]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - arch/arm64/kernel/probes/decode-insn.c
Merge branch 'timers-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[mirror_ubuntu-jammy-kernel.git] / arch / arm64 / kernel / probes / decode-insn.c
CommitLineData
1802d0be 1// SPDX-License-Identifier: GPL-2.0-only
2dd0e8d2
SP
2/*
3 * arch/arm64/kernel/probes/decode-insn.c
4 *
5 * Copyright (C) 2013 Linaro Limited.
2dd0e8d2
SP
6 */
7
8#include <linux/kernel.h>
9#include <linux/kprobes.h>
10#include <linux/module.h>
3e593f66 11#include <linux/kallsyms.h>
2dd0e8d2
SP
12#include <asm/insn.h>
13#include <asm/sections.h>
14
15#include "decode-insn.h"
39a67d49 16#include "simulate-insn.h"
2dd0e8d2
SP
17
18static bool __kprobes aarch64_insn_is_steppable(u32 insn)
19{
20 /*
21 * Branch instructions will write a new value into the PC which is
22 * likely to be relative to the XOL address and therefore invalid.
23 * Deliberate generation of an exception during stepping is also not
24 * currently safe. Lastly, MSR instructions can do any number of nasty
25 * things we can't handle during single-stepping.
26 */
27 if (aarch64_get_insn_class(insn) == AARCH64_INSN_CLS_BR_SYS) {
28 if (aarch64_insn_is_branch(insn) ||
29 aarch64_insn_is_msr_imm(insn) ||
30 aarch64_insn_is_msr_reg(insn) ||
31 aarch64_insn_is_exception(insn) ||
32 aarch64_insn_is_eret(insn))
33 return false;
34
35 /*
36 * The MRS instruction may not return a correct value when
37 * executing in the single-stepping environment. We do make one
38 * exception, for reading the DAIF bits.
39 */
40 if (aarch64_insn_is_mrs(insn))
41 return aarch64_insn_extract_system_reg(insn)
42 != AARCH64_INSN_SPCLREG_DAIF;
43
44 /*
45 * The HINT instruction is is problematic when single-stepping,
46 * except for the NOP case.
47 */
48 if (aarch64_insn_is_hint(insn))
49 return aarch64_insn_is_nop(insn);
50
51 return true;
52 }
53
54 /*
55 * Instructions which load PC relative literals are not going to work
56 * when executed from an XOL slot. Instructions doing an exclusive
57 * load/store are not going to complete successfully when single-step
58 * exception handling happens in the middle of the sequence.
59 */
60 if (aarch64_insn_uses_literal(insn) ||
61 aarch64_insn_is_exclusive(insn))
62 return false;
63
64 return true;
65}
66
67/* Return:
68 * INSN_REJECTED If instruction is one not allowed to kprobe,
69 * INSN_GOOD If instruction is supported and uses instruction slot,
39a67d49 70 * INSN_GOOD_NO_SLOT If instruction is supported but doesn't use its slot.
2dd0e8d2 71 */
c2249707
PA
72enum probe_insn __kprobes
73arm_probe_decode_insn(probe_opcode_t insn, struct arch_probe_insn *api)
2dd0e8d2
SP
74{
75 /*
76 * Instructions reading or modifying the PC won't work from the XOL
77 * slot.
78 */
79 if (aarch64_insn_is_steppable(insn))
80 return INSN_GOOD;
39a67d49
SP
81
82 if (aarch64_insn_is_bcond(insn)) {
c2249707 83 api->handler = simulate_b_cond;
39a67d49
SP
84 } else if (aarch64_insn_is_cbz(insn) ||
85 aarch64_insn_is_cbnz(insn)) {
c2249707 86 api->handler = simulate_cbz_cbnz;
39a67d49
SP
87 } else if (aarch64_insn_is_tbz(insn) ||
88 aarch64_insn_is_tbnz(insn)) {
c2249707 89 api->handler = simulate_tbz_tbnz;
39a67d49 90 } else if (aarch64_insn_is_adr_adrp(insn)) {
c2249707 91 api->handler = simulate_adr_adrp;
39a67d49
SP
92 } else if (aarch64_insn_is_b(insn) ||
93 aarch64_insn_is_bl(insn)) {
c2249707 94 api->handler = simulate_b_bl;
39a67d49
SP
95 } else if (aarch64_insn_is_br(insn) ||
96 aarch64_insn_is_blr(insn) ||
97 aarch64_insn_is_ret(insn)) {
c2249707 98 api->handler = simulate_br_blr_ret;
39a67d49 99 } else if (aarch64_insn_is_ldr_lit(insn)) {
c2249707 100 api->handler = simulate_ldr_literal;
39a67d49 101 } else if (aarch64_insn_is_ldrsw_lit(insn)) {
c2249707 102 api->handler = simulate_ldrsw_literal;
39a67d49
SP
103 } else {
104 /*
105 * Instruction cannot be stepped out-of-line and we don't
106 * (yet) simulate it.
107 */
2dd0e8d2 108 return INSN_REJECTED;
39a67d49
SP
109 }
110
111 return INSN_GOOD_NO_SLOT;
2dd0e8d2
SP
112}
113
c2249707 114#ifdef CONFIG_KPROBES
2dd0e8d2
SP
115static bool __kprobes
116is_probed_address_atomic(kprobe_opcode_t *scan_start, kprobe_opcode_t *scan_end)
117{
3e593f66 118 while (scan_start >= scan_end) {
2dd0e8d2
SP
119 /*
120 * atomic region starts from exclusive load and ends with
121 * exclusive store.
122 */
123 if (aarch64_insn_is_store_ex(le32_to_cpu(*scan_start)))
124 return false;
125 else if (aarch64_insn_is_load_ex(le32_to_cpu(*scan_start)))
126 return true;
127 scan_start--;
128 }
129
130 return false;
131}
132
c2249707 133enum probe_insn __kprobes
2dd0e8d2
SP
134arm_kprobe_decode_insn(kprobe_opcode_t *addr, struct arch_specific_insn *asi)
135{
c2249707
PA
136 enum probe_insn decoded;
137 probe_opcode_t insn = le32_to_cpu(*addr);
138 probe_opcode_t *scan_end = NULL;
3e593f66
DL
139 unsigned long size = 0, offset = 0;
140
141 /*
142 * If there's a symbol defined in front of and near enough to
143 * the probe address assume it is the entry point to this
144 * code and use it to further limit how far back we search
145 * when determining if we're in an atomic sequence. If we could
146 * not find any symbol skip the atomic test altogether as we
147 * could otherwise end up searching irrelevant text/literals.
148 * KPROBES depends on KALLSYMS so this last case should never
149 * happen.
150 */
151 if (kallsyms_lookup_size_offset((unsigned long) addr, &size, &offset)) {
152 if (offset < (MAX_ATOMIC_CONTEXT_SIZE*sizeof(kprobe_opcode_t)))
153 scan_end = addr - (offset / sizeof(kprobe_opcode_t));
154 else
155 scan_end = addr - MAX_ATOMIC_CONTEXT_SIZE;
2dd0e8d2 156 }
c2249707 157 decoded = arm_probe_decode_insn(insn, &asi->api);
2dd0e8d2 158
3e593f66
DL
159 if (decoded != INSN_REJECTED && scan_end)
160 if (is_probed_address_atomic(addr - 1, scan_end))
161 return INSN_REJECTED;
2dd0e8d2
SP
162
163 return decoded;
164}
c2249707 165#endif