123*0f4c859eSApple OSS Distributions }
124*0f4c859eSApple OSS Distributions
125*0f4c859eSApple OSS Distributions /*
126*0f4c859eSApple OSS Distributions * Physical pages used to back up the shadow table are stolen early on at
127*0f4c859eSApple OSS Distributions * boot and later managed in a fairly simple, linear, fashion.
128*0f4c859eSApple OSS Distributions */
129*0f4c859eSApple OSS Distributions static uintptr_t
kasan_arm64_alloc_page(void)130*0f4c859eSApple OSS Distributions kasan_arm64_alloc_page(void)
131*0f4c859eSApple OSS Distributions {
132*0f4c859eSApple OSS Distributions if (shadow_pnext + ARM_PGBYTES >= shadow_ptop) {
133*0f4c859eSApple OSS Distributions panic("KASAN: OOM");
134*0f4c859eSApple OSS Distributions }
135*0f4c859eSApple OSS Distributions
136*0f4c859eSApple OSS Distributions uintptr_t mem = shadow_pnext;
137*0f4c859eSApple OSS Distributions shadow_pnext += ARM_PGBYTES;
138*0f4c859eSApple OSS Distributions shadow_pages_used++;
139*0f4c859eSApple OSS Distributions
140*0f4c859eSApple OSS Distributions return mem;
141*0f4c859eSApple OSS Distributions }
142*0f4c859eSApple OSS Distributions
143*0f4c859eSApple OSS Distributions static uintptr_t
kasan_arm64_alloc_zero_page(bool early)144*0f4c859eSApple OSS Distributions kasan_arm64_alloc_zero_page(bool early)
145*0f4c859eSApple OSS Distributions {
146*0f4c859eSApple OSS Distributions uintptr_t mem = kasan_arm64_alloc_page();
147*0f4c859eSApple OSS Distributions __nosan_bzero((void *)kasan_arm64_phystokv(mem, early), ARM_PGBYTES);
148*0f4c859eSApple OSS Distributions return mem;
149*0f4c859eSApple OSS Distributions }
150*0f4c859eSApple OSS Distributions
151*0f4c859eSApple OSS Distributions static uintptr_t
kasan_arm64_alloc_valid_page(bool early)152*0f4c859eSApple OSS Distributions kasan_arm64_alloc_valid_page(bool early)
153*0f4c859eSApple OSS Distributions {
154*0f4c859eSApple OSS Distributions uintptr_t mem = kasan_arm64_alloc_page();
155*0f4c859eSApple OSS Distributions kasan_impl_fill_valid_range(kasan_arm64_phystokv(mem, early), ARM_PGBYTES);
156*0f4c859eSApple OSS Distributions return mem;
157*0f4c859eSApple OSS Distributions }
158*0f4c859eSApple OSS Distributions
159*0f4c859eSApple OSS Distributions static void
kasan_arm64_align_to_page(vm_offset_t * addrp,vm_offset_t * sizep)160*0f4c859eSApple OSS Distributions kasan_arm64_align_to_page(vm_offset_t *addrp, vm_offset_t *sizep)
161*0f4c859eSApple OSS Distributions {
162*0f4c859eSApple OSS Distributions vm_offset_t addr_aligned = vm_map_trunc_page(*addrp, ARM_PGMASK);
163*0f4c859eSApple OSS Distributions *sizep = vm_map_round_page(*sizep + (*addrp - addr_aligned), ARM_PGMASK);
164*0f4c859eSApple OSS Distributions *addrp = addr_aligned;
165*0f4c859eSApple OSS Distributions }
166*0f4c859eSApple OSS Distributions
167*0f4c859eSApple OSS Distributions static uint64_t *
kasan_arm64_lookup_l1(uint64_t * base,vm_offset_t address)168*0f4c859eSApple OSS Distributions kasan_arm64_lookup_l1(uint64_t *base, vm_offset_t address)
169*0f4c859eSApple OSS Distributions {
170*0f4c859eSApple OSS Distributions return base + ((address & ARM_TT_L1_INDEX_MASK) >> ARM_TT_L1_SHIFT);
171*0f4c859eSApple OSS Distributions }
172*0f4c859eSApple OSS Distributions
173*0f4c859eSApple OSS Distributions static uint64_t *
kasan_arm64_lookup_l2(uint64_t * base,vm_offset_t address)174*0f4c859eSApple OSS Distributions kasan_arm64_lookup_l2(uint64_t *base, vm_offset_t address)
175*0f4c859eSApple OSS Distributions {
176*0f4c859eSApple OSS Distributions return base + ((address & ARM_TT_L2_INDEX_MASK) >> ARM_TT_L2_SHIFT);
177*0f4c859eSApple OSS Distributions }
178*0f4c859eSApple OSS Distributions
179*0f4c859eSApple OSS Distributions static uint64_t *
kasan_arm64_lookup_l3(uint64_t * base,vm_offset_t address)180*0f4c859eSApple OSS Distributions kasan_arm64_lookup_l3(uint64_t *base, vm_offset_t address)
181*0f4c859eSApple OSS Distributions {
182*0f4c859eSApple OSS Distributions return base + ((address & ARM_TT_L3_INDEX_MASK) >> ARM_TT_L3_SHIFT);
183*0f4c859eSApple OSS Distributions }
184*0f4c859eSApple OSS Distributions
185*0f4c859eSApple OSS Distributions /*
186*0f4c859eSApple OSS Distributions * kasan_arm_pte_map() is the hearth of the arch-specific handling of the shadow
187*0f4c859eSApple OSS Distributions * table. It walks the existing page tables that map shadow ranges and
188*0f4c859eSApple OSS Distributions * allocates/creates valid entries as required. Options are:
189*0f4c859eSApple OSS Distributions * - static_valid: instead of creating a new backing shadow page, point to
190*0f4c859eSApple OSS Distributions * the 'full valid access' one created early at boot.
191*0f4c859eSApple OSS Distributions * - preallocate_translation_only: do not add the final shadow table entry, but
192*0f4c859eSApple OSS Distributions * only add the L1/L2 pages for a valid translation.
193*0f4c859eSApple OSS Distributions * - early: xnu is running before the VM is fully setup, so handle physical
194*0f4c859eSApple OSS Distributions * address directly instead of going through the physmap.
195*0f4c859eSApple OSS Distributions */
196*0f4c859eSApple OSS Distributions static void
kasan_arm64_pte_map(vm_offset_t shadow_base,uint64_t * base,uint8_t options)197*0f4c859eSApple OSS Distributions kasan_arm64_pte_map(vm_offset_t shadow_base, uint64_t *base, uint8_t options)
198*0f4c859eSApple OSS Distributions {
199*0f4c859eSApple OSS Distributions bool early = options & KASAN_ARM64_NO_PHYSMAP;
200*0f4c859eSApple OSS Distributions uint64_t *pte;
201*0f4c859eSApple OSS Distributions
202*0f4c859eSApple OSS Distributions /* lookup L1 entry */
203*0f4c859eSApple OSS Distributions pte = kasan_arm64_lookup_l1(base, shadow_base);
204*0f4c859eSApple OSS Distributions if (*pte & ARM_TTE_VALID) {
205*0f4c859eSApple OSS Distributions assert((*pte & ARM_TTE_TYPE_MASK) == ARM_TTE_TYPE_TABLE);
206*0f4c859eSApple OSS Distributions } else {
207*0f4c859eSApple OSS Distributions *pte = ((uint64_t)kasan_arm64_alloc_zero_page(early)
208*0f4c859eSApple OSS Distributions & ARM_TTE_TABLE_MASK) | ARM_TTE_VALID | ARM_TTE_TYPE_TABLE;
209*0f4c859eSApple OSS Distributions }
210*0f4c859eSApple OSS Distributions
211*0f4c859eSApple OSS Distributions base = (uint64_t *)kasan_arm64_phystokv(*pte & ARM_TTE_TABLE_MASK, early);
212*0f4c859eSApple OSS Distributions
213*0f4c859eSApple OSS Distributions /* lookup L2 entry */
214*0f4c859eSApple OSS Distributions pte = kasan_arm64_lookup_l2(base, shadow_base);
215*0f4c859eSApple OSS Distributions if (*pte & ARM_TTE_VALID) {
216*0f4c859eSApple OSS Distributions assert((*pte & ARM_TTE_TYPE_MASK) == ARM_TTE_TYPE_TABLE);
217*0f4c859eSApple OSS Distributions } else {
218*0f4c859eSApple OSS Distributions *pte = ((uint64_t)kasan_arm64_alloc_zero_page(early)
219*0f4c859eSApple OSS Distributions & ARM_TTE_TABLE_MASK) | ARM_TTE_VALID | ARM_TTE_TYPE_TABLE;
220*0f4c859eSApple OSS Distributions }
221*0f4c859eSApple OSS Distributions
222*0f4c859eSApple OSS Distributions base = (uint64_t *)kasan_arm64_phystokv(*pte & ARM_TTE_TABLE_MASK, early);
223*0f4c859eSApple OSS Distributions
224*0f4c859eSApple OSS Distributions if (options & KASAN_ARM64_PREALLOCATE_L1L2) {
225*0f4c859eSApple OSS Distributions return;
226*0f4c859eSApple OSS Distributions }
227*0f4c859eSApple OSS Distributions
228*0f4c859eSApple OSS Distributions bool static_valid = options & KASAN_ARM64_MAP_STATIC_VALID_PAGE;
229*0f4c859eSApple OSS Distributions
230*0f4c859eSApple OSS Distributions /* lookup L3 entry */
231*0f4c859eSApple OSS Distributions pte = kasan_arm64_lookup_l3(base, shadow_base);
232*0f4c859eSApple OSS Distributions
233*0f4c859eSApple OSS Distributions if (*pte & ARM_PTE_TYPE_VALID) {
234*0f4c859eSApple OSS Distributions bool pte_rona = (*pte & ARM_PTE_APMASK) == ARM_PTE_AP(AP_RONA);
235*0f4c859eSApple OSS Distributions if (!pte_rona || static_valid) {
236*0f4c859eSApple OSS Distributions return;
237*0f4c859eSApple OSS Distributions }
238*0f4c859eSApple OSS Distributions }
239*0f4c859eSApple OSS Distributions
240*0f4c859eSApple OSS Distributions /* create new L3 entry */
241*0f4c859eSApple OSS Distributions uint64_t newpte;
242*0f4c859eSApple OSS Distributions if (static_valid) {
243*0f4c859eSApple OSS Distributions /* map the zero page RO */
244*0f4c859eSApple OSS Distributions newpte = (uint64_t)unmutable_valid_access_page | ARM_PTE_AP(AP_RONA);
245*0f4c859eSApple OSS Distributions } else {
246*0f4c859eSApple OSS Distributions newpte = (uint64_t)kasan_arm64_alloc_valid_page(early) | ARM_PTE_AP(AP_RWNA);
247*0f4c859eSApple OSS Distributions }
248*0f4c859eSApple OSS Distributions
249*0f4c859eSApple OSS Distributions newpte |= ARM_PTE_TYPE_VALID
250*0f4c859eSApple OSS Distributions | ARM_PTE_AF
251*0f4c859eSApple OSS Distributions | ARM_PTE_SH(SH_OUTER_MEMORY)
252*0f4c859eSApple OSS Distributions | ARM_PTE_ATTRINDX(CACHE_ATTRINDX_DEFAULT)
253*0f4c859eSApple OSS Distributions | ARM_PTE_NX
254*0f4c859eSApple OSS Distributions | ARM_PTE_PNX;
255*0f4c859eSApple OSS Distributions *pte = newpte;
256*0f4c859eSApple OSS Distributions }
257*0f4c859eSApple OSS Distributions
258*0f4c859eSApple OSS Distributions static void
kasan_map_shadow_internal(vm_offset_t address,vm_size_t size,uint8_t options)259*0f4c859eSApple OSS Distributions kasan_map_shadow_internal(vm_offset_t address, vm_size_t size, uint8_t options)
260*0f4c859eSApple OSS Distributions {
261*0f4c859eSApple OSS Distributions size = (size + KASAN_SIZE_ALIGNMENT) & ~KASAN_SIZE_ALIGNMENT;
262*0f4c859eSApple OSS Distributions vm_offset_t shadow_base = vm_map_trunc_page(SHADOW_FOR_ADDRESS(address), ARM_PGMASK);
263*0f4c859eSApple OSS Distributions vm_offset_t shadow_top = vm_map_round_page(SHADOW_FOR_ADDRESS(address + size), ARM_PGMASK);
264*0f4c859eSApple OSS Distributions
265*0f4c859eSApple OSS Distributions assert(shadow_base >= KASAN_SHADOW_MIN && shadow_top <= KASAN_SHADOW_MAX);
266*0f4c859eSApple OSS Distributions assert((size & KASAN_SIZE_ALIGNMENT) == 0);
267*0f4c859eSApple OSS Distributions
268*0f4c859eSApple OSS Distributions for (; shadow_base < shadow_top; shadow_base += ARM_PGBYTES) {
269*0f4c859eSApple OSS Distributions kasan_arm64_pte_map(shadow_base, cpu_tte, options);
270*0f4c859eSApple OSS Distributions }
271*0f4c859eSApple OSS Distributions
272*0f4c859eSApple OSS Distributions flush_mmu_tlb();
273*0f4c859eSApple OSS Distributions }
274*0f4c859eSApple OSS Distributions
275*0f4c859eSApple OSS Distributions void
kasan_map_shadow(vm_offset_t address,vm_size_t size,bool static_valid)276*0f4c859eSApple OSS Distributions kasan_map_shadow(vm_offset_t address, vm_size_t size, bool static_valid)
277*0f4c859eSApple OSS Distributions {
278*0f4c859eSApple OSS Distributions uint8_t options = KASAN_ARM64_MAP;
279*0f4c859eSApple OSS Distributions
280*0f4c859eSApple OSS Distributions if (static_valid) {
281*0f4c859eSApple OSS Distributions options |= KASAN_ARM64_MAP_STATIC_VALID_PAGE;
282*0f4c859eSApple OSS Distributions #if KASAN_LIGHT
283*0f4c859eSApple OSS Distributions } else if (!kasan_zone_maps_owned(address, size)) {
284*0f4c859eSApple OSS Distributions options |= KASAN_ARM64_MAP_STATIC_VALID_PAGE;
285*0f4c859eSApple OSS Distributions #endif /* KASAN_LIGHT */
286*0f4c859eSApple OSS Distributions }
287*0f4c859eSApple OSS Distributions
288*0f4c859eSApple OSS Distributions kasan_map_shadow_internal(address, size, options);
289*0f4c859eSApple OSS Distributions }
290*0f4c859eSApple OSS Distributions
291*0f4c859eSApple OSS Distributions /*
292*0f4c859eSApple OSS Distributions * TODO: mappings here can be reclaimed after kasan_init()
293*0f4c859eSApple OSS Distributions */
294*0f4c859eSApple OSS Distributions static void
kasan_arm64_do_map_shadow_early(vm_offset_t address,vm_size_t size,uint8_t options)295*0f4c859eSApple OSS Distributions kasan_arm64_do_map_shadow_early(vm_offset_t address, vm_size_t size, uint8_t options)
296*0f4c859eSApple OSS Distributions {
297*0f4c859eSApple OSS Distributions kasan_arm64_align_to_page(&address, &size);
298*0f4c859eSApple OSS Distributions vm_size_t j;
299*0f4c859eSApple OSS Distributions
300*0f4c859eSApple OSS Distributions for (j = 0; j < size; j += ARM_PGBYTES) {
301*0f4c859eSApple OSS Distributions vm_offset_t virt_shadow_target = (vm_offset_t)SHADOW_FOR_ADDRESS(address + j);
302*0f4c859eSApple OSS Distributions
303*0f4c859eSApple OSS Distributions assert(virt_shadow_target >= KASAN_SHADOW_MIN);
304*0f4c859eSApple OSS Distributions assert(virt_shadow_target < KASAN_SHADOW_MAX);
305*0f4c859eSApple OSS Distributions
306*0f4c859eSApple OSS Distributions kasan_arm64_pte_map(virt_shadow_target, (uint64_t *)bootstrap_pgtable_phys, options);
307*0f4c859eSApple OSS Distributions }
308*0f4c859eSApple OSS Distributions
309*0f4c859eSApple OSS Distributions flush_mmu_tlb();
310*0f4c859eSApple OSS Distributions }
311*0f4c859eSApple OSS Distributions
312*0f4c859eSApple OSS Distributions
313*0f4c859eSApple OSS Distributions static void
kasan_map_shadow_early(vm_offset_t address,vm_size_t size)314*0f4c859eSApple OSS Distributions kasan_map_shadow_early(vm_offset_t address, vm_size_t size)
315*0f4c859eSApple OSS Distributions {
316*0f4c859eSApple OSS Distributions kasan_arm64_do_map_shadow_early(address, size, KASAN_ARM64_MAP_EARLY);
317*0f4c859eSApple OSS Distributions }
318*0f4c859eSApple OSS Distributions
319*0f4c859eSApple OSS Distributions static void
kasan_map_shadow_static_early(vm_offset_t address,vm_size_t size)320*0f4c859eSApple OSS Distributions kasan_map_shadow_static_early(vm_offset_t address, vm_size_t size)
321*0f4c859eSApple OSS Distributions {
322*0f4c859eSApple OSS Distributions kasan_arm64_do_map_shadow_early(address, size, KASAN_ARM64_MAP_STATIC_EARLY);
323*0f4c859eSApple OSS Distributions }
324*0f4c859eSApple OSS Distributions
325*0f4c859eSApple OSS Distributions void
kasan_arch_init(void)326*0f4c859eSApple OSS Distributions kasan_arch_init(void)
327*0f4c859eSApple OSS Distributions {
328*0f4c859eSApple OSS Distributions /* Map the physical aperture */
329*0f4c859eSApple OSS Distributions kasan_map_shadow(physmap_vbase, physmap_vtop - physmap_vbase, true);
330*0f4c859eSApple OSS Distributions
331*0f4c859eSApple OSS Distributions #if defined(KERNEL_INTEGRITY_KTRR) || defined(KERNEL_INTEGRITY_CTRR)
332*0f4c859eSApple OSS Distributions /* Pre-allocate all the L3 page table pages to avoid triggering KTRR */
333*0f4c859eSApple OSS Distributions kasan_map_shadow_internal(VM_MIN_KERNEL_ADDRESS,
334*0f4c859eSApple OSS Distributions VM_MAX_KERNEL_ADDRESS - VM_MIN_KERNEL_ADDRESS + 1, KASAN_ARM64_PREALLOCATE_TRANSLATION);
335*0f4c859eSApple OSS Distributions #endif
336*0f4c859eSApple OSS Distributions }
337*0f4c859eSApple OSS Distributions
338*0f4c859eSApple OSS Distributions /*
339*0f4c859eSApple OSS Distributions * Steal memory for the shadow, and shadow map the bootstrap page tables so we can
340*0f4c859eSApple OSS Distributions * run until kasan_init(). Called while running with identity (V=P) map active.
341*0f4c859eSApple OSS Distributions */
342*0f4c859eSApple OSS Distributions void
kasan_bootstrap(boot_args * args,vm_offset_t pgtable)343*0f4c859eSApple OSS Distributions kasan_bootstrap(boot_args *args, vm_offset_t pgtable)
344*0f4c859eSApple OSS Distributions {
345*0f4c859eSApple OSS Distributions uintptr_t tosteal;
346*0f4c859eSApple OSS Distributions /* Base address for the virtual identity mapping */
347*0f4c859eSApple OSS Distributions vm_address_t p2v = args->virtBase - args->physBase;
348*0f4c859eSApple OSS Distributions
349*0f4c859eSApple OSS Distributions vm_address_t pbase = args->physBase;
350*0f4c859eSApple OSS Distributions vm_address_t ptop = args->topOfKernelData;
351*0f4c859eSApple OSS Distributions kernel_vbase = args->virtBase;
352*0f4c859eSApple OSS Distributions kernel_vtop = kernel_vbase + ptop - pbase;
353*0f4c859eSApple OSS Distributions
354*0f4c859eSApple OSS Distributions /* Reserve physical memory at the end for KASAN shadow table and quarantines */
355*0f4c859eSApple OSS Distributions tosteal = (args->memSize * STOLEN_MEM_PERCENT) / 100 + STOLEN_MEM_BYTES;
356*0f4c859eSApple OSS Distributions tosteal = vm_map_trunc_page(tosteal, ARM_PGMASK);
357*0f4c859eSApple OSS Distributions
358*0f4c859eSApple OSS Distributions /* Make it disappear from xnu view */
359*0f4c859eSApple OSS Distributions args->memSize -= tosteal;
360*0f4c859eSApple OSS Distributions
361*0f4c859eSApple OSS Distributions shadow_pbase = vm_map_round_page(pbase + args->memSize, ARM_PGMASK);
362*0f4c859eSApple OSS Distributions shadow_ptop = shadow_pbase + tosteal;
363*0f4c859eSApple OSS Distributions shadow_pnext = shadow_pbase;
364*0f4c859eSApple OSS Distributions shadow_pages_total = (uint32_t)((shadow_ptop - shadow_pbase) / ARM_PGBYTES);
365*0f4c859eSApple OSS Distributions
366*0f4c859eSApple OSS Distributions /*
367*0f4c859eSApple OSS Distributions * Set aside a page to represent all those regions that allow any
368*0f4c859eSApple OSS Distributions * access and that won't mutate over their lifetime.
369*0f4c859eSApple OSS Distributions */
370*0f4c859eSApple OSS Distributions unmutable_valid_access_page = kasan_arm64_alloc_page();
371*0f4c859eSApple OSS Distributions kasan_impl_fill_valid_range(unmutable_valid_access_page, ARM_PGBYTES);
372*0f4c859eSApple OSS Distributions
373*0f4c859eSApple OSS Distributions /* Shadow the KVA bootstrap mapping: start of kernel Mach-O to end of physical */
374*0f4c859eSApple OSS Distributions bootstrap_pgtable_phys = pgtable;
375*0f4c859eSApple OSS Distributions /* Blanket map all of what we got from iBoot, as we'd later do in kasan_init() */
376*0f4c859eSApple OSS Distributions kasan_map_shadow_static_early(kernel_vbase, args->memSize);
377*0f4c859eSApple OSS Distributions
378*0f4c859eSApple OSS Distributions vm_offset_t intstack_virt = (vm_offset_t)&intstack + p2v;
379*0f4c859eSApple OSS Distributions vm_offset_t excepstack_virt = (vm_offset_t)&excepstack + p2v;
380*0f4c859eSApple OSS Distributions vm_offset_t intstack_size = (vm_offset_t)&intstack_top - (vm_offset_t)&intstack;
381*0f4c859eSApple OSS Distributions vm_offset_t excepstack_size = (vm_offset_t)&excepstack_top - (vm_offset_t)&excepstack;
382*0f4c859eSApple OSS Distributions
383*0f4c859eSApple OSS Distributions kasan_map_shadow_early(intstack_virt, intstack_size);
384*0f4c859eSApple OSS Distributions kasan_map_shadow_early(excepstack_virt, excepstack_size);
385*0f4c859eSApple OSS Distributions
386*0f4c859eSApple OSS Distributions /* Upgrade the deviceTree mapping if necessary */
387*0f4c859eSApple OSS Distributions if ((vm_offset_t)args->deviceTreeP - p2v < (vm_offset_t)&_mh_execute_header) {
388*0f4c859eSApple OSS Distributions kasan_map_shadow_early((vm_offset_t)args->deviceTreeP, args->deviceTreeLength);
389*0f4c859eSApple OSS Distributions }
390*0f4c859eSApple OSS Distributions }
391*0f4c859eSApple OSS Distributions
392*0f4c859eSApple OSS Distributions bool
kasan_is_shadow_mapped(uintptr_t shadowp)393*0f4c859eSApple OSS Distributions kasan_is_shadow_mapped(uintptr_t shadowp)
394*0f4c859eSApple OSS Distributions {
395*0f4c859eSApple OSS Distributions uint64_t *pte;
396*0f4c859eSApple OSS Distributions uint64_t *base = cpu_tte;
397*0f4c859eSApple OSS Distributions
398*0f4c859eSApple OSS Distributions assert(shadowp >= KASAN_SHADOW_MIN);
399*0f4c859eSApple OSS Distributions assert(shadowp < KASAN_SHADOW_MAX);
400*0f4c859eSApple OSS Distributions
401*0f4c859eSApple OSS Distributions /* lookup L1 entry */
402*0f4c859eSApple OSS Distributions pte = kasan_arm64_lookup_l1(base, shadowp);
403*0f4c859eSApple OSS Distributions if (!(*pte & ARM_TTE_VALID)) {
404*0f4c859eSApple OSS Distributions return false;
405*0f4c859eSApple OSS Distributions }
406*0f4c859eSApple OSS Distributions base = (uint64_t *)phystokv(*pte & ARM_TTE_TABLE_MASK);
407*0f4c859eSApple OSS Distributions
408*0f4c859eSApple OSS Distributions /* lookup L2 entry */
409*0f4c859eSApple OSS Distributions pte = kasan_arm64_lookup_l2(base, shadowp);
410*0f4c859eSApple OSS Distributions if (!(*pte & ARM_TTE_VALID)) {
411*0f4c859eSApple OSS Distributions return false;
412*0f4c859eSApple OSS Distributions }
413*0f4c859eSApple OSS Distributions base = (uint64_t *)phystokv(*pte & ARM_TTE_TABLE_MASK);
414*0f4c859eSApple OSS Distributions
415*0f4c859eSApple OSS Distributions /* lookup L3 entry */
416*0f4c859eSApple OSS Distributions pte = kasan_arm64_lookup_l3(base, shadowp);
417*0f4c859eSApple OSS Distributions if (!(*pte & ARM_PTE_TYPE_VALID)) {
418*0f4c859eSApple OSS Distributions return false;
419*0f4c859eSApple OSS Distributions }
420*0f4c859eSApple OSS Distributions
421*0f4c859eSApple OSS Distributions return true;
422*0f4c859eSApple OSS Distributions }
423*0f4c859eSApple OSS Distributions
424*0f4c859eSApple OSS Distributions void
kasan_lock_init(void)425*0f4c859eSApple OSS Distributions kasan_lock_init(void)
426*0f4c859eSApple OSS Distributions {
427*0f4c859eSApple OSS Distributions lck_grp_init(&kasan_vm_lock_grp, "kasan lock", LCK_GRP_ATTR_NULL);
428*0f4c859eSApple OSS Distributions lck_ticket_init(&kasan_vm_lock, &kasan_vm_lock_grp);
429*0f4c859eSApple OSS Distributions }
430*0f4c859eSApple OSS Distributions
431*0f4c859eSApple OSS Distributions /*
432*0f4c859eSApple OSS Distributions * KASAN may be called from interrupt context, so we disable interrupts to
433*0f4c859eSApple OSS Distributions * ensure atomicity manipulating the global objects.
434*0f4c859eSApple OSS Distributions */
435*0f4c859eSApple OSS Distributions void
kasan_lock(boolean_t * b)436*0f4c859eSApple OSS Distributions kasan_lock(boolean_t *b)
437*0f4c859eSApple OSS Distributions {
438*0f4c859eSApple OSS Distributions *b = ml_set_interrupts_enabled(false);
439*0f4c859eSApple OSS Distributions lck_ticket_lock(&kasan_vm_lock, &kasan_vm_lock_grp);
440*0f4c859eSApple OSS Distributions kasan_lock_holder = current_thread();
441*0f4c859eSApple OSS Distributions }
442*0f4c859eSApple OSS Distributions
443*0f4c859eSApple OSS Distributions void
kasan_unlock(boolean_t b)444*0f4c859eSApple OSS Distributions kasan_unlock(boolean_t b)
445*0f4c859eSApple OSS Distributions {
446*0f4c859eSApple OSS Distributions kasan_lock_holder = THREAD_NULL;
447*0f4c859eSApple OSS Distributions lck_ticket_unlock(&kasan_vm_lock);
448*0f4c859eSApple OSS Distributions ml_set_interrupts_enabled(b);
449*0f4c859eSApple OSS Distributions }
450