1 // SPDX-License-Identifier: GPL-2.0-only
3 * arch/arm64/kernel/probes/decode-insn.c
5 * Copyright (C) 2013 Linaro Limited.
8 #include <linux/kernel.h>
9 #include <linux/kprobes.h>
10 #include <linux/module.h>
11 #include <linux/kallsyms.h>
13 #include <asm/sections.h>
15 #include "decode-insn.h"
16 #include "simulate-insn.h"
18 static bool __kprobes
aarch64_insn_is_steppable(u32 insn
)
21 * Branch instructions will write a new value into the PC which is
22 * likely to be relative to the XOL address and therefore invalid.
23 * Deliberate generation of an exception during stepping is also not
24 * currently safe. Lastly, MSR instructions can do any number of nasty
25 * things we can't handle during single-stepping.
27 if (aarch64_insn_is_class_branch_sys(insn
)) {
28 if (aarch64_insn_is_branch(insn
) ||
29 aarch64_insn_is_msr_imm(insn
) ||
30 aarch64_insn_is_msr_reg(insn
) ||
31 aarch64_insn_is_exception(insn
) ||
32 aarch64_insn_is_eret(insn
) ||
33 aarch64_insn_is_eret_auth(insn
))
37 * The MRS instruction may not return a correct value when
38 * executing in the single-stepping environment. We do make one
39 * exception, for reading the DAIF bits.
41 if (aarch64_insn_is_mrs(insn
))
42 return aarch64_insn_extract_system_reg(insn
)
43 != AARCH64_INSN_SPCLREG_DAIF
;
46 * The HINT instruction is steppable only if it is in whitelist
47 * and the rest of other such instructions are blocked for
48 * single stepping as they may cause exception or other
49 * unintended behaviour.
51 if (aarch64_insn_is_hint(insn
))
52 return aarch64_insn_is_steppable_hint(insn
);
58 * Instructions which load PC relative literals are not going to work
59 * when executed from an XOL slot. Instructions doing an exclusive
60 * load/store are not going to complete successfully when single-step
61 * exception handling happens in the middle of the sequence. Memory
62 * copy/set instructions require that all three instructions be placed
63 * consecutively in memory.
65 if (aarch64_insn_uses_literal(insn
) ||
66 aarch64_insn_is_exclusive(insn
) ||
67 aarch64_insn_is_mops(insn
))
74 * INSN_REJECTED If instruction is one not allowed to kprobe,
75 * INSN_GOOD If instruction is supported and uses instruction slot,
76 * INSN_GOOD_NO_SLOT If instruction is supported but doesn't use its slot.
78 enum probe_insn __kprobes
79 arm_probe_decode_insn(u32 insn
, struct arch_probe_insn
*api
)
82 * While 'nop' instruction can execute in the out-of-line slot,
83 * simulating them in breakpoint handling offers better performance.
85 if (aarch64_insn_is_nop(insn
)) {
86 api
->handler
= simulate_nop
;
87 return INSN_GOOD_NO_SLOT
;
91 * Instructions reading or modifying the PC won't work from the XOL
94 if (aarch64_insn_is_steppable(insn
))
97 if (aarch64_insn_is_bcond(insn
)) {
98 api
->handler
= simulate_b_cond
;
99 } else if (aarch64_insn_is_cbz(insn
) ||
100 aarch64_insn_is_cbnz(insn
)) {
101 api
->handler
= simulate_cbz_cbnz
;
102 } else if (aarch64_insn_is_tbz(insn
) ||
103 aarch64_insn_is_tbnz(insn
)) {
104 api
->handler
= simulate_tbz_tbnz
;
105 } else if (aarch64_insn_is_adr_adrp(insn
)) {
106 api
->handler
= simulate_adr_adrp
;
107 } else if (aarch64_insn_is_b(insn
) ||
108 aarch64_insn_is_bl(insn
)) {
109 api
->handler
= simulate_b_bl
;
110 } else if (aarch64_insn_is_br(insn
) ||
111 aarch64_insn_is_blr(insn
) ||
112 aarch64_insn_is_ret(insn
)) {
113 api
->handler
= simulate_br_blr_ret
;
116 * Instruction cannot be stepped out-of-line and we don't
119 return INSN_REJECTED
;
122 return INSN_GOOD_NO_SLOT
;
125 #ifdef CONFIG_KPROBES
126 static bool __kprobes
127 is_probed_address_atomic(kprobe_opcode_t
*scan_start
, kprobe_opcode_t
*scan_end
)
129 while (scan_start
>= scan_end
) {
131 * atomic region starts from exclusive load and ends with
134 if (aarch64_insn_is_store_ex(le32_to_cpu(*scan_start
)))
136 else if (aarch64_insn_is_load_ex(le32_to_cpu(*scan_start
)))
144 enum probe_insn __kprobes
145 arm_kprobe_decode_insn(kprobe_opcode_t
*addr
, struct arch_specific_insn
*asi
)
147 enum probe_insn decoded
;
148 u32 insn
= le32_to_cpu(*addr
);
149 kprobe_opcode_t
*scan_end
= NULL
;
150 unsigned long size
= 0, offset
= 0;
151 struct arch_probe_insn
*api
= &asi
->api
;
153 if (aarch64_insn_is_ldr_lit(insn
)) {
154 api
->handler
= simulate_ldr_literal
;
155 decoded
= INSN_GOOD_NO_SLOT
;
156 } else if (aarch64_insn_is_ldrsw_lit(insn
)) {
157 api
->handler
= simulate_ldrsw_literal
;
158 decoded
= INSN_GOOD_NO_SLOT
;
160 decoded
= arm_probe_decode_insn(insn
, &asi
->api
);
164 * If there's a symbol defined in front of and near enough to
165 * the probe address assume it is the entry point to this
166 * code and use it to further limit how far back we search
167 * when determining if we're in an atomic sequence. If we could
168 * not find any symbol skip the atomic test altogether as we
169 * could otherwise end up searching irrelevant text/literals.
170 * KPROBES depends on KALLSYMS so this last case should never
173 if (kallsyms_lookup_size_offset((unsigned long) addr
, &size
, &offset
)) {
174 if (offset
< (MAX_ATOMIC_CONTEXT_SIZE
*sizeof(kprobe_opcode_t
)))
175 scan_end
= addr
- (offset
/ sizeof(kprobe_opcode_t
));
177 scan_end
= addr
- MAX_ATOMIC_CONTEXT_SIZE
;
180 if (decoded
!= INSN_REJECTED
&& scan_end
)
181 if (is_probed_address_atomic(addr
- 1, scan_end
))
182 return INSN_REJECTED
;