blob: 1677234000b2a11c4d7759eaf6530703e6004431 [file] [log] [blame]
Jon Medhurst24371702011-04-19 17:56:58 +01001/*
2 * arch/arm/kernel/kprobes-thumb.c
3 *
4 * Copyright (C) 2011 Jon Medhurst <tixy@yxit.co.uk>.
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 */
10
11#include <linux/kernel.h>
12#include <linux/kprobes.h>
13
14#include "kprobes.h"
15
Jon Medhursteaf4f33f2011-04-20 19:29:52 +010016
17/*
18 * True if current instruction is in an IT block.
19 */
20#define in_it_block(cpsr) ((cpsr & 0x06000c00) != 0x00000000)
21
22/*
23 * Return the condition code to check for the currently executing instruction.
24 * This is in ITSTATE<7:4> which is in CPSR<15:12> but is only valid if
25 * in_it_block returns true.
26 */
27#define current_cond(cpsr) ((cpsr >> 12) & 0xf)
28
Jon Medhursta9c3c292011-07-02 15:51:03 +010029/*
30 * Return the PC value for a probe in thumb code.
31 * This is the address of the probed instruction plus 4.
32 * We subtract one because the address will have bit zero set to indicate
33 * a pointer to thumb code.
34 */
35static inline unsigned long __kprobes thumb_probe_pc(struct kprobe *p)
36{
37 return (unsigned long)p->addr - 1 + 4;
38}
39
Jon Medhurstdd212bd2011-07-03 14:26:16 +010040static void __kprobes
41t32_simulate_table_branch(struct kprobe *p, struct pt_regs *regs)
42{
43 kprobe_opcode_t insn = p->opcode;
44 unsigned long pc = thumb_probe_pc(p);
45 int rn = (insn >> 16) & 0xf;
46 int rm = insn & 0xf;
47
48 unsigned long rnv = (rn == 15) ? pc : regs->uregs[rn];
49 unsigned long rmv = regs->uregs[rm];
50 unsigned int halfwords;
51
Jon Medhurstce715c72011-07-03 14:53:45 +010052 if (insn & 0x10) /* TBH */
Jon Medhurstdd212bd2011-07-03 14:26:16 +010053 halfwords = ((u16 *)rnv)[rmv];
Jon Medhurstce715c72011-07-03 14:53:45 +010054 else /* TBB */
Jon Medhurstdd212bd2011-07-03 14:26:16 +010055 halfwords = ((u8 *)rnv)[rmv];
56
57 regs->ARM_pc = pc + 2 * halfwords;
58}
59
Jon Medhurstb06f3ee2011-07-03 14:52:18 +010060static void __kprobes
61t32_simulate_mrs(struct kprobe *p, struct pt_regs *regs)
62{
63 kprobe_opcode_t insn = p->opcode;
64 int rd = (insn >> 8) & 0xf;
65 unsigned long mask = 0xf8ff03df; /* Mask out execution state */
66 regs->uregs[rd] = regs->ARM_cpsr & mask;
67}
68
Jon Medhurstce715c72011-07-03 14:53:45 +010069static void __kprobes
70t32_simulate_cond_branch(struct kprobe *p, struct pt_regs *regs)
71{
72 kprobe_opcode_t insn = p->opcode;
73 unsigned long pc = thumb_probe_pc(p);
74
75 long offset = insn & 0x7ff; /* imm11 */
76 offset += (insn & 0x003f0000) >> 5; /* imm6 */
77 offset += (insn & 0x00002000) << 4; /* J1 */
78 offset += (insn & 0x00000800) << 7; /* J2 */
79 offset -= (insn & 0x04000000) >> 7; /* Apply sign bit */
80
81 regs->ARM_pc = pc + (offset * 2);
82}
83
84static enum kprobe_insn __kprobes
85t32_decode_cond_branch(kprobe_opcode_t insn, struct arch_specific_insn *asi)
86{
87 int cc = (insn >> 22) & 0xf;
88 asi->insn_check_cc = kprobe_condition_checks[cc];
89 asi->insn_handler = t32_simulate_cond_branch;
90 return INSN_GOOD_NO_SLOT;
91}
92
93static void __kprobes
94t32_simulate_branch(struct kprobe *p, struct pt_regs *regs)
95{
96 kprobe_opcode_t insn = p->opcode;
97 unsigned long pc = thumb_probe_pc(p);
98
99 long offset = insn & 0x7ff; /* imm11 */
100 offset += (insn & 0x03ff0000) >> 5; /* imm10 */
101 offset += (insn & 0x00002000) << 9; /* J1 */
102 offset += (insn & 0x00000800) << 10; /* J2 */
103 if (insn & 0x04000000)
104 offset -= 0x00800000; /* Apply sign bit */
105 else
106 offset ^= 0x00600000; /* Invert J1 and J2 */
107
108 if (insn & (1 << 14)) {
109 /* BL or BLX */
110 regs->ARM_lr = (unsigned long)p->addr + 4;
111 if (!(insn & (1 << 12))) {
112 /* BLX so switch to ARM mode */
113 regs->ARM_cpsr &= ~PSR_T_BIT;
114 pc &= ~3;
115 }
116 }
117
118 regs->ARM_pc = pc + (offset * 2);
119}
120
Jon Medhursteaf1d062011-07-07 08:59:32 +0100121static enum kprobe_insn __kprobes
122t32_decode_ldmstm(kprobe_opcode_t insn, struct arch_specific_insn *asi)
123{
124 enum kprobe_insn ret = kprobe_decode_ldmstm(insn, asi);
125
126 /* Fixup modified instruction to have halfwords in correct order...*/
127 insn = asi->insn[0];
128 ((u16 *)asi->insn)[0] = insn >> 16;
129 ((u16 *)asi->insn)[1] = insn & 0xffff;
130
131 return ret;
132}
133
Jon Medhurstb48354d2011-07-03 14:23:21 +0100134static void __kprobes
135t32_emulate_ldrdstrd(struct kprobe *p, struct pt_regs *regs)
136{
137 kprobe_opcode_t insn = p->opcode;
138 unsigned long pc = thumb_probe_pc(p) & ~3;
139 int rt1 = (insn >> 12) & 0xf;
140 int rt2 = (insn >> 8) & 0xf;
141 int rn = (insn >> 16) & 0xf;
142
143 register unsigned long rt1v asm("r0") = regs->uregs[rt1];
144 register unsigned long rt2v asm("r1") = regs->uregs[rt2];
145 register unsigned long rnv asm("r2") = (rn == 15) ? pc
146 : regs->uregs[rn];
147
148 __asm__ __volatile__ (
149 "blx %[fn]"
150 : "=r" (rt1v), "=r" (rt2v), "=r" (rnv)
151 : "0" (rt1v), "1" (rt2v), "2" (rnv), [fn] "r" (p->ainsn.insn_fn)
152 : "lr", "memory", "cc"
153 );
154
155 if (rn != 15)
156 regs->uregs[rn] = rnv; /* Writeback base register */
157 regs->uregs[rt1] = rt1v;
158 regs->uregs[rt2] = rt2v;
159}
160
Jon Medhurst080e0012011-07-03 14:31:58 +0100161static void __kprobes
162t32_emulate_rd8rn16rm0_rwflags(struct kprobe *p, struct pt_regs *regs)
163{
164 kprobe_opcode_t insn = p->opcode;
165 int rd = (insn >> 8) & 0xf;
166 int rn = (insn >> 16) & 0xf;
167 int rm = insn & 0xf;
168
169 register unsigned long rdv asm("r1") = regs->uregs[rd];
170 register unsigned long rnv asm("r2") = regs->uregs[rn];
171 register unsigned long rmv asm("r3") = regs->uregs[rm];
172 unsigned long cpsr = regs->ARM_cpsr;
173
174 __asm__ __volatile__ (
175 "msr cpsr_fs, %[cpsr] \n\t"
176 "blx %[fn] \n\t"
177 "mrs %[cpsr], cpsr \n\t"
178 : "=r" (rdv), [cpsr] "=r" (cpsr)
179 : "0" (rdv), "r" (rnv), "r" (rmv),
180 "1" (cpsr), [fn] "r" (p->ainsn.insn_fn)
181 : "lr", "memory", "cc"
182 );
183
184 regs->uregs[rd] = rdv;
185 regs->ARM_cpsr = (regs->ARM_cpsr & ~APSR_MASK) | (cpsr & APSR_MASK);
186}
187
Jon Medhurst78487862011-07-03 14:40:26 +0100188static void __kprobes
189t32_emulate_rd8pc16_noflags(struct kprobe *p, struct pt_regs *regs)
190{
191 kprobe_opcode_t insn = p->opcode;
192 unsigned long pc = thumb_probe_pc(p);
193 int rd = (insn >> 8) & 0xf;
194
195 register unsigned long rdv asm("r1") = regs->uregs[rd];
196 register unsigned long rnv asm("r2") = pc & ~3;
197
198 __asm__ __volatile__ (
199 "blx %[fn]"
200 : "=r" (rdv)
201 : "0" (rdv), "r" (rnv), [fn] "r" (p->ainsn.insn_fn)
202 : "lr", "memory", "cc"
203 );
204
205 regs->uregs[rd] = rdv;
206}
207
208static void __kprobes
209t32_emulate_rd8rn16_noflags(struct kprobe *p, struct pt_regs *regs)
210{
211 kprobe_opcode_t insn = p->opcode;
212 int rd = (insn >> 8) & 0xf;
213 int rn = (insn >> 16) & 0xf;
214
215 register unsigned long rdv asm("r1") = regs->uregs[rd];
216 register unsigned long rnv asm("r2") = regs->uregs[rn];
217
218 __asm__ __volatile__ (
219 "blx %[fn]"
220 : "=r" (rdv)
221 : "0" (rdv), "r" (rnv), [fn] "r" (p->ainsn.insn_fn)
222 : "lr", "memory", "cc"
223 );
224
225 regs->uregs[rd] = rdv;
226}
227
Jon Medhursteaf1d062011-07-07 08:59:32 +0100228static const union decode_item t32_table_1110_100x_x0xx[] = {
229 /* Load/store multiple instructions */
230
231 /* Rn is PC 1110 100x x0xx 1111 xxxx xxxx xxxx xxxx */
232 DECODE_REJECT (0xfe4f0000, 0xe80f0000),
233
234 /* SRS 1110 1000 00x0 xxxx xxxx xxxx xxxx xxxx */
235 /* RFE 1110 1000 00x1 xxxx xxxx xxxx xxxx xxxx */
236 DECODE_REJECT (0xffc00000, 0xe8000000),
237 /* SRS 1110 1001 10x0 xxxx xxxx xxxx xxxx xxxx */
238 /* RFE 1110 1001 10x1 xxxx xxxx xxxx xxxx xxxx */
239 DECODE_REJECT (0xffc00000, 0xe9800000),
240
241 /* STM Rn, {...pc} 1110 100x x0x0 xxxx 1xxx xxxx xxxx xxxx */
242 DECODE_REJECT (0xfe508000, 0xe8008000),
243 /* LDM Rn, {...lr,pc} 1110 100x x0x1 xxxx 11xx xxxx xxxx xxxx */
244 DECODE_REJECT (0xfe50c000, 0xe810c000),
245 /* LDM/STM Rn, {...sp} 1110 100x x0xx xxxx xx1x xxxx xxxx xxxx */
246 DECODE_REJECT (0xfe402000, 0xe8002000),
247
248 /* STMIA 1110 1000 10x0 xxxx xxxx xxxx xxxx xxxx */
249 /* LDMIA 1110 1000 10x1 xxxx xxxx xxxx xxxx xxxx */
250 /* STMDB 1110 1001 00x0 xxxx xxxx xxxx xxxx xxxx */
251 /* LDMDB 1110 1001 00x1 xxxx xxxx xxxx xxxx xxxx */
252 DECODE_CUSTOM (0xfe400000, 0xe8000000, t32_decode_ldmstm),
253
254 DECODE_END
255};
256
Jon Medhurstb48354d2011-07-03 14:23:21 +0100257static const union decode_item t32_table_1110_100x_x1xx[] = {
258 /* Load/store dual, load/store exclusive, table branch */
259
260 /* STRD (immediate) 1110 1000 x110 xxxx xxxx xxxx xxxx xxxx */
261 /* LDRD (immediate) 1110 1000 x111 xxxx xxxx xxxx xxxx xxxx */
262 DECODE_OR (0xff600000, 0xe8600000),
263 /* STRD (immediate) 1110 1001 x1x0 xxxx xxxx xxxx xxxx xxxx */
264 /* LDRD (immediate) 1110 1001 x1x1 xxxx xxxx xxxx xxxx xxxx */
265 DECODE_EMULATEX (0xff400000, 0xe9400000, t32_emulate_ldrdstrd,
266 REGS(NOPCWB, NOSPPC, NOSPPC, 0, 0)),
267
Jon Medhurstdd212bd2011-07-03 14:26:16 +0100268 /* TBB 1110 1000 1101 xxxx xxxx xxxx 0000 xxxx */
269 /* TBH 1110 1000 1101 xxxx xxxx xxxx 0001 xxxx */
270 DECODE_SIMULATEX(0xfff000e0, 0xe8d00000, t32_simulate_table_branch,
271 REGS(NOSP, 0, 0, 0, NOSPPC)),
272
Jon Medhurstb48354d2011-07-03 14:23:21 +0100273 /* STREX 1110 1000 0100 xxxx xxxx xxxx xxxx xxxx */
274 /* LDREX 1110 1000 0101 xxxx xxxx xxxx xxxx xxxx */
275 /* STREXB 1110 1000 1100 xxxx xxxx xxxx 0100 xxxx */
276 /* STREXH 1110 1000 1100 xxxx xxxx xxxx 0101 xxxx */
277 /* STREXD 1110 1000 1100 xxxx xxxx xxxx 0111 xxxx */
278 /* LDREXB 1110 1000 1101 xxxx xxxx xxxx 0100 xxxx */
279 /* LDREXH 1110 1000 1101 xxxx xxxx xxxx 0101 xxxx */
280 /* LDREXD 1110 1000 1101 xxxx xxxx xxxx 0111 xxxx */
281 /* And unallocated instructions... */
282 DECODE_END
283};
284
Jon Medhurst080e0012011-07-03 14:31:58 +0100285static const union decode_item t32_table_1110_101x[] = {
286 /* Data-processing (shifted register) */
287
288 /* TST 1110 1010 0001 xxxx xxxx 1111 xxxx xxxx */
289 /* TEQ 1110 1010 1001 xxxx xxxx 1111 xxxx xxxx */
290 DECODE_EMULATEX (0xff700f00, 0xea100f00, t32_emulate_rd8rn16rm0_rwflags,
291 REGS(NOSPPC, 0, 0, 0, NOSPPC)),
292
293 /* CMN 1110 1011 0001 xxxx xxxx 1111 xxxx xxxx */
294 DECODE_OR (0xfff00f00, 0xeb100f00),
295 /* CMP 1110 1011 1011 xxxx xxxx 1111 xxxx xxxx */
296 DECODE_EMULATEX (0xfff00f00, 0xebb00f00, t32_emulate_rd8rn16rm0_rwflags,
297 REGS(NOPC, 0, 0, 0, NOSPPC)),
298
299 /* MOV 1110 1010 010x 1111 xxxx xxxx xxxx xxxx */
300 /* MVN 1110 1010 011x 1111 xxxx xxxx xxxx xxxx */
301 DECODE_EMULATEX (0xffcf0000, 0xea4f0000, t32_emulate_rd8rn16rm0_rwflags,
302 REGS(0, 0, NOSPPC, 0, NOSPPC)),
303
304 /* ??? 1110 1010 101x xxxx xxxx xxxx xxxx xxxx */
305 /* ??? 1110 1010 111x xxxx xxxx xxxx xxxx xxxx */
306 DECODE_REJECT (0xffa00000, 0xeaa00000),
307 /* ??? 1110 1011 001x xxxx xxxx xxxx xxxx xxxx */
308 DECODE_REJECT (0xffe00000, 0xeb200000),
309 /* ??? 1110 1011 100x xxxx xxxx xxxx xxxx xxxx */
310 DECODE_REJECT (0xffe00000, 0xeb800000),
311 /* ??? 1110 1011 111x xxxx xxxx xxxx xxxx xxxx */
312 DECODE_REJECT (0xffe00000, 0xebe00000),
313
314 /* ADD/SUB SP, SP, Rm, LSL #0..3 */
315 /* 1110 1011 x0xx 1101 x000 1101 xx00 xxxx */
316 DECODE_EMULATEX (0xff4f7f30, 0xeb0d0d00, t32_emulate_rd8rn16rm0_rwflags,
317 REGS(SP, 0, SP, 0, NOSPPC)),
318
319 /* ADD/SUB SP, SP, Rm, shift */
320 /* 1110 1011 x0xx 1101 xxxx 1101 xxxx xxxx */
321 DECODE_REJECT (0xff4f0f00, 0xeb0d0d00),
322
323 /* ADD/SUB Rd, SP, Rm, shift */
324 /* 1110 1011 x0xx 1101 xxxx xxxx xxxx xxxx */
325 DECODE_EMULATEX (0xff4f0000, 0xeb0d0000, t32_emulate_rd8rn16rm0_rwflags,
326 REGS(SP, 0, NOPC, 0, NOSPPC)),
327
328 /* AND 1110 1010 000x xxxx xxxx xxxx xxxx xxxx */
329 /* BIC 1110 1010 001x xxxx xxxx xxxx xxxx xxxx */
330 /* ORR 1110 1010 010x xxxx xxxx xxxx xxxx xxxx */
331 /* ORN 1110 1010 011x xxxx xxxx xxxx xxxx xxxx */
332 /* EOR 1110 1010 100x xxxx xxxx xxxx xxxx xxxx */
333 /* PKH 1110 1010 110x xxxx xxxx xxxx xxxx xxxx */
334 /* ADD 1110 1011 000x xxxx xxxx xxxx xxxx xxxx */
335 /* ADC 1110 1011 010x xxxx xxxx xxxx xxxx xxxx */
336 /* SBC 1110 1011 011x xxxx xxxx xxxx xxxx xxxx */
337 /* SUB 1110 1011 101x xxxx xxxx xxxx xxxx xxxx */
338 /* RSB 1110 1011 110x xxxx xxxx xxxx xxxx xxxx */
339 DECODE_EMULATEX (0xfe000000, 0xea000000, t32_emulate_rd8rn16rm0_rwflags,
340 REGS(NOSPPC, 0, NOSPPC, 0, NOSPPC)),
341
342 DECODE_END
343};
344
Jon Medhurst2fcaf7e2011-07-03 14:36:35 +0100345static const union decode_item t32_table_1111_0x0x___0[] = {
346 /* Data-processing (modified immediate) */
347
348 /* TST 1111 0x00 0001 xxxx 0xxx 1111 xxxx xxxx */
349 /* TEQ 1111 0x00 1001 xxxx 0xxx 1111 xxxx xxxx */
350 DECODE_EMULATEX (0xfb708f00, 0xf0100f00, t32_emulate_rd8rn16rm0_rwflags,
351 REGS(NOSPPC, 0, 0, 0, 0)),
352
353 /* CMN 1111 0x01 0001 xxxx 0xxx 1111 xxxx xxxx */
354 DECODE_OR (0xfbf08f00, 0xf1100f00),
355 /* CMP 1111 0x01 1011 xxxx 0xxx 1111 xxxx xxxx */
356 DECODE_EMULATEX (0xfbf08f00, 0xf1b00f00, t32_emulate_rd8rn16rm0_rwflags,
357 REGS(NOPC, 0, 0, 0, 0)),
358
359 /* MOV 1111 0x00 010x 1111 0xxx xxxx xxxx xxxx */
360 /* MVN 1111 0x00 011x 1111 0xxx xxxx xxxx xxxx */
361 DECODE_EMULATEX (0xfbcf8000, 0xf04f0000, t32_emulate_rd8rn16rm0_rwflags,
362 REGS(0, 0, NOSPPC, 0, 0)),
363
364 /* ??? 1111 0x00 101x xxxx 0xxx xxxx xxxx xxxx */
365 DECODE_REJECT (0xfbe08000, 0xf0a00000),
366 /* ??? 1111 0x00 110x xxxx 0xxx xxxx xxxx xxxx */
367 /* ??? 1111 0x00 111x xxxx 0xxx xxxx xxxx xxxx */
368 DECODE_REJECT (0xfbc08000, 0xf0c00000),
369 /* ??? 1111 0x01 001x xxxx 0xxx xxxx xxxx xxxx */
370 DECODE_REJECT (0xfbe08000, 0xf1200000),
371 /* ??? 1111 0x01 100x xxxx 0xxx xxxx xxxx xxxx */
372 DECODE_REJECT (0xfbe08000, 0xf1800000),
373 /* ??? 1111 0x01 111x xxxx 0xxx xxxx xxxx xxxx */
374 DECODE_REJECT (0xfbe08000, 0xf1e00000),
375
376 /* ADD Rd, SP, #imm 1111 0x01 000x 1101 0xxx xxxx xxxx xxxx */
377 /* SUB Rd, SP, #imm 1111 0x01 101x 1101 0xxx xxxx xxxx xxxx */
378 DECODE_EMULATEX (0xfb4f8000, 0xf10d0000, t32_emulate_rd8rn16rm0_rwflags,
379 REGS(SP, 0, NOPC, 0, 0)),
380
381 /* AND 1111 0x00 000x xxxx 0xxx xxxx xxxx xxxx */
382 /* BIC 1111 0x00 001x xxxx 0xxx xxxx xxxx xxxx */
383 /* ORR 1111 0x00 010x xxxx 0xxx xxxx xxxx xxxx */
384 /* ORN 1111 0x00 011x xxxx 0xxx xxxx xxxx xxxx */
385 /* EOR 1111 0x00 100x xxxx 0xxx xxxx xxxx xxxx */
386 /* ADD 1111 0x01 000x xxxx 0xxx xxxx xxxx xxxx */
387 /* ADC 1111 0x01 010x xxxx 0xxx xxxx xxxx xxxx */
388 /* SBC 1111 0x01 011x xxxx 0xxx xxxx xxxx xxxx */
389 /* SUB 1111 0x01 101x xxxx 0xxx xxxx xxxx xxxx */
390 /* RSB 1111 0x01 110x xxxx 0xxx xxxx xxxx xxxx */
391 DECODE_EMULATEX (0xfa008000, 0xf0000000, t32_emulate_rd8rn16rm0_rwflags,
392 REGS(NOSPPC, 0, NOSPPC, 0, 0)),
393
394 DECODE_END
395};
396
Jon Medhurst78487862011-07-03 14:40:26 +0100397static const union decode_item t32_table_1111_0x1x___0[] = {
398 /* Data-processing (plain binary immediate) */
399
400 /* ADDW Rd, PC, #imm 1111 0x10 0000 1111 0xxx xxxx xxxx xxxx */
401 DECODE_OR (0xfbff8000, 0xf20f0000),
402 /* SUBW Rd, PC, #imm 1111 0x10 1010 1111 0xxx xxxx xxxx xxxx */
403 DECODE_EMULATEX (0xfbff8000, 0xf2af0000, t32_emulate_rd8pc16_noflags,
404 REGS(PC, 0, NOSPPC, 0, 0)),
405
406 /* ADDW SP, SP, #imm 1111 0x10 0000 1101 0xxx 1101 xxxx xxxx */
407 DECODE_OR (0xfbff8f00, 0xf20d0d00),
408 /* SUBW SP, SP, #imm 1111 0x10 1010 1101 0xxx 1101 xxxx xxxx */
409 DECODE_EMULATEX (0xfbff8f00, 0xf2ad0d00, t32_emulate_rd8rn16_noflags,
410 REGS(SP, 0, SP, 0, 0)),
411
412 /* ADDW 1111 0x10 0000 xxxx 0xxx xxxx xxxx xxxx */
413 DECODE_OR (0xfbf08000, 0xf2000000),
414 /* SUBW 1111 0x10 1010 xxxx 0xxx xxxx xxxx xxxx */
415 DECODE_EMULATEX (0xfbf08000, 0xf2a00000, t32_emulate_rd8rn16_noflags,
416 REGS(NOPCX, 0, NOSPPC, 0, 0)),
417
418 /* MOVW 1111 0x10 0100 xxxx 0xxx xxxx xxxx xxxx */
419 /* MOVT 1111 0x10 1100 xxxx 0xxx xxxx xxxx xxxx */
420 DECODE_EMULATEX (0xfb708000, 0xf2400000, t32_emulate_rd8rn16_noflags,
421 REGS(0, 0, NOSPPC, 0, 0)),
422
423 /* SSAT16 1111 0x11 0010 xxxx 0000 xxxx 00xx xxxx */
424 /* SSAT 1111 0x11 00x0 xxxx 0xxx xxxx xxxx xxxx */
425 /* USAT16 1111 0x11 1010 xxxx 0000 xxxx 00xx xxxx */
426 /* USAT 1111 0x11 10x0 xxxx 0xxx xxxx xxxx xxxx */
427 DECODE_EMULATEX (0xfb508000, 0xf3000000, t32_emulate_rd8rn16rm0_rwflags,
428 REGS(NOSPPC, 0, NOSPPC, 0, 0)),
429
430 /* SFBX 1111 0x11 0100 xxxx 0xxx xxxx xxxx xxxx */
431 /* UFBX 1111 0x11 1100 xxxx 0xxx xxxx xxxx xxxx */
432 DECODE_EMULATEX (0xfb708000, 0xf3400000, t32_emulate_rd8rn16_noflags,
433 REGS(NOSPPC, 0, NOSPPC, 0, 0)),
434
435 /* BFC 1111 0x11 0110 1111 0xxx xxxx xxxx xxxx */
436 DECODE_EMULATEX (0xfbff8000, 0xf36f0000, t32_emulate_rd8rn16_noflags,
437 REGS(0, 0, NOSPPC, 0, 0)),
438
439 /* BFI 1111 0x11 0110 xxxx 0xxx xxxx xxxx xxxx */
440 DECODE_EMULATEX (0xfbf08000, 0xf3600000, t32_emulate_rd8rn16_noflags,
441 REGS(NOSPPCX, 0, NOSPPC, 0, 0)),
442
443 DECODE_END
444};
445
Jon Medhurstf39ca8b2011-07-03 13:55:47 +0100446static const union decode_item t32_table_1111_0xxx___1[] = {
447 /* Branches and miscellaneous control */
448
449 /* YIELD 1111 0011 1010 xxxx 10x0 x000 0000 0001 */
450 DECODE_OR (0xfff0d7ff, 0xf3a08001),
451 /* SEV 1111 0011 1010 xxxx 10x0 x000 0000 0100 */
452 DECODE_EMULATE (0xfff0d7ff, 0xf3a08004, kprobe_emulate_none),
453 /* NOP 1111 0011 1010 xxxx 10x0 x000 0000 0000 */
454 /* WFE 1111 0011 1010 xxxx 10x0 x000 0000 0010 */
455 /* WFI 1111 0011 1010 xxxx 10x0 x000 0000 0011 */
456 DECODE_SIMULATE (0xfff0d7fc, 0xf3a08000, kprobe_simulate_nop),
457
Jon Medhurstb06f3ee2011-07-03 14:52:18 +0100458 /* MRS Rd, CPSR 1111 0011 1110 xxxx 10x0 xxxx xxxx xxxx */
459 DECODE_SIMULATEX(0xfff0d000, 0xf3e08000, t32_simulate_mrs,
460 REGS(0, 0, NOSPPC, 0, 0)),
461
462 /*
463 * Unsupported instructions
464 * 1111 0x11 1xxx xxxx 10x0 xxxx xxxx xxxx
465 *
466 * MSR 1111 0011 100x xxxx 10x0 xxxx xxxx xxxx
467 * DBG hint 1111 0011 1010 xxxx 10x0 x000 1111 xxxx
468 * Unallocated hints 1111 0011 1010 xxxx 10x0 x000 xxxx xxxx
469 * CPS 1111 0011 1010 xxxx 10x0 xxxx xxxx xxxx
470 * CLREX/DSB/DMB/ISB 1111 0011 1011 xxxx 10x0 xxxx xxxx xxxx
471 * BXJ 1111 0011 1100 xxxx 10x0 xxxx xxxx xxxx
472 * SUBS PC,LR,#<imm8> 1111 0011 1101 xxxx 10x0 xxxx xxxx xxxx
473 * MRS Rd, SPSR 1111 0011 1111 xxxx 10x0 xxxx xxxx xxxx
474 * SMC 1111 0111 1111 xxxx 1000 xxxx xxxx xxxx
475 * UNDEFINED 1111 0111 1111 xxxx 1010 xxxx xxxx xxxx
476 * ??? 1111 0111 1xxx xxxx 1010 xxxx xxxx xxxx
477 */
478 DECODE_REJECT (0xfb80d000, 0xf3808000),
479
Jon Medhurstce715c72011-07-03 14:53:45 +0100480 /* Bcc 1111 0xxx xxxx xxxx 10x0 xxxx xxxx xxxx */
481 DECODE_CUSTOM (0xf800d000, 0xf0008000, t32_decode_cond_branch),
482
483 /* BLX 1111 0xxx xxxx xxxx 11x0 xxxx xxxx xxx0 */
484 DECODE_OR (0xf800d001, 0xf000c000),
485 /* B 1111 0xxx xxxx xxxx 10x1 xxxx xxxx xxxx */
486 /* BL 1111 0xxx xxxx xxxx 11x1 xxxx xxxx xxxx */
487 DECODE_SIMULATE (0xf8009000, 0xf0009000, t32_simulate_branch),
488
Jon Medhurstf39ca8b2011-07-03 13:55:47 +0100489 DECODE_END
490};
491
492const union decode_item kprobe_decode_thumb32_table[] = {
493
494 /*
Jon Medhursteaf1d062011-07-07 08:59:32 +0100495 * Load/store multiple instructions
496 * 1110 100x x0xx xxxx xxxx xxxx xxxx xxxx
497 */
498 DECODE_TABLE (0xfe400000, 0xe8000000, t32_table_1110_100x_x0xx),
499
500 /*
Jon Medhurstb48354d2011-07-03 14:23:21 +0100501 * Load/store dual, load/store exclusive, table branch
502 * 1110 100x x1xx xxxx xxxx xxxx xxxx xxxx
503 */
504 DECODE_TABLE (0xfe400000, 0xe8400000, t32_table_1110_100x_x1xx),
505
506 /*
Jon Medhurst080e0012011-07-03 14:31:58 +0100507 * Data-processing (shifted register)
508 * 1110 101x xxxx xxxx xxxx xxxx xxxx xxxx
509 */
510 DECODE_TABLE (0xfe000000, 0xea000000, t32_table_1110_101x),
511
512 /*
Jon Medhurst2fcaf7e2011-07-03 14:36:35 +0100513 * Data-processing (modified immediate)
514 * 1111 0x0x xxxx xxxx 0xxx xxxx xxxx xxxx
515 */
516 DECODE_TABLE (0xfa008000, 0xf0000000, t32_table_1111_0x0x___0),
517
518 /*
Jon Medhurst78487862011-07-03 14:40:26 +0100519 * Data-processing (plain binary immediate)
520 * 1111 0x1x xxxx xxxx 0xxx xxxx xxxx xxxx
521 */
522 DECODE_TABLE (0xfa008000, 0xf2000000, t32_table_1111_0x1x___0),
523
524 /*
Jon Medhurstf39ca8b2011-07-03 13:55:47 +0100525 * Branches and miscellaneous control
526 * 1111 0xxx xxxx xxxx 1xxx xxxx xxxx xxxx
527 */
528 DECODE_TABLE (0xf8008000, 0xf0008000, t32_table_1111_0xxx___1),
529
530 DECODE_END
531};
532
Jon Medhursta9c3c292011-07-02 15:51:03 +0100533static void __kprobes
534t16_simulate_bxblx(struct kprobe *p, struct pt_regs *regs)
535{
536 kprobe_opcode_t insn = p->opcode;
537 unsigned long pc = thumb_probe_pc(p);
538 int rm = (insn >> 3) & 0xf;
539 unsigned long rmv = (rm == 15) ? pc : regs->uregs[rm];
540
541 if (insn & (1 << 7)) /* BLX ? */
542 regs->ARM_lr = (unsigned long)p->addr + 2;
543
544 bx_write_pc(rmv, regs);
545}
546
Jon Medhurstf8695142011-07-02 16:00:09 +0100547static void __kprobes
548t16_simulate_ldr_literal(struct kprobe *p, struct pt_regs *regs)
549{
550 kprobe_opcode_t insn = p->opcode;
551 unsigned long* base = (unsigned long *)(thumb_probe_pc(p) & ~3);
552 long index = insn & 0xff;
553 int rt = (insn >> 8) & 0x7;
554 regs->uregs[rt] = base[index];
555}
556
557static void __kprobes
558t16_simulate_ldrstr_sp_relative(struct kprobe *p, struct pt_regs *regs)
559{
560 kprobe_opcode_t insn = p->opcode;
561 unsigned long* base = (unsigned long *)regs->ARM_sp;
562 long index = insn & 0xff;
563 int rt = (insn >> 8) & 0x7;
564 if (insn & 0x800) /* LDR */
565 regs->uregs[rt] = base[index];
566 else /* STR */
567 base[index] = regs->uregs[rt];
568}
569
Jon Medhurst2f335822011-07-02 16:05:53 +0100570static void __kprobes
571t16_simulate_reladr(struct kprobe *p, struct pt_regs *regs)
572{
573 kprobe_opcode_t insn = p->opcode;
574 unsigned long base = (insn & 0x800) ? regs->ARM_sp
575 : (thumb_probe_pc(p) & ~3);
576 long offset = insn & 0xff;
577 int rt = (insn >> 8) & 0x7;
578 regs->uregs[rt] = base + offset * 4;
579}
580
581static void __kprobes
582t16_simulate_add_sp_imm(struct kprobe *p, struct pt_regs *regs)
583{
584 kprobe_opcode_t insn = p->opcode;
585 long imm = insn & 0x7f;
586 if (insn & 0x80) /* SUB */
587 regs->ARM_sp -= imm * 4;
588 else /* ADD */
589 regs->ARM_sp += imm * 4;
590}
591
Jon Medhurst32818f32011-07-02 16:10:44 +0100592static void __kprobes
593t16_simulate_cbz(struct kprobe *p, struct pt_regs *regs)
594{
595 kprobe_opcode_t insn = p->opcode;
596 int rn = insn & 0x7;
597 kprobe_opcode_t nonzero = regs->uregs[rn] ? insn : ~insn;
598 if (nonzero & 0x800) {
599 long i = insn & 0x200;
600 long imm5 = insn & 0xf8;
601 unsigned long pc = thumb_probe_pc(p);
602 regs->ARM_pc = pc + (i >> 3) + (imm5 >> 2);
603 }
604}
605
Jon Medhurst5b94faf2011-07-02 16:16:05 +0100606static void __kprobes
607t16_simulate_it(struct kprobe *p, struct pt_regs *regs)
608{
609 /*
610 * The 8 IT state bits are split into two parts in CPSR:
611 * ITSTATE<1:0> are in CPSR<26:25>
612 * ITSTATE<7:2> are in CPSR<15:10>
613 * The new IT state is in the lower byte of insn.
614 */
615 kprobe_opcode_t insn = p->opcode;
616 unsigned long cpsr = regs->ARM_cpsr;
617 cpsr &= ~PSR_IT_MASK;
618 cpsr |= (insn & 0xfc) << 8;
619 cpsr |= (insn & 0x03) << 25;
620 regs->ARM_cpsr = cpsr;
621}
622
623static void __kprobes
624t16_singlestep_it(struct kprobe *p, struct pt_regs *regs)
625{
626 regs->ARM_pc += 2;
627 t16_simulate_it(p, regs);
628}
629
630static enum kprobe_insn __kprobes
631t16_decode_it(kprobe_opcode_t insn, struct arch_specific_insn *asi)
632{
633 asi->insn_singlestep = t16_singlestep_it;
634 return INSN_GOOD_NO_SLOT;
635}
636
Jon Medhurst396b41f2011-07-02 16:30:43 +0100637static void __kprobes
638t16_simulate_cond_branch(struct kprobe *p, struct pt_regs *regs)
639{
640 kprobe_opcode_t insn = p->opcode;
641 unsigned long pc = thumb_probe_pc(p);
642 long offset = insn & 0x7f;
643 offset -= insn & 0x80; /* Apply sign bit */
644 regs->ARM_pc = pc + (offset * 2);
645}
646
647static enum kprobe_insn __kprobes
648t16_decode_cond_branch(kprobe_opcode_t insn, struct arch_specific_insn *asi)
649{
650 int cc = (insn >> 8) & 0xf;
651 asi->insn_check_cc = kprobe_condition_checks[cc];
652 asi->insn_handler = t16_simulate_cond_branch;
653 return INSN_GOOD_NO_SLOT;
654}
655
656static void __kprobes
657t16_simulate_branch(struct kprobe *p, struct pt_regs *regs)
658{
659 kprobe_opcode_t insn = p->opcode;
660 unsigned long pc = thumb_probe_pc(p);
661 long offset = insn & 0x3ff;
662 offset -= insn & 0x400; /* Apply sign bit */
663 regs->ARM_pc = pc + (offset * 2);
664}
665
Jon Medhurst02d194f2011-07-02 15:46:05 +0100666static unsigned long __kprobes
667t16_emulate_loregs(struct kprobe *p, struct pt_regs *regs)
668{
669 unsigned long oldcpsr = regs->ARM_cpsr;
670 unsigned long newcpsr;
671
672 __asm__ __volatile__ (
673 "msr cpsr_fs, %[oldcpsr] \n\t"
674 "ldmia %[regs], {r0-r7} \n\t"
675 "blx %[fn] \n\t"
676 "stmia %[regs], {r0-r7} \n\t"
677 "mrs %[newcpsr], cpsr \n\t"
678 : [newcpsr] "=r" (newcpsr)
679 : [oldcpsr] "r" (oldcpsr), [regs] "r" (regs),
680 [fn] "r" (p->ainsn.insn_fn)
681 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7",
682 "lr", "memory", "cc"
683 );
684
685 return (oldcpsr & ~APSR_MASK) | (newcpsr & APSR_MASK);
686}
687
688static void __kprobes
689t16_emulate_loregs_rwflags(struct kprobe *p, struct pt_regs *regs)
690{
691 regs->ARM_cpsr = t16_emulate_loregs(p, regs);
692}
693
694static void __kprobes
695t16_emulate_loregs_noitrwflags(struct kprobe *p, struct pt_regs *regs)
696{
697 unsigned long cpsr = t16_emulate_loregs(p, regs);
698 if (!in_it_block(cpsr))
699 regs->ARM_cpsr = cpsr;
700}
701
Jon Medhurst3b5940e2011-07-02 15:54:57 +0100702static void __kprobes
703t16_emulate_hiregs(struct kprobe *p, struct pt_regs *regs)
704{
705 kprobe_opcode_t insn = p->opcode;
706 unsigned long pc = thumb_probe_pc(p);
707 int rdn = (insn & 0x7) | ((insn & 0x80) >> 4);
708 int rm = (insn >> 3) & 0xf;
709
710 register unsigned long rdnv asm("r1");
711 register unsigned long rmv asm("r0");
712 unsigned long cpsr = regs->ARM_cpsr;
713
714 rdnv = (rdn == 15) ? pc : regs->uregs[rdn];
715 rmv = (rm == 15) ? pc : regs->uregs[rm];
716
717 __asm__ __volatile__ (
718 "msr cpsr_fs, %[cpsr] \n\t"
719 "blx %[fn] \n\t"
720 "mrs %[cpsr], cpsr \n\t"
721 : "=r" (rdnv), [cpsr] "=r" (cpsr)
722 : "0" (rdnv), "r" (rmv), "1" (cpsr), [fn] "r" (p->ainsn.insn_fn)
723 : "lr", "memory", "cc"
724 );
725
726 if (rdn == 15)
727 rdnv &= ~1;
728
729 regs->uregs[rdn] = rdnv;
730 regs->ARM_cpsr = (regs->ARM_cpsr & ~APSR_MASK) | (cpsr & APSR_MASK);
731}
732
733static enum kprobe_insn __kprobes
734t16_decode_hiregs(kprobe_opcode_t insn, struct arch_specific_insn *asi)
735{
736 insn &= ~0x00ff;
737 insn |= 0x001; /* Set Rdn = R1 and Rm = R0 */
738 ((u16 *)asi->insn)[0] = insn;
739 asi->insn_handler = t16_emulate_hiregs;
740 return INSN_GOOD;
741}
742
Jon Medhurstfd0c8d82011-07-02 16:13:29 +0100743static void __kprobes
744t16_emulate_push(struct kprobe *p, struct pt_regs *regs)
745{
746 __asm__ __volatile__ (
747 "ldr r9, [%[regs], #13*4] \n\t"
748 "ldr r8, [%[regs], #14*4] \n\t"
749 "ldmia %[regs], {r0-r7} \n\t"
750 "blx %[fn] \n\t"
751 "str r9, [%[regs], #13*4] \n\t"
752 :
753 : [regs] "r" (regs), [fn] "r" (p->ainsn.insn_fn)
754 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", "r8", "r9",
755 "lr", "memory", "cc"
756 );
757}
758
759static enum kprobe_insn __kprobes
760t16_decode_push(kprobe_opcode_t insn, struct arch_specific_insn *asi)
761{
762 /*
763 * To simulate a PUSH we use a Thumb-2 "STMDB R9!, {registers}"
764 * and call it with R9=SP and LR in the register list represented
765 * by R8.
766 */
767 ((u16 *)asi->insn)[0] = 0xe929; /* 1st half STMDB R9!,{} */
768 ((u16 *)asi->insn)[1] = insn & 0x1ff; /* 2nd half (register list) */
769 asi->insn_handler = t16_emulate_push;
770 return INSN_GOOD;
771}
772
773static void __kprobes
774t16_emulate_pop_nopc(struct kprobe *p, struct pt_regs *regs)
775{
776 __asm__ __volatile__ (
777 "ldr r9, [%[regs], #13*4] \n\t"
778 "ldmia %[regs], {r0-r7} \n\t"
779 "blx %[fn] \n\t"
780 "stmia %[regs], {r0-r7} \n\t"
781 "str r9, [%[regs], #13*4] \n\t"
782 :
783 : [regs] "r" (regs), [fn] "r" (p->ainsn.insn_fn)
784 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", "r9",
785 "lr", "memory", "cc"
786 );
787}
788
789static void __kprobes
790t16_emulate_pop_pc(struct kprobe *p, struct pt_regs *regs)
791{
792 register unsigned long pc asm("r8");
793
794 __asm__ __volatile__ (
795 "ldr r9, [%[regs], #13*4] \n\t"
796 "ldmia %[regs], {r0-r7} \n\t"
797 "blx %[fn] \n\t"
798 "stmia %[regs], {r0-r7} \n\t"
799 "str r9, [%[regs], #13*4] \n\t"
800 : "=r" (pc)
801 : [regs] "r" (regs), [fn] "r" (p->ainsn.insn_fn)
802 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", "r9",
803 "lr", "memory", "cc"
804 );
805
806 bx_write_pc(pc, regs);
807}
808
809static enum kprobe_insn __kprobes
810t16_decode_pop(kprobe_opcode_t insn, struct arch_specific_insn *asi)
811{
812 /*
813 * To simulate a POP we use a Thumb-2 "LDMDB R9!, {registers}"
814 * and call it with R9=SP and PC in the register list represented
815 * by R8.
816 */
817 ((u16 *)asi->insn)[0] = 0xe8b9; /* 1st half LDMIA R9!,{} */
818 ((u16 *)asi->insn)[1] = insn & 0x1ff; /* 2nd half (register list) */
819 asi->insn_handler = insn & 0x100 ? t16_emulate_pop_pc
820 : t16_emulate_pop_nopc;
821 return INSN_GOOD;
822}
823
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100824static const union decode_item t16_table_1011[] = {
825 /* Miscellaneous 16-bit instructions */
826
Jon Medhurst2f335822011-07-02 16:05:53 +0100827 /* ADD (SP plus immediate) 1011 0000 0xxx xxxx */
828 /* SUB (SP minus immediate) 1011 0000 1xxx xxxx */
829 DECODE_SIMULATE (0xff00, 0xb000, t16_simulate_add_sp_imm),
830
Jon Medhurst32818f32011-07-02 16:10:44 +0100831 /* CBZ 1011 00x1 xxxx xxxx */
832 /* CBNZ 1011 10x1 xxxx xxxx */
833 DECODE_SIMULATE (0xf500, 0xb100, t16_simulate_cbz),
834
835 /* SXTH 1011 0010 00xx xxxx */
836 /* SXTB 1011 0010 01xx xxxx */
837 /* UXTH 1011 0010 10xx xxxx */
838 /* UXTB 1011 0010 11xx xxxx */
839 /* REV 1011 1010 00xx xxxx */
840 /* REV16 1011 1010 01xx xxxx */
841 /* ??? 1011 1010 10xx xxxx */
842 /* REVSH 1011 1010 11xx xxxx */
843 DECODE_REJECT (0xffc0, 0xba80),
844 DECODE_EMULATE (0xf500, 0xb000, t16_emulate_loregs_rwflags),
845
Jon Medhurstfd0c8d82011-07-02 16:13:29 +0100846 /* PUSH 1011 010x xxxx xxxx */
847 DECODE_CUSTOM (0xfe00, 0xb400, t16_decode_push),
848 /* POP 1011 110x xxxx xxxx */
849 DECODE_CUSTOM (0xfe00, 0xbc00, t16_decode_pop),
850
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100851 /*
852 * If-Then, and hints
853 * 1011 1111 xxxx xxxx
854 */
855
856 /* YIELD 1011 1111 0001 0000 */
857 DECODE_OR (0xffff, 0xbf10),
858 /* SEV 1011 1111 0100 0000 */
859 DECODE_EMULATE (0xffff, 0xbf40, kprobe_emulate_none),
860 /* NOP 1011 1111 0000 0000 */
861 /* WFE 1011 1111 0010 0000 */
862 /* WFI 1011 1111 0011 0000 */
863 DECODE_SIMULATE (0xffcf, 0xbf00, kprobe_simulate_nop),
864 /* Unassigned hints 1011 1111 xxxx 0000 */
865 DECODE_REJECT (0xff0f, 0xbf00),
Jon Medhurst5b94faf2011-07-02 16:16:05 +0100866 /* IT 1011 1111 xxxx xxxx */
867 DECODE_CUSTOM (0xff00, 0xbf00, t16_decode_it),
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100868
Jon Medhurst0a188cc2011-07-02 16:39:07 +0100869 /* SETEND 1011 0110 010x xxxx */
870 /* CPS 1011 0110 011x xxxx */
871 /* BKPT 1011 1110 xxxx xxxx */
872 /* And unallocated instructions... */
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100873 DECODE_END
874};
875
876const union decode_item kprobe_decode_thumb16_table[] = {
877
878 /*
Jon Medhurst02d194f2011-07-02 15:46:05 +0100879 * Shift (immediate), add, subtract, move, and compare
880 * 00xx xxxx xxxx xxxx
881 */
882
883 /* CMP (immediate) 0010 1xxx xxxx xxxx */
884 DECODE_EMULATE (0xf800, 0x2800, t16_emulate_loregs_rwflags),
885
886 /* ADD (register) 0001 100x xxxx xxxx */
887 /* SUB (register) 0001 101x xxxx xxxx */
888 /* LSL (immediate) 0000 0xxx xxxx xxxx */
889 /* LSR (immediate) 0000 1xxx xxxx xxxx */
890 /* ASR (immediate) 0001 0xxx xxxx xxxx */
891 /* ADD (immediate, Thumb) 0001 110x xxxx xxxx */
892 /* SUB (immediate, Thumb) 0001 111x xxxx xxxx */
893 /* MOV (immediate) 0010 0xxx xxxx xxxx */
894 /* ADD (immediate, Thumb) 0011 0xxx xxxx xxxx */
895 /* SUB (immediate, Thumb) 0011 1xxx xxxx xxxx */
896 DECODE_EMULATE (0xc000, 0x0000, t16_emulate_loregs_noitrwflags),
897
898 /*
899 * 16-bit Thumb data-processing instructions
900 * 0100 00xx xxxx xxxx
901 */
902
903 /* TST (register) 0100 0010 00xx xxxx */
904 DECODE_EMULATE (0xffc0, 0x4200, t16_emulate_loregs_rwflags),
905 /* CMP (register) 0100 0010 10xx xxxx */
906 /* CMN (register) 0100 0010 11xx xxxx */
907 DECODE_EMULATE (0xff80, 0x4280, t16_emulate_loregs_rwflags),
908 /* AND (register) 0100 0000 00xx xxxx */
909 /* EOR (register) 0100 0000 01xx xxxx */
910 /* LSL (register) 0100 0000 10xx xxxx */
911 /* LSR (register) 0100 0000 11xx xxxx */
912 /* ASR (register) 0100 0001 00xx xxxx */
913 /* ADC (register) 0100 0001 01xx xxxx */
914 /* SBC (register) 0100 0001 10xx xxxx */
915 /* ROR (register) 0100 0001 11xx xxxx */
916 /* RSB (immediate) 0100 0010 01xx xxxx */
917 /* ORR (register) 0100 0011 00xx xxxx */
918 /* MUL 0100 0011 00xx xxxx */
919 /* BIC (register) 0100 0011 10xx xxxx */
920 /* MVN (register) 0100 0011 10xx xxxx */
921 DECODE_EMULATE (0xfc00, 0x4000, t16_emulate_loregs_noitrwflags),
922
923 /*
Jon Medhursta9c3c292011-07-02 15:51:03 +0100924 * Special data instructions and branch and exchange
925 * 0100 01xx xxxx xxxx
926 */
927
928 /* BLX pc 0100 0111 1111 1xxx */
929 DECODE_REJECT (0xfff8, 0x47f8),
930
931 /* BX (register) 0100 0111 0xxx xxxx */
932 /* BLX (register) 0100 0111 1xxx xxxx */
933 DECODE_SIMULATE (0xff00, 0x4700, t16_simulate_bxblx),
934
Jon Medhurst3b5940e2011-07-02 15:54:57 +0100935 /* ADD pc, pc 0100 0100 1111 1111 */
936 DECODE_REJECT (0xffff, 0x44ff),
937
938 /* ADD (register) 0100 0100 xxxx xxxx */
939 /* CMP (register) 0100 0101 xxxx xxxx */
940 /* MOV (register) 0100 0110 xxxx xxxx */
941 DECODE_CUSTOM (0xfc00, 0x4400, t16_decode_hiregs),
942
Jon Medhursta9c3c292011-07-02 15:51:03 +0100943 /*
Jon Medhurstf8695142011-07-02 16:00:09 +0100944 * Load from Literal Pool
945 * LDR (literal) 0100 1xxx xxxx xxxx
946 */
947 DECODE_SIMULATE (0xf800, 0x4800, t16_simulate_ldr_literal),
948
949 /*
950 * 16-bit Thumb Load/store instructions
951 * 0101 xxxx xxxx xxxx
952 * 011x xxxx xxxx xxxx
953 * 100x xxxx xxxx xxxx
954 */
955
956 /* STR (register) 0101 000x xxxx xxxx */
957 /* STRH (register) 0101 001x xxxx xxxx */
958 /* STRB (register) 0101 010x xxxx xxxx */
959 /* LDRSB (register) 0101 011x xxxx xxxx */
960 /* LDR (register) 0101 100x xxxx xxxx */
961 /* LDRH (register) 0101 101x xxxx xxxx */
962 /* LDRB (register) 0101 110x xxxx xxxx */
963 /* LDRSH (register) 0101 111x xxxx xxxx */
964 /* STR (immediate, Thumb) 0110 0xxx xxxx xxxx */
965 /* LDR (immediate, Thumb) 0110 1xxx xxxx xxxx */
966 /* STRB (immediate, Thumb) 0111 0xxx xxxx xxxx */
967 /* LDRB (immediate, Thumb) 0111 1xxx xxxx xxxx */
968 DECODE_EMULATE (0xc000, 0x4000, t16_emulate_loregs_rwflags),
969 /* STRH (immediate, Thumb) 1000 0xxx xxxx xxxx */
970 /* LDRH (immediate, Thumb) 1000 1xxx xxxx xxxx */
971 DECODE_EMULATE (0xf000, 0x8000, t16_emulate_loregs_rwflags),
972 /* STR (immediate, Thumb) 1001 0xxx xxxx xxxx */
973 /* LDR (immediate, Thumb) 1001 1xxx xxxx xxxx */
974 DECODE_SIMULATE (0xf000, 0x9000, t16_simulate_ldrstr_sp_relative),
975
976 /*
Jon Medhurst2f335822011-07-02 16:05:53 +0100977 * Generate PC-/SP-relative address
978 * ADR (literal) 1010 0xxx xxxx xxxx
979 * ADD (SP plus immediate) 1010 1xxx xxxx xxxx
980 */
981 DECODE_SIMULATE (0xf000, 0xa000, t16_simulate_reladr),
982
983 /*
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100984 * Miscellaneous 16-bit instructions
985 * 1011 xxxx xxxx xxxx
986 */
987 DECODE_TABLE (0xf000, 0xb000, t16_table_1011),
988
Jon Medhurstf8695142011-07-02 16:00:09 +0100989 /* STM 1100 0xxx xxxx xxxx */
990 /* LDM 1100 1xxx xxxx xxxx */
991 DECODE_EMULATE (0xf000, 0xc000, t16_emulate_loregs_rwflags),
992
Jon Medhurst44495662011-07-02 16:25:47 +0100993 /*
994 * Conditional branch, and Supervisor Call
995 */
996
997 /* Permanently UNDEFINED 1101 1110 xxxx xxxx */
998 /* SVC 1101 1111 xxxx xxxx */
999 DECODE_REJECT (0xfe00, 0xde00),
1000
Jon Medhurst396b41f2011-07-02 16:30:43 +01001001 /* Conditional branch 1101 xxxx xxxx xxxx */
1002 DECODE_CUSTOM (0xf000, 0xd000, t16_decode_cond_branch),
1003
1004 /*
1005 * Unconditional branch
1006 * B 1110 0xxx xxxx xxxx
1007 */
1008 DECODE_SIMULATE (0xf800, 0xe000, t16_simulate_branch),
1009
Jon Medhurst3f92dfe2011-07-02 15:36:32 +01001010 DECODE_END
1011};
1012
Jon Medhursteaf4f33f2011-04-20 19:29:52 +01001013static unsigned long __kprobes thumb_check_cc(unsigned long cpsr)
1014{
1015 if (unlikely(in_it_block(cpsr)))
1016 return kprobe_condition_checks[current_cond(cpsr)](cpsr);
1017 return true;
1018}
1019
Jon Medhurstc6a7d972011-06-09 12:11:27 +01001020static void __kprobes thumb16_singlestep(struct kprobe *p, struct pt_regs *regs)
1021{
1022 regs->ARM_pc += 2;
1023 p->ainsn.insn_handler(p, regs);
1024 regs->ARM_cpsr = it_advance(regs->ARM_cpsr);
1025}
1026
1027static void __kprobes thumb32_singlestep(struct kprobe *p, struct pt_regs *regs)
1028{
1029 regs->ARM_pc += 4;
1030 p->ainsn.insn_handler(p, regs);
1031 regs->ARM_cpsr = it_advance(regs->ARM_cpsr);
1032}
1033
Jon Medhurst24371702011-04-19 17:56:58 +01001034enum kprobe_insn __kprobes
1035thumb16_kprobe_decode_insn(kprobe_opcode_t insn, struct arch_specific_insn *asi)
1036{
Jon Medhurstc6a7d972011-06-09 12:11:27 +01001037 asi->insn_singlestep = thumb16_singlestep;
Jon Medhursteaf4f33f2011-04-20 19:29:52 +01001038 asi->insn_check_cc = thumb_check_cc;
Jon Medhurst3f92dfe2011-07-02 15:36:32 +01001039 return kprobe_decode_insn(insn, asi, kprobe_decode_thumb16_table, true);
Jon Medhurst24371702011-04-19 17:56:58 +01001040}
1041
1042enum kprobe_insn __kprobes
1043thumb32_kprobe_decode_insn(kprobe_opcode_t insn, struct arch_specific_insn *asi)
1044{
Jon Medhurstc6a7d972011-06-09 12:11:27 +01001045 asi->insn_singlestep = thumb32_singlestep;
Jon Medhursteaf4f33f2011-04-20 19:29:52 +01001046 asi->insn_check_cc = thumb_check_cc;
Jon Medhurstf39ca8b2011-07-03 13:55:47 +01001047 return kprobe_decode_insn(insn, asi, kprobe_decode_thumb32_table, true);
Jon Medhurst24371702011-04-19 17:56:58 +01001048}