xref: /freebsd/sys/arm64/include/asm.h (revision 2b39a6f6)
1412042e2SAndrew Turner /*-
2412042e2SAndrew Turner  * Copyright (c) 2014 Andrew Turner
3412042e2SAndrew Turner  * All rights reserved.
4412042e2SAndrew Turner  *
5412042e2SAndrew Turner  * Redistribution and use in source and binary forms, with or without
6412042e2SAndrew Turner  * modification, are permitted provided that the following conditions
7412042e2SAndrew Turner  * are met:
8412042e2SAndrew Turner  * 1. Redistributions of source code must retain the above copyright
9412042e2SAndrew Turner  *    notice, this list of conditions and the following disclaimer.
10412042e2SAndrew Turner  * 2. Redistributions in binary form must reproduce the above copyright
11412042e2SAndrew Turner  *    notice, this list of conditions and the following disclaimer in the
12412042e2SAndrew Turner  *    documentation and/or other materials provided with the distribution.
13412042e2SAndrew Turner  *
14412042e2SAndrew Turner  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15412042e2SAndrew Turner  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16412042e2SAndrew Turner  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17412042e2SAndrew Turner  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18412042e2SAndrew Turner  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19412042e2SAndrew Turner  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20412042e2SAndrew Turner  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21412042e2SAndrew Turner  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22412042e2SAndrew Turner  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23412042e2SAndrew Turner  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24412042e2SAndrew Turner  * SUCH DAMAGE.
25412042e2SAndrew Turner  */
26412042e2SAndrew Turner 
27d5d97bedSMike Karels #ifdef __arm__
28d5d97bedSMike Karels #include <arm/asm.h>
29d5d97bedSMike Karels #else /* !__arm__ */
30d5d97bedSMike Karels 
31412042e2SAndrew Turner #ifndef _MACHINE_ASM_H_
32412042e2SAndrew Turner #define	_MACHINE_ASM_H_
33412042e2SAndrew Turner 
34412042e2SAndrew Turner #undef __FBSDID
35412042e2SAndrew Turner #if !defined(lint) && !defined(STRIP_FBSDID)
36412042e2SAndrew Turner #define	__FBSDID(s)     .ident s
37412042e2SAndrew Turner #else
38412042e2SAndrew Turner #define	__FBSDID(s)     /* nothing */
39412042e2SAndrew Turner #endif
40412042e2SAndrew Turner 
41412042e2SAndrew Turner #define	_C_LABEL(x)	x
42412042e2SAndrew Turner 
4328d94520SAndrew Turner #ifdef KDTRACE_HOOKS
4428d94520SAndrew Turner #define	DTRACE_NOP	nop
4528d94520SAndrew Turner #else
4628d94520SAndrew Turner #define	DTRACE_NOP
4728d94520SAndrew Turner #endif
4828d94520SAndrew Turner 
496f8866afSAndrew Turner #define	LENTRY(sym)						\
506f8866afSAndrew Turner 	.text; .align 2; .type sym,#function; sym:		\
51e340882dSAndrew Turner 	.cfi_startproc; BTI_C; DTRACE_NOP
526f8866afSAndrew Turner #define	ENTRY(sym)						\
536f8866afSAndrew Turner 	.globl sym; LENTRY(sym)
54412042e2SAndrew Turner #define	EENTRY(sym)						\
5504b46559SAndrew Turner 	.globl	sym; .text; .align 2; .type sym,#function; sym:
56449ebf13SAndrew Turner #define	LEND(sym) .ltorg; .cfi_endproc; .size sym, . - sym
576f8866afSAndrew Turner #define	END(sym) LEND(sym)
58412042e2SAndrew Turner #define	EEND(sym)
59412042e2SAndrew Turner 
60412042e2SAndrew Turner #define	WEAK_REFERENCE(sym, alias)				\
61412042e2SAndrew Turner 	.weak alias;						\
62412042e2SAndrew Turner 	.set alias,sym
63412042e2SAndrew Turner 
64412042e2SAndrew Turner #define	UINT64_C(x)	(x)
65412042e2SAndrew Turner 
66412042e2SAndrew Turner #if defined(PIC)
67412042e2SAndrew Turner #define	PIC_SYM(x,y)	x ## @ ## y
68412042e2SAndrew Turner #else
69412042e2SAndrew Turner #define	PIC_SYM(x,y)	x
70412042e2SAndrew Turner #endif
71412042e2SAndrew Turner 
728b609ea5SAlexander Kabaev /* Alias for link register x30 */
738b609ea5SAlexander Kabaev #define	lr		x30
748b609ea5SAlexander Kabaev 
75412042e2SAndrew Turner /*
76412042e2SAndrew Turner  * Sets the trap fault handler. The exception handler will return to the
77412042e2SAndrew Turner  * address in the handler register on a data abort or the xzr register to
78412042e2SAndrew Turner  * clear the handler. The tmp parameter should be a register able to hold
79412042e2SAndrew Turner  * the temporary data.
80412042e2SAndrew Turner  */
81412042e2SAndrew Turner #define	SET_FAULT_HANDLER(handler, tmp)					\
82412042e2SAndrew Turner 	ldr	tmp, [x18, #PC_CURTHREAD];	/* Load curthread */	\
83412042e2SAndrew Turner 	ldr	tmp, [tmp, #TD_PCB];		/* Load the pcb */	\
84412042e2SAndrew Turner 	str	handler, [tmp, #PCB_ONFAULT]	/* Set the handler */
85412042e2SAndrew Turner 
86d6a0af23SAndrew Turner #define	ENTER_USER_ACCESS(reg, tmp)					\
87d6a0af23SAndrew Turner 	ldr	tmp, =has_pan;			/* Get the addr of has_pan */ \
88d6a0af23SAndrew Turner 	ldr	reg, [tmp];			/* Read it */		\
89d6a0af23SAndrew Turner 	cbz	reg, 997f;			/* If no PAN skip */	\
90d6a0af23SAndrew Turner 	.inst	0xd500409f | (0 << 8);		/* Clear PAN */		\
91d6a0af23SAndrew Turner 	997:
92d6a0af23SAndrew Turner 
93d6a0af23SAndrew Turner #define	EXIT_USER_ACCESS(reg)						\
94d6a0af23SAndrew Turner 	cbz	reg, 998f;			/* If no PAN skip */	\
95d6a0af23SAndrew Turner 	.inst	0xd500409f | (1 << 8);		/* Set PAN */		\
96d6a0af23SAndrew Turner 	998:
97d6a0af23SAndrew Turner 
98d6a0af23SAndrew Turner #define	EXIT_USER_ACCESS_CHECK(reg, tmp)				\
99d6a0af23SAndrew Turner 	ldr	tmp, =has_pan;			/* Get the addr of has_pan */ \
100d6a0af23SAndrew Turner 	ldr	reg, [tmp];			/* Read it */		\
101d6a0af23SAndrew Turner 	cbz	reg, 999f;			/* If no PAN skip */	\
102d6a0af23SAndrew Turner 	.inst	0xd500409f | (1 << 8);		/* Set PAN */		\
103d6a0af23SAndrew Turner 	999:
104d6a0af23SAndrew Turner 
105494278bbSAndrew Turner /*
106494278bbSAndrew Turner  * Some AArch64 CPUs speculate past an eret instruction. As the user may
107494278bbSAndrew Turner  * control the registers at this point add a speculation barrier usable on
108494278bbSAndrew Turner  * all AArch64 CPUs after the eret instruction.
109494278bbSAndrew Turner  * TODO: ARMv8.5 adds a specific instruction for this, we could use that
110494278bbSAndrew Turner  * if we know we are running on something that supports it.
111494278bbSAndrew Turner  */
112494278bbSAndrew Turner #define	ERET								\
113494278bbSAndrew Turner 	eret;								\
114494278bbSAndrew Turner 	dsb	sy;							\
115494278bbSAndrew Turner 	isb
116494278bbSAndrew Turner 
117e340882dSAndrew Turner /*
118e340882dSAndrew Turner  * When a CPU that implements FEAT_BTI uses a BR/BLR instruction (or the
119e340882dSAndrew Turner  * pointer authentication variants, e.g. BLRAA) and the target location
120e340882dSAndrew Turner  * has the GP attribute in its page table, then the target of the BR/BLR
121e340882dSAndrew Turner  * needs to be a valid BTI landing pad.
122e340882dSAndrew Turner  *
123e340882dSAndrew Turner  * BTI_C should be used at the start of a function and is used in the
124e340882dSAndrew Turner  * ENTRY macro. It can be replaced by PACIASP or PACIBSP, however these
125e340882dSAndrew Turner  * also need an appropriate authenticate instruction before returning.
126e340882dSAndrew Turner  *
127e340882dSAndrew Turner  * BTI_J should be used as the target instruction when branching with a
128e340882dSAndrew Turner  * BR instruction within a function.
129e340882dSAndrew Turner  *
130e340882dSAndrew Turner  * When using a BR to branch to a new function, e.g. a tail call, then
131e340882dSAndrew Turner  * the target register should be x16 or x17 so it is compatible with
132e340882dSAndrew Turner  * the BRI_C instruction.
133e340882dSAndrew Turner  *
134e340882dSAndrew Turner  * As these instructions are in the hint space they are a NOP when
135e340882dSAndrew Turner  * the CPU doesn't implement FEAT_BTI so are safe to use.
136e340882dSAndrew Turner  */
137e340882dSAndrew Turner #ifdef __ARM_FEATURE_BTI_DEFAULT
138e340882dSAndrew Turner #define	BTI_C	hint	#34
139e340882dSAndrew Turner #define	BTI_J	hint	#36
140e340882dSAndrew Turner #else
141e340882dSAndrew Turner #define	BTI_C
142e340882dSAndrew Turner #define	BTI_J
143e340882dSAndrew Turner #endif
144e340882dSAndrew Turner 
14582597d21SAndrew Turner /*
1462b39a6f6SAndrew Turner  * To help protect against ROP attacks we can use Pointer Authentication
1472b39a6f6SAndrew Turner  * to sign the return address before pushing it to the stack.
1482b39a6f6SAndrew Turner  *
1492b39a6f6SAndrew Turner  * PAC_LR_SIGN can be used at the start of a function to sign the link
1502b39a6f6SAndrew Turner  * register with the stack pointer as the modifier. As this is in the hint
1512b39a6f6SAndrew Turner  * space it is safe to use on CPUs that don't implement pointer
1522b39a6f6SAndrew Turner  * authentication. It can be used in place of the BTI_C instruction above as
1532b39a6f6SAndrew Turner  * a valid BTI landing pad instruction.
1542b39a6f6SAndrew Turner  *
1552b39a6f6SAndrew Turner  * PAC_LR_AUTH is used to authenticate the link register using the stack
1562b39a6f6SAndrew Turner  * pointer as the modifier. It should be used in any function that uses
1572b39a6f6SAndrew Turner  * PAC_LR_SIGN. The stack pointer must be identical in each case.
1582b39a6f6SAndrew Turner  */
1592b39a6f6SAndrew Turner #ifdef __ARM_FEATURE_PAC_DEFAULT
1602b39a6f6SAndrew Turner #define	PAC_LR_SIGN	hint	#25	/* paciasp */
1612b39a6f6SAndrew Turner #define	PAC_LR_AUTH	hint	#29	/* autiasp */
1622b39a6f6SAndrew Turner #else
1632b39a6f6SAndrew Turner #define	PAC_LR_SIGN
1642b39a6f6SAndrew Turner #define	PAC_LR_AUTH
1652b39a6f6SAndrew Turner #endif
1662b39a6f6SAndrew Turner 
1672b39a6f6SAndrew Turner /*
16882597d21SAndrew Turner  * GNU_PROPERTY_AARCH64_FEATURE_1_NOTE can be used to insert a note that
16982597d21SAndrew Turner  * the current assembly file is built with Pointer Authentication (PAC) or
17082597d21SAndrew Turner  * Branch Target Identification support (BTI). As the linker requires all
17182597d21SAndrew Turner  * object files in an executable or library to have the GNU property
17282597d21SAndrew Turner  * note to emit it in the created elf file we need to add a note to all
17382597d21SAndrew Turner  * assembly files that support BTI so the kernel and dynamic linker can
17482597d21SAndrew Turner  * mark memory used by the file as guarded.
17582597d21SAndrew Turner  *
17682597d21SAndrew Turner  * The GNU_PROPERTY_AARCH64_FEATURE_1_VAL macro encodes the combination
17782597d21SAndrew Turner  * of PAC and BTI that have been enabled. It can be used as follows:
17882597d21SAndrew Turner  * GNU_PROPERTY_AARCH64_FEATURE_1_NOTE(GNU_PROPERTY_AARCH64_FEATURE_1_VAL);
17982597d21SAndrew Turner  *
18082597d21SAndrew Turner  * To use this you need to include <sys/elf_common.h> for
18182597d21SAndrew Turner  * GNU_PROPERTY_AARCH64_FEATURE_1_*
18282597d21SAndrew Turner  */
18382597d21SAndrew Turner #if defined(__ARM_FEATURE_BTI_DEFAULT)
18482597d21SAndrew Turner #if defined(__ARM_FEATURE_PAC_DEFAULT)
18582597d21SAndrew Turner /* BTI, PAC */
18682597d21SAndrew Turner #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL				\
18782597d21SAndrew Turner     (GNU_PROPERTY_AARCH64_FEATURE_1_BTI | GNU_PROPERTY_AARCH64_FEATURE_1_PAC)
18882597d21SAndrew Turner #else
18982597d21SAndrew Turner /* BTI, no PAC */
19082597d21SAndrew Turner #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL				\
19182597d21SAndrew Turner     (GNU_PROPERTY_AARCH64_FEATURE_1_BTI)
19282597d21SAndrew Turner #endif
19382597d21SAndrew Turner #elif defined(__ARM_FEATURE_PAC_DEFAULT)
19482597d21SAndrew Turner /* No BTI, PAC */
19582597d21SAndrew Turner #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL				\
19682597d21SAndrew Turner     (GNU_PROPERTY_AARCH64_FEATURE_1_PAC)
19782597d21SAndrew Turner #else
19882597d21SAndrew Turner /* No BTI, no PAC */
19982597d21SAndrew Turner #define	GNU_PROPERTY_AARCH64_FEATURE_1_VAL	0
20082597d21SAndrew Turner #endif
20182597d21SAndrew Turner 
20282597d21SAndrew Turner #if defined(__ARM_FEATURE_BTI_DEFAULT) || defined(__ARM_FEATURE_PAC_DEFAULT)
20382597d21SAndrew Turner #define	GNU_PROPERTY_AARCH64_FEATURE_1_NOTE(x)				\
20482597d21SAndrew Turner     .section .note.gnu.property, "a";					\
20582597d21SAndrew Turner     .balign 8;								\
20682597d21SAndrew Turner     .4byte 0x4;				/* sizeof(vendor) */		\
20782597d21SAndrew Turner     .4byte 0x10;			/* sizeof(note data) */		\
20882597d21SAndrew Turner     .4byte (NT_GNU_PROPERTY_TYPE_0);					\
20982597d21SAndrew Turner     .asciz "GNU";			/* vendor */			\
21082597d21SAndrew Turner     /* note data: */							\
21182597d21SAndrew Turner     .4byte (GNU_PROPERTY_AARCH64_FEATURE_1_AND);			\
21282597d21SAndrew Turner     .4byte 0x4;				/* sizeof(property) */		\
21382597d21SAndrew Turner     .4byte (x);				/* property */			\
21482597d21SAndrew Turner     .4byte 0
21582597d21SAndrew Turner #else
21682597d21SAndrew Turner #define	GNU_PROPERTY_AARCH64_FEATURE_1_NOTE(x)
21782597d21SAndrew Turner #endif
21882597d21SAndrew Turner 
219412042e2SAndrew Turner #endif /* _MACHINE_ASM_H_ */
220d5d97bedSMike Karels 
221d5d97bedSMike Karels #endif /* !__arm__ */
222