1 // SPDX-License-Identifier: GPL-2.0-only 1 2 /* 3 * arch/arm64/kernel/probes/simulate-insn.c 4 * 5 * Copyright (C) 2013 Linaro Limited. 6 */ 7 8 #include <linux/bitops.h> 9 #include <linux/kernel.h> 10 #include <linux/kprobes.h> 11 12 #include <asm/ptrace.h> 13 #include <asm/traps.h> 14 15 #include "simulate-insn.h" 16 17 #define bbl_displacement(insn) \ 18 sign_extend32(((insn) & 0x3ffffff) << 19 20 #define bcond_displacement(insn) \ 21 sign_extend32(((insn >> 5) & 0x7ffff) 22 23 #define cbz_displacement(insn) \ 24 sign_extend32(((insn >> 5) & 0x7ffff) 25 26 #define tbz_displacement(insn) \ 27 sign_extend32(((insn >> 5) & 0x3fff) < 28 29 #define ldr_displacement(insn) \ 30 sign_extend32(((insn >> 5) & 0x7ffff) 31 32 static inline void set_x_reg(struct pt_regs *r 33 { 34 pt_regs_write_reg(regs, reg, val); 35 } 36 37 static inline void set_w_reg(struct pt_regs *r 38 { 39 pt_regs_write_reg(regs, reg, lower_32_ 40 } 41 42 static inline u64 get_x_reg(struct pt_regs *re 43 { 44 return pt_regs_read_reg(regs, reg); 45 } 46 47 static inline u32 get_w_reg(struct pt_regs *re 48 { 49 return lower_32_bits(pt_regs_read_reg( 50 } 51 52 static bool __kprobes check_cbz(u32 opcode, st 53 { 54 int xn = opcode & 0x1f; 55 56 return (opcode & (1 << 31)) ? 57 (get_x_reg(regs, xn) == 0) : (get_ 58 } 59 60 static bool __kprobes check_cbnz(u32 opcode, s 61 { 62 int xn = opcode & 0x1f; 63 64 return (opcode & (1 << 31)) ? 65 (get_x_reg(regs, xn) != 0) : (get_ 66 } 67 68 static bool __kprobes check_tbz(u32 opcode, st 69 { 70 int xn = opcode & 0x1f; 71 int bit_pos = ((opcode & (1 << 31)) >> 72 73 return ((get_x_reg(regs, xn) >> bit_po 74 } 75 76 static bool __kprobes check_tbnz(u32 opcode, s 77 { 78 int xn = opcode & 0x1f; 79 int bit_pos = ((opcode & (1 << 31)) >> 80 81 return ((get_x_reg(regs, xn) >> bit_po 82 } 83 84 /* 85 * instruction simulation functions 86 */ 87 void __kprobes 88 simulate_adr_adrp(u32 opcode, long addr, struc 89 { 90 long imm, xn, val; 91 92 xn = opcode & 0x1f; 93 imm = ((opcode >> 3) & 0x1ffffc) | ((o 94 imm = sign_extend64(imm, 20); 95 if (opcode & 0x80000000) 96 val = (imm<<12) + (addr & 0xff 97 else 98 val = imm + addr; 99 100 set_x_reg(regs, xn, val); 101 102 instruction_pointer_set(regs, instruct 103 } 104 105 void __kprobes 106 simulate_b_bl(u32 opcode, long addr, struct pt 107 { 108 int disp = bbl_displacement(opcode); 109 110 /* Link register is x30 */ 111 if (opcode & (1 << 31)) 112 set_x_reg(regs, 30, addr + 4); 113 114 instruction_pointer_set(regs, addr + d 115 } 116 117 void __kprobes 118 simulate_b_cond(u32 opcode, long addr, struct 119 { 120 int disp = 4; 121 122 if (aarch32_opcode_cond_checks[opcode 123 disp = bcond_displacement(opco 124 125 instruction_pointer_set(regs, addr + d 126 } 127 128 void __kprobes 129 simulate_br_blr_ret(u32 opcode, long addr, str 130 { 131 int xn = (opcode >> 5) & 0x1f; 132 133 /* update pc first in case we're doing 134 instruction_pointer_set(regs, get_x_re 135 136 /* Link register is x30 */ 137 if (((opcode >> 21) & 0x3) == 1) 138 set_x_reg(regs, 30, addr + 4); 139 } 140 141 void __kprobes 142 simulate_cbz_cbnz(u32 opcode, long addr, struc 143 { 144 int disp = 4; 145 146 if (opcode & (1 << 24)) { 147 if (check_cbnz(opcode, regs)) 148 disp = cbz_displacemen 149 } else { 150 if (check_cbz(opcode, regs)) 151 disp = cbz_displacemen 152 } 153 instruction_pointer_set(regs, addr + d 154 } 155 156 void __kprobes 157 simulate_tbz_tbnz(u32 opcode, long addr, struc 158 { 159 int disp = 4; 160 161 if (opcode & (1 << 24)) { 162 if (check_tbnz(opcode, regs)) 163 disp = tbz_displacemen 164 } else { 165 if (check_tbz(opcode, regs)) 166 disp = tbz_displacemen 167 } 168 instruction_pointer_set(regs, addr + d 169 } 170 171 void __kprobes 172 simulate_ldr_literal(u32 opcode, long addr, st 173 { 174 unsigned long load_addr; 175 int xn = opcode & 0x1f; 176 177 load_addr = addr + ldr_displacement(op 178 179 if (opcode & (1 << 30)) /* x0-x30 */ 180 set_x_reg(regs, xn, READ_ONCE( 181 else /* w0-w30 */ 182 set_w_reg(regs, xn, READ_ONCE( 183 184 instruction_pointer_set(regs, instruct 185 } 186 187 void __kprobes 188 simulate_ldrsw_literal(u32 opcode, long addr, 189 { 190 unsigned long load_addr; 191 int xn = opcode & 0x1f; 192 193 load_addr = addr + ldr_displacement(op 194 195 set_x_reg(regs, xn, READ_ONCE(*(s32 *) 196 197 instruction_pointer_set(regs, instruct 198 } 199
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.