xref: /netbsd/sys/arch/aarch64/aarch64/exec_machdep.c (revision 7bb23874)
1*7bb23874Sryo /* $NetBSD: exec_machdep.c,v 1.10 2021/09/23 15:19:03 ryo Exp $ */
267d1b467Smatt 
367d1b467Smatt /*-
467d1b467Smatt  * Copyright (c) 2014 The NetBSD Foundation, Inc.
567d1b467Smatt  * All rights reserved.
667d1b467Smatt  *
767d1b467Smatt  * This code is derived from software contributed to The NetBSD Foundation
867d1b467Smatt  * by Matt Thomas of 3am Software Foundry.
967d1b467Smatt  *
1067d1b467Smatt  * Redistribution and use in source and binary forms, with or without
1167d1b467Smatt  * modification, are permitted provided that the following conditions
1267d1b467Smatt  * are met:
1367d1b467Smatt  * 1. Redistributions of source code must retain the above copyright
1467d1b467Smatt  *    notice, this list of conditions and the following disclaimer.
1567d1b467Smatt  * 2. Redistributions in binary form must reproduce the above copyright
1667d1b467Smatt  *    notice, this list of conditions and the following disclaimer in the
1767d1b467Smatt  *    documentation and/or other materials provided with the distribution.
1867d1b467Smatt  *
1967d1b467Smatt  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
2067d1b467Smatt  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
2167d1b467Smatt  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
2267d1b467Smatt  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
2367d1b467Smatt  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
2467d1b467Smatt  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
2567d1b467Smatt  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
2667d1b467Smatt  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
2767d1b467Smatt  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
2867d1b467Smatt  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2967d1b467Smatt  * POSSIBILITY OF SUCH DAMAGE.
3067d1b467Smatt  */
3167d1b467Smatt 
3267d1b467Smatt #include <sys/cdefs.h>
3367d1b467Smatt 
34*7bb23874Sryo __KERNEL_RCSID(1, "$NetBSD: exec_machdep.c,v 1.10 2021/09/23 15:19:03 ryo Exp $");
3567d1b467Smatt 
3667d1b467Smatt #include "opt_compat_netbsd.h"
3767d1b467Smatt #include "opt_compat_netbsd32.h"
3867d1b467Smatt 
3967d1b467Smatt #include <sys/param.h>
4067d1b467Smatt #include <sys/systm.h>
4167d1b467Smatt #include <sys/proc.h>
4267d1b467Smatt #include <sys/exec.h>
43e433820cSryo #include <sys/cprng.h>
4467d1b467Smatt 
4567d1b467Smatt #include <uvm/uvm_extern.h>
4667d1b467Smatt 
4767d1b467Smatt #include <compat/common/compat_util.h>
4867d1b467Smatt #include <sys/exec_elf.h>			/* mandatory */
4967d1b467Smatt 
5067d1b467Smatt #ifdef COMPAT_NETBSD32
5167d1b467Smatt #include <compat/netbsd32/netbsd32_exec.h>
5267d1b467Smatt #endif
5367d1b467Smatt 
548694f07cSryo #include <aarch64/armreg.h>
558694f07cSryo #include <aarch64/frame.h>
56e433820cSryo #include <aarch64/machdep.h>
5767d1b467Smatt 
584381aa53Sskrll #include <arm/cpufunc.h>
594381aa53Sskrll 
6067d1b467Smatt #if EXEC_ELF64
6167d1b467Smatt int
aarch64_netbsd_elf64_probe(struct lwp * l,struct exec_package * epp,void * eh0,char * itp,vaddr_t * start_p)6267d1b467Smatt aarch64_netbsd_elf64_probe(struct lwp *l, struct exec_package *epp, void *eh0,
6367d1b467Smatt 	char *itp, vaddr_t *start_p)
6467d1b467Smatt {
6567d1b467Smatt 	return 0;
6667d1b467Smatt }
6767d1b467Smatt #endif
6867d1b467Smatt 
69eec5571cSryo #if EXEC_ELF32
70eec5571cSryo int
aarch64_netbsd_elf32_probe(struct lwp * l,struct exec_package * epp,void * eh0,char * itp,vaddr_t * start_p)71eec5571cSryo aarch64_netbsd_elf32_probe(struct lwp *l, struct exec_package *epp, void *eh0,
72eec5571cSryo 	char *itp, vaddr_t *start_p)
73eec5571cSryo {
74eec5571cSryo 	const Elf32_Ehdr * const eh = eh0;
75eec5571cSryo 	const bool elf_aapcs_p =
76eec5571cSryo 	    (eh->e_flags & EF_ARM_EABIMASK) >= EF_ARM_EABI_VER4;
77eec5571cSryo 
78eec5571cSryo 	/* OABI not support */
79eec5571cSryo 	if (!elf_aapcs_p)
80eec5571cSryo 		return ENOEXEC;
81ca3f8388Srin #ifdef __AARCH64EB__
82ca3f8388Srin 	/* BE32 not support */
83ca3f8388Srin 	if ((eh->e_flags & EF_ARM_BE8) == 0)
84ca3f8388Srin 		return ENOEXEC;
85ca3f8388Srin #endif
86eec5571cSryo 
870b6e5ae1Sryo 	/*
880b6e5ae1Sryo 	 * require aarch32 feature.
890b6e5ae1Sryo 	 * XXX should consider some cluster may have no aarch32?
900b6e5ae1Sryo 	 */
910b6e5ae1Sryo 	if (__SHIFTOUT(l->l_cpu->ci_id.ac_aa64pfr0, ID_AA64PFR0_EL1_EL0) !=
920b6e5ae1Sryo 	    ID_AA64PFR0_EL1_EL0_64_32)
930b6e5ae1Sryo 		return ENOEXEC;
940b6e5ae1Sryo 
95efe11b6bSrin 	/*
96efe11b6bSrin 	 * Copy (if any) the machine_arch of the executable to the proc.
97efe11b6bSrin 	 */
982189c453Srin 	CTASSERT(sizeof(l->l_proc->p_md.md_march32) ==
992189c453Srin 	    sizeof(epp->ep_machine_arch));
100efe11b6bSrin 	if (epp->ep_machine_arch[0] != 0)
101efe11b6bSrin 		strlcpy(l->l_proc->p_md.md_march32, epp->ep_machine_arch,
102efe11b6bSrin 		    sizeof(l->l_proc->p_md.md_march32));
103efe11b6bSrin 
104eec5571cSryo 	return 0;
105eec5571cSryo }
106eec5571cSryo #endif
107eec5571cSryo 
10867d1b467Smatt void
aarch64_setregs_ptrauth(struct lwp * l,bool randomize)109e433820cSryo aarch64_setregs_ptrauth(struct lwp *l, bool randomize)
110e433820cSryo {
111e433820cSryo #ifdef ARMV83_PAC
112e433820cSryo 	if (!aarch64_pac_enabled)
113e433820cSryo 		return;
114e433820cSryo 
115e433820cSryo 	if (randomize) {
116e433820cSryo 		cprng_strong(kern_cprng, l->l_md.md_ia_user,
117e433820cSryo 		    sizeof(l->l_md.md_ia_user), 0);
118e433820cSryo 		cprng_strong(kern_cprng, l->l_md.md_ib_user,
119e433820cSryo 		    sizeof(l->l_md.md_ib_user), 0);
120e433820cSryo 		cprng_strong(kern_cprng, l->l_md.md_da_user,
121e433820cSryo 		    sizeof(l->l_md.md_da_user), 0);
122e433820cSryo 		cprng_strong(kern_cprng, l->l_md.md_db_user,
123e433820cSryo 		    sizeof(l->l_md.md_db_user), 0);
124e433820cSryo 		cprng_strong(kern_cprng, l->l_md.md_ga_user,
125e433820cSryo 		    sizeof(l->l_md.md_ga_user), 0);
126e433820cSryo 	} else {
127e433820cSryo 		memset(l->l_md.md_ia_user, 0,
128e433820cSryo 		    sizeof(l->l_md.md_ia_user));
129e433820cSryo 		memset(l->l_md.md_ib_user, 0,
130e433820cSryo 		    sizeof(l->l_md.md_ib_user));
131e433820cSryo 		memset(l->l_md.md_da_user, 0,
132e433820cSryo 		    sizeof(l->l_md.md_da_user));
133e433820cSryo 		memset(l->l_md.md_db_user, 0,
134e433820cSryo 		    sizeof(l->l_md.md_db_user));
135e433820cSryo 		memset(l->l_md.md_ga_user, 0,
136e433820cSryo 		    sizeof(l->l_md.md_ga_user));
137e433820cSryo 	}
138e433820cSryo #endif
139e433820cSryo }
140e433820cSryo 
141e433820cSryo void
setregs(struct lwp * l,struct exec_package * pack,vaddr_t stack)14267d1b467Smatt setregs(struct lwp *l, struct exec_package *pack, vaddr_t stack)
14367d1b467Smatt {
14467d1b467Smatt 	struct proc * const p = l->l_proc;
145*7bb23874Sryo 	struct trapframe * const tf = lwp_trapframe(l);
14667d1b467Smatt 
147e433820cSryo 	aarch64_setregs_ptrauth(l, true);
148e433820cSryo 
149eec5571cSryo 	p->p_flag &= ~PK_32;
15067d1b467Smatt 
15167d1b467Smatt 	/*
15267d1b467Smatt 	 * void __start(void (*cleanup)(void), const Obj_Entry *obj,
15367d1b467Smatt 	 *    struct ps_strings *ps_strings);
15467d1b467Smatt 	 */
155eec5571cSryo 	memset(tf, 0, sizeof(*tf));
15667d1b467Smatt 	tf->tf_reg[2] = p->p_psstrp;
15767d1b467Smatt 	tf->tf_pc = pack->ep_entry;
15867d1b467Smatt 	tf->tf_sp = stack & -16L;
1598694f07cSryo 	tf->tf_spsr = SPSR_M_EL0T;
16067d1b467Smatt }
161