blob: 12627a376bf68090bf3187f944fd5b414ba8ca55 [file] [log] [blame]
Jon Medhurst221bf152011-04-20 10:52:38 +01001/*
2 * arch/arm/kernel/kprobes.h
3 *
Jon Medhurst0d1a0952011-04-26 15:15:56 +01004 * Copyright (C) 2011 Jon Medhurst <tixy@yxit.co.uk>.
5 *
6 * Some contents moved here from arch/arm/include/asm/kprobes.h which is
Jon Medhurst221bf152011-04-20 10:52:38 +01007 * Copyright (C) 2006, 2007 Motorola Inc.
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License version 2 as
11 * published by the Free Software Foundation.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * General Public License for more details.
17 */
18
19#ifndef _ARM_KERNEL_KPROBES_H
20#define _ARM_KERNEL_KPROBES_H
21
22/*
Jon Medhurstaceb4872011-04-19 17:18:35 +010023 * These undefined instructions must be unique and
Jon Medhurst221bf152011-04-20 10:52:38 +010024 * reserved solely for kprobes' use.
25 */
Jon Medhurst3b269452011-06-16 17:22:37 +010026#define KPROBE_ARM_BREAKPOINT_INSTRUCTION 0x07f001f8
Jon Medhurstaceb4872011-04-19 17:18:35 +010027#define KPROBE_THUMB16_BREAKPOINT_INSTRUCTION 0xde18
28#define KPROBE_THUMB32_BREAKPOINT_INSTRUCTION 0xf7f0a018
29
Jon Medhurst221bf152011-04-20 10:52:38 +010030
31enum kprobe_insn {
32 INSN_REJECTED,
33 INSN_GOOD,
34 INSN_GOOD_NO_SLOT
35};
36
Jon Medhurst24371702011-04-19 17:56:58 +010037typedef enum kprobe_insn (kprobe_decode_insn_t)(kprobe_opcode_t,
38 struct arch_specific_insn *);
39
40#ifdef CONFIG_THUMB2_KERNEL
41
42enum kprobe_insn thumb16_kprobe_decode_insn(kprobe_opcode_t,
43 struct arch_specific_insn *);
44enum kprobe_insn thumb32_kprobe_decode_insn(kprobe_opcode_t,
45 struct arch_specific_insn *);
46
47#else /* !CONFIG_THUMB2_KERNEL */
48
Jon Medhurst221bf152011-04-20 10:52:38 +010049enum kprobe_insn arm_kprobe_decode_insn(kprobe_opcode_t,
50 struct arch_specific_insn *);
Jon Medhurst24371702011-04-19 17:56:58 +010051#endif
Jon Medhurst221bf152011-04-20 10:52:38 +010052
53void __init arm_kprobe_decode_init(void);
54
Jon Medhurst0ab4c022011-07-06 11:25:18 +010055extern kprobe_check_cc * const kprobe_condition_checks[16];
56
Jon Medhurstaea49022011-07-07 19:58:29 +010057
58#if __LINUX_ARM_ARCH__ >= 7
59
60/* str_pc_offset is architecturally defined from ARMv7 onwards */
61#define str_pc_offset 8
62#define find_str_pc_offset()
63
64#else /* __LINUX_ARM_ARCH__ < 7 */
65
66/* We need a run-time check to determine str_pc_offset */
Jon Medhurst6c8df332011-07-07 10:21:40 +010067extern int str_pc_offset;
Jon Medhurstaea49022011-07-07 19:58:29 +010068void __init find_str_pc_offset(void);
69
70#endif
71
Jon Medhurst6c8df332011-07-07 10:21:40 +010072
Jon Medhurst1b59d872011-07-06 20:33:41 +010073/*
Jon Medhurst6aaa8b52011-06-16 14:53:56 +010074 * Update ITSTATE after normal execution of an IT block instruction.
75 *
76 * The 8 IT state bits are split into two parts in CPSR:
77 * ITSTATE<1:0> are in CPSR<26:25>
78 * ITSTATE<7:2> are in CPSR<15:10>
79 */
80static inline unsigned long it_advance(unsigned long cpsr)
81 {
82 if ((cpsr & 0x06000400) == 0) {
83 /* ITSTATE<2:0> == 0 means end of IT block, so clear IT state */
84 cpsr &= ~PSR_IT_MASK;
85 } else {
86 /* We need to shift left ITSTATE<4:0> */
87 const unsigned long mask = 0x06001c00; /* Mask ITSTATE<4:0> */
88 unsigned long it = cpsr & mask;
89 it <<= 1;
90 it |= it >> (27 - 10); /* Carry ITSTATE<2> to correct place */
91 it &= mask;
92 cpsr &= ~mask;
93 cpsr |= it;
94 }
95 return cpsr;
96}
97
Jon Medhurst059987f2011-06-09 11:01:54 +010098static inline void __kprobes bx_write_pc(long pcv, struct pt_regs *regs)
99{
100 long cpsr = regs->ARM_cpsr;
101 if (pcv & 0x1) {
102 cpsr |= PSR_T_BIT;
103 pcv &= ~0x1;
104 } else {
105 cpsr &= ~PSR_T_BIT;
106 pcv &= ~0x2; /* Avoid UNPREDICTABLE address allignment */
107 }
108 regs->ARM_cpsr = cpsr;
109 regs->ARM_pc = pcv;
110}
111
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100112void __kprobes kprobe_simulate_nop(struct kprobe *p, struct pt_regs *regs);
113void __kprobes kprobe_emulate_none(struct kprobe *p, struct pt_regs *regs);
114
Jon Medhurst6aaa8b52011-06-16 14:53:56 +0100115/*
Jon Medhurst1b59d872011-07-06 20:33:41 +0100116 * Test if load/store instructions writeback the address register.
117 * if P (bit 24) == 0 or W (bit 21) == 1
118 */
119#define is_writeback(insn) ((insn ^ 0x01000000) & 0x01200000)
120
Jon Medhurst0d1a0952011-04-26 15:15:56 +0100121/*
122 * The following definitions and macros are used to build instruction
123 * decoding tables for use by kprobe_decode_insn.
124 *
125 * These tables are a concatenation of entries each of which consist of one of
126 * the decode_* structs. All of the fields in every type of decode structure
127 * are of the union type decode_item, therefore the entire decode table can be
128 * viewed as an array of these and declared like:
129 *
130 * static const union decode_item table_name[] = {};
131 *
132 * In order to construct each entry in the table, macros are used to
133 * initialise a number of sequential decode_item values in a layout which
134 * matches the relevant struct. E.g. DECODE_SIMULATE initialise a struct
135 * decode_simulate by initialising four decode_item objects like this...
136 *
137 * {.bits = _type},
138 * {.bits = _mask},
139 * {.bits = _value},
140 * {.handler = _handler},
141 *
142 * Initialising a specified member of the union means that the compiler
143 * will produce a warning if the argument is of an incorrect type.
144 *
145 * Below is a list of each of the macros used to initialise entries and a
146 * description of the action performed when that entry is matched to an
147 * instruction. A match is found when (instruction & mask) == value.
148 *
149 * DECODE_TABLE(mask, value, table)
150 * Instruction decoding jumps to parsing the new sub-table 'table'.
151 *
152 * DECODE_CUSTOM(mask, value, decoder)
153 * The custom function 'decoder' is called to the complete decoding
154 * of an instruction.
155 *
156 * DECODE_SIMULATE(mask, value, handler)
157 * Set the probes instruction handler to 'handler', this will be used
158 * to simulate the instruction when the probe is hit. Decoding returns
159 * with INSN_GOOD_NO_SLOT.
160 *
161 * DECODE_EMULATE(mask, value, handler)
162 * Set the probes instruction handler to 'handler', this will be used
163 * to emulate the instruction when the probe is hit. The modified
164 * instruction (see below) is placed in the probes instruction slot so it
165 * may be called by the emulation code. Decoding returns with INSN_GOOD.
166 *
167 * DECODE_REJECT(mask, value)
168 * Instruction decoding fails with INSN_REJECTED
169 *
170 * DECODE_OR(mask, value)
171 * This allows the mask/value test of multiple table entries to be
172 * logically ORed. Once an 'or' entry is matched the decoding action to
173 * be performed is that of the next entry which isn't an 'or'. E.g.
174 *
175 * DECODE_OR (mask1, value1)
176 * DECODE_OR (mask2, value2)
177 * DECODE_SIMULATE (mask3, value3, simulation_handler)
178 *
179 * This means that if any of the three mask/value pairs match the
180 * instruction being decoded, then 'simulation_handler' will be used
181 * for it.
182 *
183 * Both the SIMULATE and EMULATE macros have a second form which take an
184 * additional 'regs' argument.
185 *
186 * DECODE_SIMULATEX(mask, value, handler, regs)
187 * DECODE_EMULATEX (mask, value, handler, regs)
188 *
189 * These are used to specify what kind of CPU register is encoded in each of the
190 * least significant 5 nibbles of the instruction being decoded. The regs value
191 * is specified using the REGS macro, this takes any of the REG_TYPE_* values
192 * from enum decode_reg_type as arguments; only the '*' part of the name is
193 * given. E.g.
194 *
195 * REGS(0, ANY, NOPC, 0, ANY)
196 *
197 * This indicates an instruction is encoded like:
198 *
199 * bits 19..16 ignore
200 * bits 15..12 any register allowed here
201 * bits 11.. 8 any register except PC allowed here
202 * bits 7.. 4 ignore
203 * bits 3.. 0 any register allowed here
204 *
205 * This register specification is checked after a decode table entry is found to
206 * match an instruction (through the mask/value test). Any invalid register then
207 * found in the instruction will cause decoding to fail with INSN_REJECTED. In
208 * the above example this would happen if bits 11..8 of the instruction were
209 * 1111, indicating R15 or PC.
210 *
211 * As well as checking for legal combinations of registers, this data is also
212 * used to modify the registers encoded in the instructions so that an
213 * emulation routines can use it. (See decode_regs() and INSN_NEW_BITS.)
214 *
215 * Here is a real example which matches ARM instructions of the form
216 * "AND <Rd>,<Rn>,<Rm>,<shift> <Rs>"
217 *
218 * DECODE_EMULATEX (0x0e000090, 0x00000010, emulate_rd12rn16rm0rs8_rwflags,
219 * REGS(ANY, ANY, NOPC, 0, ANY)),
220 * ^ ^ ^ ^
221 * Rn Rd Rs Rm
222 *
223 * Decoding the instruction "AND R4, R5, R6, ASL R15" will be rejected because
224 * Rs == R15
225 *
226 * Decoding the instruction "AND R4, R5, R6, ASL R7" will be accepted and the
227 * instruction will be modified to "AND R0, R2, R3, ASL R1" and then placed into
228 * the kprobes instruction slot. This can then be called later by the handler
229 * function emulate_rd12rn16rm0rs8_rwflags in order to simulate the instruction.
230 */
231
232enum decode_type {
233 DECODE_TYPE_END,
234 DECODE_TYPE_TABLE,
235 DECODE_TYPE_CUSTOM,
236 DECODE_TYPE_SIMULATE,
237 DECODE_TYPE_EMULATE,
238 DECODE_TYPE_OR,
239 DECODE_TYPE_REJECT,
240 NUM_DECODE_TYPES /* Must be last enum */
241};
242
243#define DECODE_TYPE_BITS 4
244#define DECODE_TYPE_MASK ((1 << DECODE_TYPE_BITS) - 1)
245
246enum decode_reg_type {
247 REG_TYPE_NONE = 0, /* Not a register, ignore */
248 REG_TYPE_ANY, /* Any register allowed */
249 REG_TYPE_SAMEAS16, /* Register should be same as that at bits 19..16 */
250 REG_TYPE_SP, /* Register must be SP */
251 REG_TYPE_PC, /* Register must be PC */
252 REG_TYPE_NOSP, /* Register must not be SP */
253 REG_TYPE_NOSPPC, /* Register must not be SP or PC */
254 REG_TYPE_NOPC, /* Register must not be PC */
255 REG_TYPE_NOPCWB, /* No PC if load/store write-back flag also set */
256
257 /* The following types are used when the encoding for PC indicates
258 * another instruction form. This distiction only matters for test
259 * case coverage checks.
260 */
261 REG_TYPE_NOPCX, /* Register must not be PC */
262 REG_TYPE_NOSPPCX, /* Register must not be SP or PC */
263
264 /* Alias to allow '0' arg to be used in REGS macro. */
265 REG_TYPE_0 = REG_TYPE_NONE
266};
267
268#define REGS(r16, r12, r8, r4, r0) \
269 ((REG_TYPE_##r16) << 16) + \
270 ((REG_TYPE_##r12) << 12) + \
271 ((REG_TYPE_##r8) << 8) + \
272 ((REG_TYPE_##r4) << 4) + \
273 (REG_TYPE_##r0)
274
275union decode_item {
276 u32 bits;
277 const union decode_item *table;
278 kprobe_insn_handler_t *handler;
279 kprobe_decode_insn_t *decoder;
280};
281
282
283#define DECODE_END \
284 {.bits = DECODE_TYPE_END}
285
286
287struct decode_header {
288 union decode_item type_regs;
289 union decode_item mask;
290 union decode_item value;
291};
292
293#define DECODE_HEADER(_type, _mask, _value, _regs) \
294 {.bits = (_type) | ((_regs) << DECODE_TYPE_BITS)}, \
295 {.bits = (_mask)}, \
296 {.bits = (_value)}
297
298
299struct decode_table {
300 struct decode_header header;
301 union decode_item table;
302};
303
304#define DECODE_TABLE(_mask, _value, _table) \
305 DECODE_HEADER(DECODE_TYPE_TABLE, _mask, _value, 0), \
306 {.table = (_table)}
307
308
309struct decode_custom {
310 struct decode_header header;
311 union decode_item decoder;
312};
313
314#define DECODE_CUSTOM(_mask, _value, _decoder) \
315 DECODE_HEADER(DECODE_TYPE_CUSTOM, _mask, _value, 0), \
316 {.decoder = (_decoder)}
317
318
319struct decode_simulate {
320 struct decode_header header;
321 union decode_item handler;
322};
323
324#define DECODE_SIMULATEX(_mask, _value, _handler, _regs) \
325 DECODE_HEADER(DECODE_TYPE_SIMULATE, _mask, _value, _regs), \
326 {.handler = (_handler)}
327
328#define DECODE_SIMULATE(_mask, _value, _handler) \
329 DECODE_SIMULATEX(_mask, _value, _handler, 0)
330
331
332struct decode_emulate {
333 struct decode_header header;
334 union decode_item handler;
335};
336
337#define DECODE_EMULATEX(_mask, _value, _handler, _regs) \
338 DECODE_HEADER(DECODE_TYPE_EMULATE, _mask, _value, _regs), \
339 {.handler = (_handler)}
340
341#define DECODE_EMULATE(_mask, _value, _handler) \
342 DECODE_EMULATEX(_mask, _value, _handler, 0)
343
344
345struct decode_or {
346 struct decode_header header;
347};
348
349#define DECODE_OR(_mask, _value) \
350 DECODE_HEADER(DECODE_TYPE_OR, _mask, _value, 0)
351
352
353struct decode_reject {
354 struct decode_header header;
355};
356
357#define DECODE_REJECT(_mask, _value) \
358 DECODE_HEADER(DECODE_TYPE_REJECT, _mask, _value, 0)
359
360
361int kprobe_decode_insn(kprobe_opcode_t insn, struct arch_specific_insn *asi,
362 const union decode_item *table, bool thumb16);
363
364
Jon Medhurst221bf152011-04-20 10:52:38 +0100365#endif /* _ARM_KERNEL_KPROBES_H */