xref: /freebsd/sys/arm64/include/asm.h (revision 4b9d605768acabc460aa6dcfe8a1f8db35b16794)
1 /*-
2  * Copyright (c) 2014 Andrew Turner
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  */
26 
27 #ifdef __arm__
28 #include <arm/asm.h>
29 #else /* !__arm__ */
30 
31 #ifndef _MACHINE_ASM_H_
32 #define	_MACHINE_ASM_H_
33 
34 #undef __FBSDID
35 #if !defined(lint) && !defined(STRIP_FBSDID)
36 #define	__FBSDID(s)     .ident s
37 #else
38 #define	__FBSDID(s)     /* nothing */
39 #endif
40 
41 #define	_C_LABEL(x)	x
42 
43 #ifdef KDTRACE_HOOKS
44 #define	DTRACE_NOP	nop
45 #else
46 #define	DTRACE_NOP
47 #endif
48 
49 #define	LENTRY(sym)						\
50 	.text; .align 2; .type sym,#function; sym:		\
51 	.cfi_startproc; BTI_C; DTRACE_NOP
52 #define	ENTRY(sym)						\
53 	.globl sym; LENTRY(sym)
54 #define	EENTRY(sym)						\
55 	.globl	sym; .text; .align 2; .type sym,#function; sym:
56 #define	LEND(sym) .ltorg; .cfi_endproc; .size sym, . - sym
57 #define	END(sym) LEND(sym)
58 #define	EEND(sym)
59 
60 #define	WEAK_REFERENCE(sym, alias)				\
61 	.weak alias;						\
62 	.set alias,sym
63 
64 #define	UINT64_C(x)	(x)
65 
66 #if defined(PIC)
67 #define	PIC_SYM(x,y)	x ## @ ## y
68 #else
69 #define	PIC_SYM(x,y)	x
70 #endif
71 
72 /* Alias for link register x30 */
73 #define	lr		x30
74 
75 /*
76  * Sets the trap fault handler. The exception handler will return to the
77  * address in the handler register on a data abort or the xzr register to
78  * clear the handler. The tmp parameter should be a register able to hold
79  * the temporary data.
80  */
81 #define	SET_FAULT_HANDLER(handler, tmp)					\
82 	ldr	tmp, [x18, #PC_CURTHREAD];	/* Load curthread */	\
83 	ldr	tmp, [tmp, #TD_PCB];		/* Load the pcb */	\
84 	str	handler, [tmp, #PCB_ONFAULT]	/* Set the handler */
85 
86 #define	ENTER_USER_ACCESS(reg, tmp)					\
87 	ldr	tmp, =has_pan;			/* Get the addr of has_pan */ \
88 	ldr	reg, [tmp];			/* Read it */		\
89 	cbz	reg, 997f;			/* If no PAN skip */	\
90 	.inst	0xd500409f | (0 << 8);		/* Clear PAN */		\
91 	997:
92 
93 #define	EXIT_USER_ACCESS(reg)						\
94 	cbz	reg, 998f;			/* If no PAN skip */	\
95 	.inst	0xd500409f | (1 << 8);		/* Set PAN */		\
96 	998:
97 
98 #define	EXIT_USER_ACCESS_CHECK(reg, tmp)				\
99 	ldr	tmp, =has_pan;			/* Get the addr of has_pan */ \
100 	ldr	reg, [tmp];			/* Read it */		\
101 	cbz	reg, 999f;			/* If no PAN skip */	\
102 	.inst	0xd500409f | (1 << 8);		/* Set PAN */		\
103 	999:
104 
105 /*
106  * Some AArch64 CPUs speculate past an eret instruction. As the user may
107  * control the registers at this point add a speculation barrier usable on
108  * all AArch64 CPUs after the eret instruction.
109  * TODO: ARMv8.5 adds a specific instruction for this, we could use that
110  * if we know we are running on something that supports it.
111  */
112 #define	ERET								\
113 	eret;								\
114 	dsb	sy;							\
115 	isb
116 
117 /*
118  * When a CPU that implements FEAT_BTI uses a BR/BLR instruction (or the
119  * pointer authentication variants, e.g. BLRAA) and the target location
120  * has the GP attribute in its page table, then the target of the BR/BLR
121  * needs to be a valid BTI landing pad.
122  *
123  * BTI_C should be used at the start of a function and is used in the
124  * ENTRY macro. It can be replaced by PACIASP or PACIBSP, however these
125  * also need an appropriate authenticate instruction before returning.
126  *
127  * BTI_J should be used as the target instruction when branching with a
128  * BR instruction within a function.
129  *
130  * When using a BR to branch to a new function, e.g. a tail call, then
131  * the target register should be x16 or x17 so it is compatible with
132  * the BRI_C instruction.
133  *
134  * As these instructions are in the hint space they are a NOP when
135  * the CPU doesn't implement FEAT_BTI so are safe to use.
136  */
137 #ifdef __ARM_FEATURE_BTI_DEFAULT
138 #define	BTI_C	hint	#34
139 #define	BTI_J	hint	#36
140 #else
141 #define	BTI_C
142 #define	BTI_J
143 #endif
144 
145 /*
146  * To help protect against ROP attacks we can use Pointer Authentication
147  * to sign the return address before pushing it to the stack.
148  *
149  * PAC_LR_SIGN can be used at the start of a function to sign the link
150  * register with the stack pointer as the modifier. As this is in the hint
151  * space it is safe to use on CPUs that don't implement pointer
152  * authentication. It can be used in place of the BTI_C instruction above as
153  * a valid BTI landing pad instruction.
154  *
155  * PAC_LR_AUTH is used to authenticate the link register using the stack
156  * pointer as the modifier. It should be used in any function that uses
157  * PAC_LR_SIGN. The stack pointer must be identical in each case.
158  */
159 #ifdef __ARM_FEATURE_PAC_DEFAULT
160 #define	PAC_LR_SIGN	hint	#25	/* paciasp */
161 #define	PAC_LR_AUTH	hint	#29	/* autiasp */
162 #else
163 #define	PAC_LR_SIGN
164 #define	PAC_LR_AUTH
165 #endif
166 
167 /*
168  * GNU_PROPERTY_AARCH64_FEATURE_1_NOTE can be used to insert a note that
169  * the current assembly file is built with Pointer Authentication (PAC) or
170  * Branch Target Identification support (BTI). As the linker requires all
171  * object files in an executable or library to have the GNU property
172  * note to emit it in the created elf file we need to add a note to all
173  * assembly files that support BTI so the kernel and dynamic linker can
174  * mark memory used by the file as guarded.
175  *
176  * The GNU_PROPERTY_AARCH64_FEATURE_1_VAL macro encodes the combination
177  * of PAC and BTI that have been enabled. It can be used as follows:
178  * GNU_PROPERTY_AARCH64_FEATURE_1_NOTE(GNU_PROPERTY_AARCH64_FEATURE_1_VAL);
179  *
180  * To use this you need to include <sys/elf_common.h> for
181  * GNU_PROPERTY_AARCH64_FEATURE_1_*
182  */
183 #if defined(__ARM_FEATURE_BTI_DEFAULT)
184 #if defined(__ARM_FEATURE_PAC_DEFAULT)
185 /* BTI, PAC */
186 #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL				\
187     (GNU_PROPERTY_AARCH64_FEATURE_1_BTI | GNU_PROPERTY_AARCH64_FEATURE_1_PAC)
188 #else
189 /* BTI, no PAC */
190 #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL				\
191     (GNU_PROPERTY_AARCH64_FEATURE_1_BTI)
192 #endif
193 #elif defined(__ARM_FEATURE_PAC_DEFAULT)
194 /* No BTI, PAC */
195 #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL				\
196     (GNU_PROPERTY_AARCH64_FEATURE_1_PAC)
197 #else
198 /* No BTI, no PAC */
199 #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL	0
200 #endif
201 
202 #if defined(__ARM_FEATURE_BTI_DEFAULT) || defined(__ARM_FEATURE_PAC_DEFAULT)
203 #define	GNU_PROPERTY_AARCH64_FEATURE_1_NOTE(x)				\
204     .section .note.gnu.property, "a";					\
205     .balign 8;								\
206     .4byte 0x4;				/* sizeof(vendor) */		\
207     .4byte 0x10;			/* sizeof(note data) */		\
208     .4byte (NT_GNU_PROPERTY_TYPE_0);					\
209     .asciz "GNU";			/* vendor */			\
210     /* note data: */							\
211     .4byte (GNU_PROPERTY_AARCH64_FEATURE_1_AND);			\
212     .4byte 0x4;				/* sizeof(property) */		\
213     .4byte (x);				/* property */			\
214     .4byte 0
215 #else
216 #define	GNU_PROPERTY_AARCH64_FEATURE_1_NOTE(x)
217 #endif
218 
219 #endif /* _MACHINE_ASM_H_ */
220 
221 #endif /* !__arm__ */
222