blob: e0289493b4c62742a7a9dc2a79776ff5ee23ccc0 [file] [log] [blame]
Jon Medhurst24371702011-04-19 17:56:58 +01001/*
2 * arch/arm/kernel/kprobes-thumb.c
3 *
4 * Copyright (C) 2011 Jon Medhurst <tixy@yxit.co.uk>.
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 */
10
11#include <linux/kernel.h>
12#include <linux/kprobes.h>
13
14#include "kprobes.h"
15
Jon Medhursteaf4f33f2011-04-20 19:29:52 +010016
17/*
18 * True if current instruction is in an IT block.
19 */
20#define in_it_block(cpsr) ((cpsr & 0x06000c00) != 0x00000000)
21
22/*
23 * Return the condition code to check for the currently executing instruction.
24 * This is in ITSTATE<7:4> which is in CPSR<15:12> but is only valid if
25 * in_it_block returns true.
26 */
27#define current_cond(cpsr) ((cpsr >> 12) & 0xf)
28
Jon Medhursta9c3c292011-07-02 15:51:03 +010029/*
30 * Return the PC value for a probe in thumb code.
31 * This is the address of the probed instruction plus 4.
32 * We subtract one because the address will have bit zero set to indicate
33 * a pointer to thumb code.
34 */
35static inline unsigned long __kprobes thumb_probe_pc(struct kprobe *p)
36{
37 return (unsigned long)p->addr - 1 + 4;
38}
39
40static void __kprobes
41t16_simulate_bxblx(struct kprobe *p, struct pt_regs *regs)
42{
43 kprobe_opcode_t insn = p->opcode;
44 unsigned long pc = thumb_probe_pc(p);
45 int rm = (insn >> 3) & 0xf;
46 unsigned long rmv = (rm == 15) ? pc : regs->uregs[rm];
47
48 if (insn & (1 << 7)) /* BLX ? */
49 regs->ARM_lr = (unsigned long)p->addr + 2;
50
51 bx_write_pc(rmv, regs);
52}
53
Jon Medhurstf8695142011-07-02 16:00:09 +010054static void __kprobes
55t16_simulate_ldr_literal(struct kprobe *p, struct pt_regs *regs)
56{
57 kprobe_opcode_t insn = p->opcode;
58 unsigned long* base = (unsigned long *)(thumb_probe_pc(p) & ~3);
59 long index = insn & 0xff;
60 int rt = (insn >> 8) & 0x7;
61 regs->uregs[rt] = base[index];
62}
63
64static void __kprobes
65t16_simulate_ldrstr_sp_relative(struct kprobe *p, struct pt_regs *regs)
66{
67 kprobe_opcode_t insn = p->opcode;
68 unsigned long* base = (unsigned long *)regs->ARM_sp;
69 long index = insn & 0xff;
70 int rt = (insn >> 8) & 0x7;
71 if (insn & 0x800) /* LDR */
72 regs->uregs[rt] = base[index];
73 else /* STR */
74 base[index] = regs->uregs[rt];
75}
76
Jon Medhurst2f335822011-07-02 16:05:53 +010077static void __kprobes
78t16_simulate_reladr(struct kprobe *p, struct pt_regs *regs)
79{
80 kprobe_opcode_t insn = p->opcode;
81 unsigned long base = (insn & 0x800) ? regs->ARM_sp
82 : (thumb_probe_pc(p) & ~3);
83 long offset = insn & 0xff;
84 int rt = (insn >> 8) & 0x7;
85 regs->uregs[rt] = base + offset * 4;
86}
87
88static void __kprobes
89t16_simulate_add_sp_imm(struct kprobe *p, struct pt_regs *regs)
90{
91 kprobe_opcode_t insn = p->opcode;
92 long imm = insn & 0x7f;
93 if (insn & 0x80) /* SUB */
94 regs->ARM_sp -= imm * 4;
95 else /* ADD */
96 regs->ARM_sp += imm * 4;
97}
98
Jon Medhurst32818f32011-07-02 16:10:44 +010099static void __kprobes
100t16_simulate_cbz(struct kprobe *p, struct pt_regs *regs)
101{
102 kprobe_opcode_t insn = p->opcode;
103 int rn = insn & 0x7;
104 kprobe_opcode_t nonzero = regs->uregs[rn] ? insn : ~insn;
105 if (nonzero & 0x800) {
106 long i = insn & 0x200;
107 long imm5 = insn & 0xf8;
108 unsigned long pc = thumb_probe_pc(p);
109 regs->ARM_pc = pc + (i >> 3) + (imm5 >> 2);
110 }
111}
112
Jon Medhurst02d194f2011-07-02 15:46:05 +0100113static unsigned long __kprobes
114t16_emulate_loregs(struct kprobe *p, struct pt_regs *regs)
115{
116 unsigned long oldcpsr = regs->ARM_cpsr;
117 unsigned long newcpsr;
118
119 __asm__ __volatile__ (
120 "msr cpsr_fs, %[oldcpsr] \n\t"
121 "ldmia %[regs], {r0-r7} \n\t"
122 "blx %[fn] \n\t"
123 "stmia %[regs], {r0-r7} \n\t"
124 "mrs %[newcpsr], cpsr \n\t"
125 : [newcpsr] "=r" (newcpsr)
126 : [oldcpsr] "r" (oldcpsr), [regs] "r" (regs),
127 [fn] "r" (p->ainsn.insn_fn)
128 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7",
129 "lr", "memory", "cc"
130 );
131
132 return (oldcpsr & ~APSR_MASK) | (newcpsr & APSR_MASK);
133}
134
135static void __kprobes
136t16_emulate_loregs_rwflags(struct kprobe *p, struct pt_regs *regs)
137{
138 regs->ARM_cpsr = t16_emulate_loregs(p, regs);
139}
140
141static void __kprobes
142t16_emulate_loregs_noitrwflags(struct kprobe *p, struct pt_regs *regs)
143{
144 unsigned long cpsr = t16_emulate_loregs(p, regs);
145 if (!in_it_block(cpsr))
146 regs->ARM_cpsr = cpsr;
147}
148
Jon Medhurst3b5940e2011-07-02 15:54:57 +0100149static void __kprobes
150t16_emulate_hiregs(struct kprobe *p, struct pt_regs *regs)
151{
152 kprobe_opcode_t insn = p->opcode;
153 unsigned long pc = thumb_probe_pc(p);
154 int rdn = (insn & 0x7) | ((insn & 0x80) >> 4);
155 int rm = (insn >> 3) & 0xf;
156
157 register unsigned long rdnv asm("r1");
158 register unsigned long rmv asm("r0");
159 unsigned long cpsr = regs->ARM_cpsr;
160
161 rdnv = (rdn == 15) ? pc : regs->uregs[rdn];
162 rmv = (rm == 15) ? pc : regs->uregs[rm];
163
164 __asm__ __volatile__ (
165 "msr cpsr_fs, %[cpsr] \n\t"
166 "blx %[fn] \n\t"
167 "mrs %[cpsr], cpsr \n\t"
168 : "=r" (rdnv), [cpsr] "=r" (cpsr)
169 : "0" (rdnv), "r" (rmv), "1" (cpsr), [fn] "r" (p->ainsn.insn_fn)
170 : "lr", "memory", "cc"
171 );
172
173 if (rdn == 15)
174 rdnv &= ~1;
175
176 regs->uregs[rdn] = rdnv;
177 regs->ARM_cpsr = (regs->ARM_cpsr & ~APSR_MASK) | (cpsr & APSR_MASK);
178}
179
180static enum kprobe_insn __kprobes
181t16_decode_hiregs(kprobe_opcode_t insn, struct arch_specific_insn *asi)
182{
183 insn &= ~0x00ff;
184 insn |= 0x001; /* Set Rdn = R1 and Rm = R0 */
185 ((u16 *)asi->insn)[0] = insn;
186 asi->insn_handler = t16_emulate_hiregs;
187 return INSN_GOOD;
188}
189
Jon Medhurstfd0c8d82011-07-02 16:13:29 +0100190static void __kprobes
191t16_emulate_push(struct kprobe *p, struct pt_regs *regs)
192{
193 __asm__ __volatile__ (
194 "ldr r9, [%[regs], #13*4] \n\t"
195 "ldr r8, [%[regs], #14*4] \n\t"
196 "ldmia %[regs], {r0-r7} \n\t"
197 "blx %[fn] \n\t"
198 "str r9, [%[regs], #13*4] \n\t"
199 :
200 : [regs] "r" (regs), [fn] "r" (p->ainsn.insn_fn)
201 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", "r8", "r9",
202 "lr", "memory", "cc"
203 );
204}
205
206static enum kprobe_insn __kprobes
207t16_decode_push(kprobe_opcode_t insn, struct arch_specific_insn *asi)
208{
209 /*
210 * To simulate a PUSH we use a Thumb-2 "STMDB R9!, {registers}"
211 * and call it with R9=SP and LR in the register list represented
212 * by R8.
213 */
214 ((u16 *)asi->insn)[0] = 0xe929; /* 1st half STMDB R9!,{} */
215 ((u16 *)asi->insn)[1] = insn & 0x1ff; /* 2nd half (register list) */
216 asi->insn_handler = t16_emulate_push;
217 return INSN_GOOD;
218}
219
220static void __kprobes
221t16_emulate_pop_nopc(struct kprobe *p, struct pt_regs *regs)
222{
223 __asm__ __volatile__ (
224 "ldr r9, [%[regs], #13*4] \n\t"
225 "ldmia %[regs], {r0-r7} \n\t"
226 "blx %[fn] \n\t"
227 "stmia %[regs], {r0-r7} \n\t"
228 "str r9, [%[regs], #13*4] \n\t"
229 :
230 : [regs] "r" (regs), [fn] "r" (p->ainsn.insn_fn)
231 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", "r9",
232 "lr", "memory", "cc"
233 );
234}
235
236static void __kprobes
237t16_emulate_pop_pc(struct kprobe *p, struct pt_regs *regs)
238{
239 register unsigned long pc asm("r8");
240
241 __asm__ __volatile__ (
242 "ldr r9, [%[regs], #13*4] \n\t"
243 "ldmia %[regs], {r0-r7} \n\t"
244 "blx %[fn] \n\t"
245 "stmia %[regs], {r0-r7} \n\t"
246 "str r9, [%[regs], #13*4] \n\t"
247 : "=r" (pc)
248 : [regs] "r" (regs), [fn] "r" (p->ainsn.insn_fn)
249 : "r0", "r1", "r2", "r3", "r4", "r5", "r6", "r7", "r9",
250 "lr", "memory", "cc"
251 );
252
253 bx_write_pc(pc, regs);
254}
255
256static enum kprobe_insn __kprobes
257t16_decode_pop(kprobe_opcode_t insn, struct arch_specific_insn *asi)
258{
259 /*
260 * To simulate a POP we use a Thumb-2 "LDMDB R9!, {registers}"
261 * and call it with R9=SP and PC in the register list represented
262 * by R8.
263 */
264 ((u16 *)asi->insn)[0] = 0xe8b9; /* 1st half LDMIA R9!,{} */
265 ((u16 *)asi->insn)[1] = insn & 0x1ff; /* 2nd half (register list) */
266 asi->insn_handler = insn & 0x100 ? t16_emulate_pop_pc
267 : t16_emulate_pop_nopc;
268 return INSN_GOOD;
269}
270
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100271static const union decode_item t16_table_1011[] = {
272 /* Miscellaneous 16-bit instructions */
273
Jon Medhurst2f335822011-07-02 16:05:53 +0100274 /* ADD (SP plus immediate) 1011 0000 0xxx xxxx */
275 /* SUB (SP minus immediate) 1011 0000 1xxx xxxx */
276 DECODE_SIMULATE (0xff00, 0xb000, t16_simulate_add_sp_imm),
277
Jon Medhurst32818f32011-07-02 16:10:44 +0100278 /* CBZ 1011 00x1 xxxx xxxx */
279 /* CBNZ 1011 10x1 xxxx xxxx */
280 DECODE_SIMULATE (0xf500, 0xb100, t16_simulate_cbz),
281
282 /* SXTH 1011 0010 00xx xxxx */
283 /* SXTB 1011 0010 01xx xxxx */
284 /* UXTH 1011 0010 10xx xxxx */
285 /* UXTB 1011 0010 11xx xxxx */
286 /* REV 1011 1010 00xx xxxx */
287 /* REV16 1011 1010 01xx xxxx */
288 /* ??? 1011 1010 10xx xxxx */
289 /* REVSH 1011 1010 11xx xxxx */
290 DECODE_REJECT (0xffc0, 0xba80),
291 DECODE_EMULATE (0xf500, 0xb000, t16_emulate_loregs_rwflags),
292
Jon Medhurstfd0c8d82011-07-02 16:13:29 +0100293 /* PUSH 1011 010x xxxx xxxx */
294 DECODE_CUSTOM (0xfe00, 0xb400, t16_decode_push),
295 /* POP 1011 110x xxxx xxxx */
296 DECODE_CUSTOM (0xfe00, 0xbc00, t16_decode_pop),
297
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100298 /*
299 * If-Then, and hints
300 * 1011 1111 xxxx xxxx
301 */
302
303 /* YIELD 1011 1111 0001 0000 */
304 DECODE_OR (0xffff, 0xbf10),
305 /* SEV 1011 1111 0100 0000 */
306 DECODE_EMULATE (0xffff, 0xbf40, kprobe_emulate_none),
307 /* NOP 1011 1111 0000 0000 */
308 /* WFE 1011 1111 0010 0000 */
309 /* WFI 1011 1111 0011 0000 */
310 DECODE_SIMULATE (0xffcf, 0xbf00, kprobe_simulate_nop),
311 /* Unassigned hints 1011 1111 xxxx 0000 */
312 DECODE_REJECT (0xff0f, 0xbf00),
313
314 DECODE_END
315};
316
317const union decode_item kprobe_decode_thumb16_table[] = {
318
319 /*
Jon Medhurst02d194f2011-07-02 15:46:05 +0100320 * Shift (immediate), add, subtract, move, and compare
321 * 00xx xxxx xxxx xxxx
322 */
323
324 /* CMP (immediate) 0010 1xxx xxxx xxxx */
325 DECODE_EMULATE (0xf800, 0x2800, t16_emulate_loregs_rwflags),
326
327 /* ADD (register) 0001 100x xxxx xxxx */
328 /* SUB (register) 0001 101x xxxx xxxx */
329 /* LSL (immediate) 0000 0xxx xxxx xxxx */
330 /* LSR (immediate) 0000 1xxx xxxx xxxx */
331 /* ASR (immediate) 0001 0xxx xxxx xxxx */
332 /* ADD (immediate, Thumb) 0001 110x xxxx xxxx */
333 /* SUB (immediate, Thumb) 0001 111x xxxx xxxx */
334 /* MOV (immediate) 0010 0xxx xxxx xxxx */
335 /* ADD (immediate, Thumb) 0011 0xxx xxxx xxxx */
336 /* SUB (immediate, Thumb) 0011 1xxx xxxx xxxx */
337 DECODE_EMULATE (0xc000, 0x0000, t16_emulate_loregs_noitrwflags),
338
339 /*
340 * 16-bit Thumb data-processing instructions
341 * 0100 00xx xxxx xxxx
342 */
343
344 /* TST (register) 0100 0010 00xx xxxx */
345 DECODE_EMULATE (0xffc0, 0x4200, t16_emulate_loregs_rwflags),
346 /* CMP (register) 0100 0010 10xx xxxx */
347 /* CMN (register) 0100 0010 11xx xxxx */
348 DECODE_EMULATE (0xff80, 0x4280, t16_emulate_loregs_rwflags),
349 /* AND (register) 0100 0000 00xx xxxx */
350 /* EOR (register) 0100 0000 01xx xxxx */
351 /* LSL (register) 0100 0000 10xx xxxx */
352 /* LSR (register) 0100 0000 11xx xxxx */
353 /* ASR (register) 0100 0001 00xx xxxx */
354 /* ADC (register) 0100 0001 01xx xxxx */
355 /* SBC (register) 0100 0001 10xx xxxx */
356 /* ROR (register) 0100 0001 11xx xxxx */
357 /* RSB (immediate) 0100 0010 01xx xxxx */
358 /* ORR (register) 0100 0011 00xx xxxx */
359 /* MUL 0100 0011 00xx xxxx */
360 /* BIC (register) 0100 0011 10xx xxxx */
361 /* MVN (register) 0100 0011 10xx xxxx */
362 DECODE_EMULATE (0xfc00, 0x4000, t16_emulate_loregs_noitrwflags),
363
364 /*
Jon Medhursta9c3c292011-07-02 15:51:03 +0100365 * Special data instructions and branch and exchange
366 * 0100 01xx xxxx xxxx
367 */
368
369 /* BLX pc 0100 0111 1111 1xxx */
370 DECODE_REJECT (0xfff8, 0x47f8),
371
372 /* BX (register) 0100 0111 0xxx xxxx */
373 /* BLX (register) 0100 0111 1xxx xxxx */
374 DECODE_SIMULATE (0xff00, 0x4700, t16_simulate_bxblx),
375
Jon Medhurst3b5940e2011-07-02 15:54:57 +0100376 /* ADD pc, pc 0100 0100 1111 1111 */
377 DECODE_REJECT (0xffff, 0x44ff),
378
379 /* ADD (register) 0100 0100 xxxx xxxx */
380 /* CMP (register) 0100 0101 xxxx xxxx */
381 /* MOV (register) 0100 0110 xxxx xxxx */
382 DECODE_CUSTOM (0xfc00, 0x4400, t16_decode_hiregs),
383
Jon Medhursta9c3c292011-07-02 15:51:03 +0100384 /*
Jon Medhurstf8695142011-07-02 16:00:09 +0100385 * Load from Literal Pool
386 * LDR (literal) 0100 1xxx xxxx xxxx
387 */
388 DECODE_SIMULATE (0xf800, 0x4800, t16_simulate_ldr_literal),
389
390 /*
391 * 16-bit Thumb Load/store instructions
392 * 0101 xxxx xxxx xxxx
393 * 011x xxxx xxxx xxxx
394 * 100x xxxx xxxx xxxx
395 */
396
397 /* STR (register) 0101 000x xxxx xxxx */
398 /* STRH (register) 0101 001x xxxx xxxx */
399 /* STRB (register) 0101 010x xxxx xxxx */
400 /* LDRSB (register) 0101 011x xxxx xxxx */
401 /* LDR (register) 0101 100x xxxx xxxx */
402 /* LDRH (register) 0101 101x xxxx xxxx */
403 /* LDRB (register) 0101 110x xxxx xxxx */
404 /* LDRSH (register) 0101 111x xxxx xxxx */
405 /* STR (immediate, Thumb) 0110 0xxx xxxx xxxx */
406 /* LDR (immediate, Thumb) 0110 1xxx xxxx xxxx */
407 /* STRB (immediate, Thumb) 0111 0xxx xxxx xxxx */
408 /* LDRB (immediate, Thumb) 0111 1xxx xxxx xxxx */
409 DECODE_EMULATE (0xc000, 0x4000, t16_emulate_loregs_rwflags),
410 /* STRH (immediate, Thumb) 1000 0xxx xxxx xxxx */
411 /* LDRH (immediate, Thumb) 1000 1xxx xxxx xxxx */
412 DECODE_EMULATE (0xf000, 0x8000, t16_emulate_loregs_rwflags),
413 /* STR (immediate, Thumb) 1001 0xxx xxxx xxxx */
414 /* LDR (immediate, Thumb) 1001 1xxx xxxx xxxx */
415 DECODE_SIMULATE (0xf000, 0x9000, t16_simulate_ldrstr_sp_relative),
416
417 /*
Jon Medhurst2f335822011-07-02 16:05:53 +0100418 * Generate PC-/SP-relative address
419 * ADR (literal) 1010 0xxx xxxx xxxx
420 * ADD (SP plus immediate) 1010 1xxx xxxx xxxx
421 */
422 DECODE_SIMULATE (0xf000, 0xa000, t16_simulate_reladr),
423
424 /*
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100425 * Miscellaneous 16-bit instructions
426 * 1011 xxxx xxxx xxxx
427 */
428 DECODE_TABLE (0xf000, 0xb000, t16_table_1011),
429
Jon Medhurstf8695142011-07-02 16:00:09 +0100430 /* STM 1100 0xxx xxxx xxxx */
431 /* LDM 1100 1xxx xxxx xxxx */
432 DECODE_EMULATE (0xf000, 0xc000, t16_emulate_loregs_rwflags),
433
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100434 DECODE_END
435};
436
Jon Medhursteaf4f33f2011-04-20 19:29:52 +0100437static unsigned long __kprobes thumb_check_cc(unsigned long cpsr)
438{
439 if (unlikely(in_it_block(cpsr)))
440 return kprobe_condition_checks[current_cond(cpsr)](cpsr);
441 return true;
442}
443
Jon Medhurstc6a7d972011-06-09 12:11:27 +0100444static void __kprobes thumb16_singlestep(struct kprobe *p, struct pt_regs *regs)
445{
446 regs->ARM_pc += 2;
447 p->ainsn.insn_handler(p, regs);
448 regs->ARM_cpsr = it_advance(regs->ARM_cpsr);
449}
450
451static void __kprobes thumb32_singlestep(struct kprobe *p, struct pt_regs *regs)
452{
453 regs->ARM_pc += 4;
454 p->ainsn.insn_handler(p, regs);
455 regs->ARM_cpsr = it_advance(regs->ARM_cpsr);
456}
457
Jon Medhurst24371702011-04-19 17:56:58 +0100458enum kprobe_insn __kprobes
459thumb16_kprobe_decode_insn(kprobe_opcode_t insn, struct arch_specific_insn *asi)
460{
Jon Medhurstc6a7d972011-06-09 12:11:27 +0100461 asi->insn_singlestep = thumb16_singlestep;
Jon Medhursteaf4f33f2011-04-20 19:29:52 +0100462 asi->insn_check_cc = thumb_check_cc;
Jon Medhurst3f92dfe2011-07-02 15:36:32 +0100463 return kprobe_decode_insn(insn, asi, kprobe_decode_thumb16_table, true);
Jon Medhurst24371702011-04-19 17:56:58 +0100464}
465
466enum kprobe_insn __kprobes
467thumb32_kprobe_decode_insn(kprobe_opcode_t insn, struct arch_specific_insn *asi)
468{
Jon Medhurstc6a7d972011-06-09 12:11:27 +0100469 asi->insn_singlestep = thumb32_singlestep;
Jon Medhursteaf4f33f2011-04-20 19:29:52 +0100470 asi->insn_check_cc = thumb_check_cc;
Jon Medhurst24371702011-04-19 17:56:58 +0100471 return INSN_REJECTED;
472}