1*9880d681SAndroid Build Coastguard Worker //===-- X86DisassemblerDecoder.cpp - Disassembler decoder -----------------===//
2*9880d681SAndroid Build Coastguard Worker //
3*9880d681SAndroid Build Coastguard Worker // The LLVM Compiler Infrastructure
4*9880d681SAndroid Build Coastguard Worker //
5*9880d681SAndroid Build Coastguard Worker // This file is distributed under the University of Illinois Open Source
6*9880d681SAndroid Build Coastguard Worker // License. See LICENSE.TXT for details.
7*9880d681SAndroid Build Coastguard Worker //
8*9880d681SAndroid Build Coastguard Worker //===----------------------------------------------------------------------===//
9*9880d681SAndroid Build Coastguard Worker //
10*9880d681SAndroid Build Coastguard Worker // This file is part of the X86 Disassembler.
11*9880d681SAndroid Build Coastguard Worker // It contains the implementation of the instruction decoder.
12*9880d681SAndroid Build Coastguard Worker // Documentation for the disassembler can be found in X86Disassembler.h.
13*9880d681SAndroid Build Coastguard Worker //
14*9880d681SAndroid Build Coastguard Worker //===----------------------------------------------------------------------===//
15*9880d681SAndroid Build Coastguard Worker
16*9880d681SAndroid Build Coastguard Worker #include <cstdarg> /* for va_*() */
17*9880d681SAndroid Build Coastguard Worker #include <cstdio> /* for vsnprintf() */
18*9880d681SAndroid Build Coastguard Worker #include <cstdlib> /* for exit() */
19*9880d681SAndroid Build Coastguard Worker #include <cstring> /* for memset() */
20*9880d681SAndroid Build Coastguard Worker
21*9880d681SAndroid Build Coastguard Worker #include "X86DisassemblerDecoder.h"
22*9880d681SAndroid Build Coastguard Worker
23*9880d681SAndroid Build Coastguard Worker using namespace llvm::X86Disassembler;
24*9880d681SAndroid Build Coastguard Worker
25*9880d681SAndroid Build Coastguard Worker /// Specifies whether a ModR/M byte is needed and (if so) which
26*9880d681SAndroid Build Coastguard Worker /// instruction each possible value of the ModR/M byte corresponds to. Once
27*9880d681SAndroid Build Coastguard Worker /// this information is known, we have narrowed down to a single instruction.
28*9880d681SAndroid Build Coastguard Worker struct ModRMDecision {
29*9880d681SAndroid Build Coastguard Worker uint8_t modrm_type;
30*9880d681SAndroid Build Coastguard Worker uint16_t instructionIDs;
31*9880d681SAndroid Build Coastguard Worker };
32*9880d681SAndroid Build Coastguard Worker
33*9880d681SAndroid Build Coastguard Worker /// Specifies which set of ModR/M->instruction tables to look at
34*9880d681SAndroid Build Coastguard Worker /// given a particular opcode.
35*9880d681SAndroid Build Coastguard Worker struct OpcodeDecision {
36*9880d681SAndroid Build Coastguard Worker ModRMDecision modRMDecisions[256];
37*9880d681SAndroid Build Coastguard Worker };
38*9880d681SAndroid Build Coastguard Worker
39*9880d681SAndroid Build Coastguard Worker /// Specifies which opcode->instruction tables to look at given
40*9880d681SAndroid Build Coastguard Worker /// a particular context (set of attributes). Since there are many possible
41*9880d681SAndroid Build Coastguard Worker /// contexts, the decoder first uses CONTEXTS_SYM to determine which context
42*9880d681SAndroid Build Coastguard Worker /// applies given a specific set of attributes. Hence there are only IC_max
43*9880d681SAndroid Build Coastguard Worker /// entries in this table, rather than 2^(ATTR_max).
44*9880d681SAndroid Build Coastguard Worker struct ContextDecision {
45*9880d681SAndroid Build Coastguard Worker OpcodeDecision opcodeDecisions[IC_max];
46*9880d681SAndroid Build Coastguard Worker };
47*9880d681SAndroid Build Coastguard Worker
48*9880d681SAndroid Build Coastguard Worker #include "X86GenDisassemblerTables.inc"
49*9880d681SAndroid Build Coastguard Worker
50*9880d681SAndroid Build Coastguard Worker #ifndef NDEBUG
51*9880d681SAndroid Build Coastguard Worker #define debug(s) do { Debug(__FILE__, __LINE__, s); } while (0)
52*9880d681SAndroid Build Coastguard Worker #else
53*9880d681SAndroid Build Coastguard Worker #define debug(s) do { } while (0)
54*9880d681SAndroid Build Coastguard Worker #endif
55*9880d681SAndroid Build Coastguard Worker
56*9880d681SAndroid Build Coastguard Worker /*
57*9880d681SAndroid Build Coastguard Worker * contextForAttrs - Client for the instruction context table. Takes a set of
58*9880d681SAndroid Build Coastguard Worker * attributes and returns the appropriate decode context.
59*9880d681SAndroid Build Coastguard Worker *
60*9880d681SAndroid Build Coastguard Worker * @param attrMask - Attributes, from the enumeration attributeBits.
61*9880d681SAndroid Build Coastguard Worker * @return - The InstructionContext to use when looking up an
62*9880d681SAndroid Build Coastguard Worker * an instruction with these attributes.
63*9880d681SAndroid Build Coastguard Worker */
contextForAttrs(uint16_t attrMask)64*9880d681SAndroid Build Coastguard Worker static InstructionContext contextForAttrs(uint16_t attrMask) {
65*9880d681SAndroid Build Coastguard Worker return static_cast<InstructionContext>(CONTEXTS_SYM[attrMask]);
66*9880d681SAndroid Build Coastguard Worker }
67*9880d681SAndroid Build Coastguard Worker
68*9880d681SAndroid Build Coastguard Worker /*
69*9880d681SAndroid Build Coastguard Worker * modRMRequired - Reads the appropriate instruction table to determine whether
70*9880d681SAndroid Build Coastguard Worker * the ModR/M byte is required to decode a particular instruction.
71*9880d681SAndroid Build Coastguard Worker *
72*9880d681SAndroid Build Coastguard Worker * @param type - The opcode type (i.e., how many bytes it has).
73*9880d681SAndroid Build Coastguard Worker * @param insnContext - The context for the instruction, as returned by
74*9880d681SAndroid Build Coastguard Worker * contextForAttrs.
75*9880d681SAndroid Build Coastguard Worker * @param opcode - The last byte of the instruction's opcode, not counting
76*9880d681SAndroid Build Coastguard Worker * ModR/M extensions and escapes.
77*9880d681SAndroid Build Coastguard Worker * @return - true if the ModR/M byte is required, false otherwise.
78*9880d681SAndroid Build Coastguard Worker */
modRMRequired(OpcodeType type,InstructionContext insnContext,uint16_t opcode)79*9880d681SAndroid Build Coastguard Worker static int modRMRequired(OpcodeType type,
80*9880d681SAndroid Build Coastguard Worker InstructionContext insnContext,
81*9880d681SAndroid Build Coastguard Worker uint16_t opcode) {
82*9880d681SAndroid Build Coastguard Worker const struct ContextDecision* decision = nullptr;
83*9880d681SAndroid Build Coastguard Worker
84*9880d681SAndroid Build Coastguard Worker switch (type) {
85*9880d681SAndroid Build Coastguard Worker case ONEBYTE:
86*9880d681SAndroid Build Coastguard Worker decision = &ONEBYTE_SYM;
87*9880d681SAndroid Build Coastguard Worker break;
88*9880d681SAndroid Build Coastguard Worker case TWOBYTE:
89*9880d681SAndroid Build Coastguard Worker decision = &TWOBYTE_SYM;
90*9880d681SAndroid Build Coastguard Worker break;
91*9880d681SAndroid Build Coastguard Worker case THREEBYTE_38:
92*9880d681SAndroid Build Coastguard Worker decision = &THREEBYTE38_SYM;
93*9880d681SAndroid Build Coastguard Worker break;
94*9880d681SAndroid Build Coastguard Worker case THREEBYTE_3A:
95*9880d681SAndroid Build Coastguard Worker decision = &THREEBYTE3A_SYM;
96*9880d681SAndroid Build Coastguard Worker break;
97*9880d681SAndroid Build Coastguard Worker case XOP8_MAP:
98*9880d681SAndroid Build Coastguard Worker decision = &XOP8_MAP_SYM;
99*9880d681SAndroid Build Coastguard Worker break;
100*9880d681SAndroid Build Coastguard Worker case XOP9_MAP:
101*9880d681SAndroid Build Coastguard Worker decision = &XOP9_MAP_SYM;
102*9880d681SAndroid Build Coastguard Worker break;
103*9880d681SAndroid Build Coastguard Worker case XOPA_MAP:
104*9880d681SAndroid Build Coastguard Worker decision = &XOPA_MAP_SYM;
105*9880d681SAndroid Build Coastguard Worker break;
106*9880d681SAndroid Build Coastguard Worker }
107*9880d681SAndroid Build Coastguard Worker
108*9880d681SAndroid Build Coastguard Worker return decision->opcodeDecisions[insnContext].modRMDecisions[opcode].
109*9880d681SAndroid Build Coastguard Worker modrm_type != MODRM_ONEENTRY;
110*9880d681SAndroid Build Coastguard Worker }
111*9880d681SAndroid Build Coastguard Worker
112*9880d681SAndroid Build Coastguard Worker /*
113*9880d681SAndroid Build Coastguard Worker * decode - Reads the appropriate instruction table to obtain the unique ID of
114*9880d681SAndroid Build Coastguard Worker * an instruction.
115*9880d681SAndroid Build Coastguard Worker *
116*9880d681SAndroid Build Coastguard Worker * @param type - See modRMRequired().
117*9880d681SAndroid Build Coastguard Worker * @param insnContext - See modRMRequired().
118*9880d681SAndroid Build Coastguard Worker * @param opcode - See modRMRequired().
119*9880d681SAndroid Build Coastguard Worker * @param modRM - The ModR/M byte if required, or any value if not.
120*9880d681SAndroid Build Coastguard Worker * @return - The UID of the instruction, or 0 on failure.
121*9880d681SAndroid Build Coastguard Worker */
decode(OpcodeType type,InstructionContext insnContext,uint8_t opcode,uint8_t modRM)122*9880d681SAndroid Build Coastguard Worker static InstrUID decode(OpcodeType type,
123*9880d681SAndroid Build Coastguard Worker InstructionContext insnContext,
124*9880d681SAndroid Build Coastguard Worker uint8_t opcode,
125*9880d681SAndroid Build Coastguard Worker uint8_t modRM) {
126*9880d681SAndroid Build Coastguard Worker const struct ModRMDecision* dec = nullptr;
127*9880d681SAndroid Build Coastguard Worker
128*9880d681SAndroid Build Coastguard Worker switch (type) {
129*9880d681SAndroid Build Coastguard Worker case ONEBYTE:
130*9880d681SAndroid Build Coastguard Worker dec = &ONEBYTE_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
131*9880d681SAndroid Build Coastguard Worker break;
132*9880d681SAndroid Build Coastguard Worker case TWOBYTE:
133*9880d681SAndroid Build Coastguard Worker dec = &TWOBYTE_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
134*9880d681SAndroid Build Coastguard Worker break;
135*9880d681SAndroid Build Coastguard Worker case THREEBYTE_38:
136*9880d681SAndroid Build Coastguard Worker dec = &THREEBYTE38_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
137*9880d681SAndroid Build Coastguard Worker break;
138*9880d681SAndroid Build Coastguard Worker case THREEBYTE_3A:
139*9880d681SAndroid Build Coastguard Worker dec = &THREEBYTE3A_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
140*9880d681SAndroid Build Coastguard Worker break;
141*9880d681SAndroid Build Coastguard Worker case XOP8_MAP:
142*9880d681SAndroid Build Coastguard Worker dec = &XOP8_MAP_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
143*9880d681SAndroid Build Coastguard Worker break;
144*9880d681SAndroid Build Coastguard Worker case XOP9_MAP:
145*9880d681SAndroid Build Coastguard Worker dec = &XOP9_MAP_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
146*9880d681SAndroid Build Coastguard Worker break;
147*9880d681SAndroid Build Coastguard Worker case XOPA_MAP:
148*9880d681SAndroid Build Coastguard Worker dec = &XOPA_MAP_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
149*9880d681SAndroid Build Coastguard Worker break;
150*9880d681SAndroid Build Coastguard Worker }
151*9880d681SAndroid Build Coastguard Worker
152*9880d681SAndroid Build Coastguard Worker switch (dec->modrm_type) {
153*9880d681SAndroid Build Coastguard Worker default:
154*9880d681SAndroid Build Coastguard Worker debug("Corrupt table! Unknown modrm_type");
155*9880d681SAndroid Build Coastguard Worker return 0;
156*9880d681SAndroid Build Coastguard Worker case MODRM_ONEENTRY:
157*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs];
158*9880d681SAndroid Build Coastguard Worker case MODRM_SPLITRM:
159*9880d681SAndroid Build Coastguard Worker if (modFromModRM(modRM) == 0x3)
160*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs+1];
161*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs];
162*9880d681SAndroid Build Coastguard Worker case MODRM_SPLITREG:
163*9880d681SAndroid Build Coastguard Worker if (modFromModRM(modRM) == 0x3)
164*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs+((modRM & 0x38) >> 3)+8];
165*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs+((modRM & 0x38) >> 3)];
166*9880d681SAndroid Build Coastguard Worker case MODRM_SPLITMISC:
167*9880d681SAndroid Build Coastguard Worker if (modFromModRM(modRM) == 0x3)
168*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs+(modRM & 0x3f)+8];
169*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs+((modRM & 0x38) >> 3)];
170*9880d681SAndroid Build Coastguard Worker case MODRM_FULL:
171*9880d681SAndroid Build Coastguard Worker return modRMTable[dec->instructionIDs+modRM];
172*9880d681SAndroid Build Coastguard Worker }
173*9880d681SAndroid Build Coastguard Worker }
174*9880d681SAndroid Build Coastguard Worker
175*9880d681SAndroid Build Coastguard Worker /*
176*9880d681SAndroid Build Coastguard Worker * specifierForUID - Given a UID, returns the name and operand specification for
177*9880d681SAndroid Build Coastguard Worker * that instruction.
178*9880d681SAndroid Build Coastguard Worker *
179*9880d681SAndroid Build Coastguard Worker * @param uid - The unique ID for the instruction. This should be returned by
180*9880d681SAndroid Build Coastguard Worker * decode(); specifierForUID will not check bounds.
181*9880d681SAndroid Build Coastguard Worker * @return - A pointer to the specification for that instruction.
182*9880d681SAndroid Build Coastguard Worker */
specifierForUID(InstrUID uid)183*9880d681SAndroid Build Coastguard Worker static const struct InstructionSpecifier *specifierForUID(InstrUID uid) {
184*9880d681SAndroid Build Coastguard Worker return &INSTRUCTIONS_SYM[uid];
185*9880d681SAndroid Build Coastguard Worker }
186*9880d681SAndroid Build Coastguard Worker
187*9880d681SAndroid Build Coastguard Worker /*
188*9880d681SAndroid Build Coastguard Worker * consumeByte - Uses the reader function provided by the user to consume one
189*9880d681SAndroid Build Coastguard Worker * byte from the instruction's memory and advance the cursor.
190*9880d681SAndroid Build Coastguard Worker *
191*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction with the reader function to use. The cursor
192*9880d681SAndroid Build Coastguard Worker * for this instruction is advanced.
193*9880d681SAndroid Build Coastguard Worker * @param byte - A pointer to a pre-allocated memory buffer to be populated
194*9880d681SAndroid Build Coastguard Worker * with the data read.
195*9880d681SAndroid Build Coastguard Worker * @return - 0 if the read was successful; nonzero otherwise.
196*9880d681SAndroid Build Coastguard Worker */
consumeByte(struct InternalInstruction * insn,uint8_t * byte)197*9880d681SAndroid Build Coastguard Worker static int consumeByte(struct InternalInstruction* insn, uint8_t* byte) {
198*9880d681SAndroid Build Coastguard Worker int ret = insn->reader(insn->readerArg, byte, insn->readerCursor);
199*9880d681SAndroid Build Coastguard Worker
200*9880d681SAndroid Build Coastguard Worker if (!ret)
201*9880d681SAndroid Build Coastguard Worker ++(insn->readerCursor);
202*9880d681SAndroid Build Coastguard Worker
203*9880d681SAndroid Build Coastguard Worker return ret;
204*9880d681SAndroid Build Coastguard Worker }
205*9880d681SAndroid Build Coastguard Worker
206*9880d681SAndroid Build Coastguard Worker /*
207*9880d681SAndroid Build Coastguard Worker * lookAtByte - Like consumeByte, but does not advance the cursor.
208*9880d681SAndroid Build Coastguard Worker *
209*9880d681SAndroid Build Coastguard Worker * @param insn - See consumeByte().
210*9880d681SAndroid Build Coastguard Worker * @param byte - See consumeByte().
211*9880d681SAndroid Build Coastguard Worker * @return - See consumeByte().
212*9880d681SAndroid Build Coastguard Worker */
lookAtByte(struct InternalInstruction * insn,uint8_t * byte)213*9880d681SAndroid Build Coastguard Worker static int lookAtByte(struct InternalInstruction* insn, uint8_t* byte) {
214*9880d681SAndroid Build Coastguard Worker return insn->reader(insn->readerArg, byte, insn->readerCursor);
215*9880d681SAndroid Build Coastguard Worker }
216*9880d681SAndroid Build Coastguard Worker
unconsumeByte(struct InternalInstruction * insn)217*9880d681SAndroid Build Coastguard Worker static void unconsumeByte(struct InternalInstruction* insn) {
218*9880d681SAndroid Build Coastguard Worker insn->readerCursor--;
219*9880d681SAndroid Build Coastguard Worker }
220*9880d681SAndroid Build Coastguard Worker
221*9880d681SAndroid Build Coastguard Worker #define CONSUME_FUNC(name, type) \
222*9880d681SAndroid Build Coastguard Worker static int name(struct InternalInstruction* insn, type* ptr) { \
223*9880d681SAndroid Build Coastguard Worker type combined = 0; \
224*9880d681SAndroid Build Coastguard Worker unsigned offset; \
225*9880d681SAndroid Build Coastguard Worker for (offset = 0; offset < sizeof(type); ++offset) { \
226*9880d681SAndroid Build Coastguard Worker uint8_t byte; \
227*9880d681SAndroid Build Coastguard Worker int ret = insn->reader(insn->readerArg, \
228*9880d681SAndroid Build Coastguard Worker &byte, \
229*9880d681SAndroid Build Coastguard Worker insn->readerCursor + offset); \
230*9880d681SAndroid Build Coastguard Worker if (ret) \
231*9880d681SAndroid Build Coastguard Worker return ret; \
232*9880d681SAndroid Build Coastguard Worker combined = combined | ((uint64_t)byte << (offset * 8)); \
233*9880d681SAndroid Build Coastguard Worker } \
234*9880d681SAndroid Build Coastguard Worker *ptr = combined; \
235*9880d681SAndroid Build Coastguard Worker insn->readerCursor += sizeof(type); \
236*9880d681SAndroid Build Coastguard Worker return 0; \
237*9880d681SAndroid Build Coastguard Worker }
238*9880d681SAndroid Build Coastguard Worker
239*9880d681SAndroid Build Coastguard Worker /*
240*9880d681SAndroid Build Coastguard Worker * consume* - Use the reader function provided by the user to consume data
241*9880d681SAndroid Build Coastguard Worker * values of various sizes from the instruction's memory and advance the
242*9880d681SAndroid Build Coastguard Worker * cursor appropriately. These readers perform endian conversion.
243*9880d681SAndroid Build Coastguard Worker *
244*9880d681SAndroid Build Coastguard Worker * @param insn - See consumeByte().
245*9880d681SAndroid Build Coastguard Worker * @param ptr - A pointer to a pre-allocated memory of appropriate size to
246*9880d681SAndroid Build Coastguard Worker * be populated with the data read.
247*9880d681SAndroid Build Coastguard Worker * @return - See consumeByte().
248*9880d681SAndroid Build Coastguard Worker */
CONSUME_FUNC(consumeInt8,int8_t)249*9880d681SAndroid Build Coastguard Worker CONSUME_FUNC(consumeInt8, int8_t)
250*9880d681SAndroid Build Coastguard Worker CONSUME_FUNC(consumeInt16, int16_t)
251*9880d681SAndroid Build Coastguard Worker CONSUME_FUNC(consumeInt32, int32_t)
252*9880d681SAndroid Build Coastguard Worker CONSUME_FUNC(consumeUInt16, uint16_t)
253*9880d681SAndroid Build Coastguard Worker CONSUME_FUNC(consumeUInt32, uint32_t)
254*9880d681SAndroid Build Coastguard Worker CONSUME_FUNC(consumeUInt64, uint64_t)
255*9880d681SAndroid Build Coastguard Worker
256*9880d681SAndroid Build Coastguard Worker /*
257*9880d681SAndroid Build Coastguard Worker * dbgprintf - Uses the logging function provided by the user to log a single
258*9880d681SAndroid Build Coastguard Worker * message, typically without a carriage-return.
259*9880d681SAndroid Build Coastguard Worker *
260*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction containing the logging function.
261*9880d681SAndroid Build Coastguard Worker * @param format - See printf().
262*9880d681SAndroid Build Coastguard Worker * @param ... - See printf().
263*9880d681SAndroid Build Coastguard Worker */
264*9880d681SAndroid Build Coastguard Worker static void dbgprintf(struct InternalInstruction* insn,
265*9880d681SAndroid Build Coastguard Worker const char* format,
266*9880d681SAndroid Build Coastguard Worker ...) {
267*9880d681SAndroid Build Coastguard Worker char buffer[256];
268*9880d681SAndroid Build Coastguard Worker va_list ap;
269*9880d681SAndroid Build Coastguard Worker
270*9880d681SAndroid Build Coastguard Worker if (!insn->dlog)
271*9880d681SAndroid Build Coastguard Worker return;
272*9880d681SAndroid Build Coastguard Worker
273*9880d681SAndroid Build Coastguard Worker va_start(ap, format);
274*9880d681SAndroid Build Coastguard Worker (void)vsnprintf(buffer, sizeof(buffer), format, ap);
275*9880d681SAndroid Build Coastguard Worker va_end(ap);
276*9880d681SAndroid Build Coastguard Worker
277*9880d681SAndroid Build Coastguard Worker insn->dlog(insn->dlogArg, buffer);
278*9880d681SAndroid Build Coastguard Worker }
279*9880d681SAndroid Build Coastguard Worker
280*9880d681SAndroid Build Coastguard Worker /*
281*9880d681SAndroid Build Coastguard Worker * setPrefixPresent - Marks that a particular prefix is present at a particular
282*9880d681SAndroid Build Coastguard Worker * location.
283*9880d681SAndroid Build Coastguard Worker *
284*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction to be marked as having the prefix.
285*9880d681SAndroid Build Coastguard Worker * @param prefix - The prefix that is present.
286*9880d681SAndroid Build Coastguard Worker * @param location - The location where the prefix is located (in the address
287*9880d681SAndroid Build Coastguard Worker * space of the instruction's reader).
288*9880d681SAndroid Build Coastguard Worker */
setPrefixPresent(struct InternalInstruction * insn,uint8_t prefix,uint64_t location)289*9880d681SAndroid Build Coastguard Worker static void setPrefixPresent(struct InternalInstruction* insn,
290*9880d681SAndroid Build Coastguard Worker uint8_t prefix,
291*9880d681SAndroid Build Coastguard Worker uint64_t location)
292*9880d681SAndroid Build Coastguard Worker {
293*9880d681SAndroid Build Coastguard Worker insn->prefixPresent[prefix] = 1;
294*9880d681SAndroid Build Coastguard Worker insn->prefixLocations[prefix] = location;
295*9880d681SAndroid Build Coastguard Worker }
296*9880d681SAndroid Build Coastguard Worker
297*9880d681SAndroid Build Coastguard Worker /*
298*9880d681SAndroid Build Coastguard Worker * isPrefixAtLocation - Queries an instruction to determine whether a prefix is
299*9880d681SAndroid Build Coastguard Worker * present at a given location.
300*9880d681SAndroid Build Coastguard Worker *
301*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction to be queried.
302*9880d681SAndroid Build Coastguard Worker * @param prefix - The prefix.
303*9880d681SAndroid Build Coastguard Worker * @param location - The location to query.
304*9880d681SAndroid Build Coastguard Worker * @return - Whether the prefix is at that location.
305*9880d681SAndroid Build Coastguard Worker */
isPrefixAtLocation(struct InternalInstruction * insn,uint8_t prefix,uint64_t location)306*9880d681SAndroid Build Coastguard Worker static bool isPrefixAtLocation(struct InternalInstruction* insn,
307*9880d681SAndroid Build Coastguard Worker uint8_t prefix,
308*9880d681SAndroid Build Coastguard Worker uint64_t location)
309*9880d681SAndroid Build Coastguard Worker {
310*9880d681SAndroid Build Coastguard Worker return insn->prefixPresent[prefix] == 1 &&
311*9880d681SAndroid Build Coastguard Worker insn->prefixLocations[prefix] == location;
312*9880d681SAndroid Build Coastguard Worker }
313*9880d681SAndroid Build Coastguard Worker
314*9880d681SAndroid Build Coastguard Worker /*
315*9880d681SAndroid Build Coastguard Worker * readPrefixes - Consumes all of an instruction's prefix bytes, and marks the
316*9880d681SAndroid Build Coastguard Worker * instruction as having them. Also sets the instruction's default operand,
317*9880d681SAndroid Build Coastguard Worker * address, and other relevant data sizes to report operands correctly.
318*9880d681SAndroid Build Coastguard Worker *
319*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose prefixes are to be read.
320*9880d681SAndroid Build Coastguard Worker * @return - 0 if the instruction could be read until the end of the prefix
321*9880d681SAndroid Build Coastguard Worker * bytes, and no prefixes conflicted; nonzero otherwise.
322*9880d681SAndroid Build Coastguard Worker */
readPrefixes(struct InternalInstruction * insn)323*9880d681SAndroid Build Coastguard Worker static int readPrefixes(struct InternalInstruction* insn) {
324*9880d681SAndroid Build Coastguard Worker bool isPrefix = true;
325*9880d681SAndroid Build Coastguard Worker bool prefixGroups[4] = { false };
326*9880d681SAndroid Build Coastguard Worker uint64_t prefixLocation;
327*9880d681SAndroid Build Coastguard Worker uint8_t byte = 0;
328*9880d681SAndroid Build Coastguard Worker uint8_t nextByte;
329*9880d681SAndroid Build Coastguard Worker
330*9880d681SAndroid Build Coastguard Worker bool hasAdSize = false;
331*9880d681SAndroid Build Coastguard Worker bool hasOpSize = false;
332*9880d681SAndroid Build Coastguard Worker
333*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readPrefixes()");
334*9880d681SAndroid Build Coastguard Worker
335*9880d681SAndroid Build Coastguard Worker while (isPrefix) {
336*9880d681SAndroid Build Coastguard Worker prefixLocation = insn->readerCursor;
337*9880d681SAndroid Build Coastguard Worker
338*9880d681SAndroid Build Coastguard Worker /* If we fail reading prefixes, just stop here and let the opcode reader deal with it */
339*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &byte))
340*9880d681SAndroid Build Coastguard Worker break;
341*9880d681SAndroid Build Coastguard Worker
342*9880d681SAndroid Build Coastguard Worker /*
343*9880d681SAndroid Build Coastguard Worker * If the byte is a LOCK/REP/REPNE prefix and not a part of the opcode, then
344*9880d681SAndroid Build Coastguard Worker * break and let it be disassembled as a normal "instruction".
345*9880d681SAndroid Build Coastguard Worker */
346*9880d681SAndroid Build Coastguard Worker if (insn->readerCursor - 1 == insn->startLocation && byte == 0xf0)
347*9880d681SAndroid Build Coastguard Worker break;
348*9880d681SAndroid Build Coastguard Worker
349*9880d681SAndroid Build Coastguard Worker if (insn->readerCursor - 1 == insn->startLocation
350*9880d681SAndroid Build Coastguard Worker && (byte == 0xf2 || byte == 0xf3)
351*9880d681SAndroid Build Coastguard Worker && !lookAtByte(insn, &nextByte))
352*9880d681SAndroid Build Coastguard Worker {
353*9880d681SAndroid Build Coastguard Worker /*
354*9880d681SAndroid Build Coastguard Worker * If the byte is 0xf2 or 0xf3, and any of the following conditions are
355*9880d681SAndroid Build Coastguard Worker * met:
356*9880d681SAndroid Build Coastguard Worker * - it is followed by a LOCK (0xf0) prefix
357*9880d681SAndroid Build Coastguard Worker * - it is followed by an xchg instruction
358*9880d681SAndroid Build Coastguard Worker * then it should be disassembled as a xacquire/xrelease not repne/rep.
359*9880d681SAndroid Build Coastguard Worker */
360*9880d681SAndroid Build Coastguard Worker if ((byte == 0xf2 || byte == 0xf3) &&
361*9880d681SAndroid Build Coastguard Worker ((nextByte == 0xf0) ||
362*9880d681SAndroid Build Coastguard Worker ((nextByte & 0xfe) == 0x86 || (nextByte & 0xf8) == 0x90)))
363*9880d681SAndroid Build Coastguard Worker insn->xAcquireRelease = true;
364*9880d681SAndroid Build Coastguard Worker /*
365*9880d681SAndroid Build Coastguard Worker * Also if the byte is 0xf3, and the following condition is met:
366*9880d681SAndroid Build Coastguard Worker * - it is followed by a "mov mem, reg" (opcode 0x88/0x89) or
367*9880d681SAndroid Build Coastguard Worker * "mov mem, imm" (opcode 0xc6/0xc7) instructions.
368*9880d681SAndroid Build Coastguard Worker * then it should be disassembled as an xrelease not rep.
369*9880d681SAndroid Build Coastguard Worker */
370*9880d681SAndroid Build Coastguard Worker if (byte == 0xf3 &&
371*9880d681SAndroid Build Coastguard Worker (nextByte == 0x88 || nextByte == 0x89 ||
372*9880d681SAndroid Build Coastguard Worker nextByte == 0xc6 || nextByte == 0xc7))
373*9880d681SAndroid Build Coastguard Worker insn->xAcquireRelease = true;
374*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT && (nextByte & 0xf0) == 0x40) {
375*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &nextByte))
376*9880d681SAndroid Build Coastguard Worker return -1;
377*9880d681SAndroid Build Coastguard Worker if (lookAtByte(insn, &nextByte))
378*9880d681SAndroid Build Coastguard Worker return -1;
379*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn);
380*9880d681SAndroid Build Coastguard Worker }
381*9880d681SAndroid Build Coastguard Worker if (nextByte != 0x0f && nextByte != 0x90)
382*9880d681SAndroid Build Coastguard Worker break;
383*9880d681SAndroid Build Coastguard Worker }
384*9880d681SAndroid Build Coastguard Worker
385*9880d681SAndroid Build Coastguard Worker switch (byte) {
386*9880d681SAndroid Build Coastguard Worker case 0xf0: /* LOCK */
387*9880d681SAndroid Build Coastguard Worker case 0xf2: /* REPNE/REPNZ */
388*9880d681SAndroid Build Coastguard Worker case 0xf3: /* REP or REPE/REPZ */
389*9880d681SAndroid Build Coastguard Worker if (prefixGroups[0])
390*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Redundant Group 1 prefix");
391*9880d681SAndroid Build Coastguard Worker prefixGroups[0] = true;
392*9880d681SAndroid Build Coastguard Worker setPrefixPresent(insn, byte, prefixLocation);
393*9880d681SAndroid Build Coastguard Worker break;
394*9880d681SAndroid Build Coastguard Worker case 0x2e: /* CS segment override -OR- Branch not taken */
395*9880d681SAndroid Build Coastguard Worker case 0x36: /* SS segment override -OR- Branch taken */
396*9880d681SAndroid Build Coastguard Worker case 0x3e: /* DS segment override */
397*9880d681SAndroid Build Coastguard Worker case 0x26: /* ES segment override */
398*9880d681SAndroid Build Coastguard Worker case 0x64: /* FS segment override */
399*9880d681SAndroid Build Coastguard Worker case 0x65: /* GS segment override */
400*9880d681SAndroid Build Coastguard Worker switch (byte) {
401*9880d681SAndroid Build Coastguard Worker case 0x2e:
402*9880d681SAndroid Build Coastguard Worker insn->segmentOverride = SEG_OVERRIDE_CS;
403*9880d681SAndroid Build Coastguard Worker break;
404*9880d681SAndroid Build Coastguard Worker case 0x36:
405*9880d681SAndroid Build Coastguard Worker insn->segmentOverride = SEG_OVERRIDE_SS;
406*9880d681SAndroid Build Coastguard Worker break;
407*9880d681SAndroid Build Coastguard Worker case 0x3e:
408*9880d681SAndroid Build Coastguard Worker insn->segmentOverride = SEG_OVERRIDE_DS;
409*9880d681SAndroid Build Coastguard Worker break;
410*9880d681SAndroid Build Coastguard Worker case 0x26:
411*9880d681SAndroid Build Coastguard Worker insn->segmentOverride = SEG_OVERRIDE_ES;
412*9880d681SAndroid Build Coastguard Worker break;
413*9880d681SAndroid Build Coastguard Worker case 0x64:
414*9880d681SAndroid Build Coastguard Worker insn->segmentOverride = SEG_OVERRIDE_FS;
415*9880d681SAndroid Build Coastguard Worker break;
416*9880d681SAndroid Build Coastguard Worker case 0x65:
417*9880d681SAndroid Build Coastguard Worker insn->segmentOverride = SEG_OVERRIDE_GS;
418*9880d681SAndroid Build Coastguard Worker break;
419*9880d681SAndroid Build Coastguard Worker default:
420*9880d681SAndroid Build Coastguard Worker debug("Unhandled override");
421*9880d681SAndroid Build Coastguard Worker return -1;
422*9880d681SAndroid Build Coastguard Worker }
423*9880d681SAndroid Build Coastguard Worker if (prefixGroups[1])
424*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Redundant Group 2 prefix");
425*9880d681SAndroid Build Coastguard Worker prefixGroups[1] = true;
426*9880d681SAndroid Build Coastguard Worker setPrefixPresent(insn, byte, prefixLocation);
427*9880d681SAndroid Build Coastguard Worker break;
428*9880d681SAndroid Build Coastguard Worker case 0x66: /* Operand-size override */
429*9880d681SAndroid Build Coastguard Worker if (prefixGroups[2])
430*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Redundant Group 3 prefix");
431*9880d681SAndroid Build Coastguard Worker prefixGroups[2] = true;
432*9880d681SAndroid Build Coastguard Worker hasOpSize = true;
433*9880d681SAndroid Build Coastguard Worker setPrefixPresent(insn, byte, prefixLocation);
434*9880d681SAndroid Build Coastguard Worker break;
435*9880d681SAndroid Build Coastguard Worker case 0x67: /* Address-size override */
436*9880d681SAndroid Build Coastguard Worker if (prefixGroups[3])
437*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Redundant Group 4 prefix");
438*9880d681SAndroid Build Coastguard Worker prefixGroups[3] = true;
439*9880d681SAndroid Build Coastguard Worker hasAdSize = true;
440*9880d681SAndroid Build Coastguard Worker setPrefixPresent(insn, byte, prefixLocation);
441*9880d681SAndroid Build Coastguard Worker break;
442*9880d681SAndroid Build Coastguard Worker default: /* Not a prefix byte */
443*9880d681SAndroid Build Coastguard Worker isPrefix = false;
444*9880d681SAndroid Build Coastguard Worker break;
445*9880d681SAndroid Build Coastguard Worker }
446*9880d681SAndroid Build Coastguard Worker
447*9880d681SAndroid Build Coastguard Worker if (isPrefix)
448*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found prefix 0x%hhx", byte);
449*9880d681SAndroid Build Coastguard Worker }
450*9880d681SAndroid Build Coastguard Worker
451*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionType = TYPE_NO_VEX_XOP;
452*9880d681SAndroid Build Coastguard Worker
453*9880d681SAndroid Build Coastguard Worker if (byte == 0x62) {
454*9880d681SAndroid Build Coastguard Worker uint8_t byte1, byte2;
455*9880d681SAndroid Build Coastguard Worker
456*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &byte1)) {
457*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Couldn't read second byte of EVEX prefix");
458*9880d681SAndroid Build Coastguard Worker return -1;
459*9880d681SAndroid Build Coastguard Worker }
460*9880d681SAndroid Build Coastguard Worker
461*9880d681SAndroid Build Coastguard Worker if (lookAtByte(insn, &byte2)) {
462*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Couldn't read third byte of EVEX prefix");
463*9880d681SAndroid Build Coastguard Worker return -1;
464*9880d681SAndroid Build Coastguard Worker }
465*9880d681SAndroid Build Coastguard Worker
466*9880d681SAndroid Build Coastguard Worker if ((insn->mode == MODE_64BIT || (byte1 & 0xc0) == 0xc0) &&
467*9880d681SAndroid Build Coastguard Worker ((~byte1 & 0xc) == 0xc) && ((byte2 & 0x4) == 0x4)) {
468*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionType = TYPE_EVEX;
469*9880d681SAndroid Build Coastguard Worker } else {
470*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn); /* unconsume byte1 */
471*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn); /* unconsume byte */
472*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 2;
473*9880d681SAndroid Build Coastguard Worker }
474*9880d681SAndroid Build Coastguard Worker
475*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_EVEX) {
476*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0] = byte;
477*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[1] = byte1;
478*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &insn->vectorExtensionPrefix[2])) {
479*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Couldn't read third byte of EVEX prefix");
480*9880d681SAndroid Build Coastguard Worker return -1;
481*9880d681SAndroid Build Coastguard Worker }
482*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &insn->vectorExtensionPrefix[3])) {
483*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Couldn't read fourth byte of EVEX prefix");
484*9880d681SAndroid Build Coastguard Worker return -1;
485*9880d681SAndroid Build Coastguard Worker }
486*9880d681SAndroid Build Coastguard Worker
487*9880d681SAndroid Build Coastguard Worker /* We simulate the REX prefix for simplicity's sake */
488*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT) {
489*9880d681SAndroid Build Coastguard Worker insn->rexPrefix = 0x40
490*9880d681SAndroid Build Coastguard Worker | (wFromEVEX3of4(insn->vectorExtensionPrefix[2]) << 3)
491*9880d681SAndroid Build Coastguard Worker | (rFromEVEX2of4(insn->vectorExtensionPrefix[1]) << 2)
492*9880d681SAndroid Build Coastguard Worker | (xFromEVEX2of4(insn->vectorExtensionPrefix[1]) << 1)
493*9880d681SAndroid Build Coastguard Worker | (bFromEVEX2of4(insn->vectorExtensionPrefix[1]) << 0);
494*9880d681SAndroid Build Coastguard Worker }
495*9880d681SAndroid Build Coastguard Worker
496*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found EVEX prefix 0x%hhx 0x%hhx 0x%hhx 0x%hhx",
497*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0], insn->vectorExtensionPrefix[1],
498*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[2], insn->vectorExtensionPrefix[3]);
499*9880d681SAndroid Build Coastguard Worker }
500*9880d681SAndroid Build Coastguard Worker } else if (byte == 0xc4) {
501*9880d681SAndroid Build Coastguard Worker uint8_t byte1;
502*9880d681SAndroid Build Coastguard Worker
503*9880d681SAndroid Build Coastguard Worker if (lookAtByte(insn, &byte1)) {
504*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Couldn't read second byte of VEX");
505*9880d681SAndroid Build Coastguard Worker return -1;
506*9880d681SAndroid Build Coastguard Worker }
507*9880d681SAndroid Build Coastguard Worker
508*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT || (byte1 & 0xc0) == 0xc0) {
509*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionType = TYPE_VEX_3B;
510*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 1;
511*9880d681SAndroid Build Coastguard Worker } else {
512*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn);
513*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 1;
514*9880d681SAndroid Build Coastguard Worker }
515*9880d681SAndroid Build Coastguard Worker
516*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_VEX_3B) {
517*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0] = byte;
518*9880d681SAndroid Build Coastguard Worker consumeByte(insn, &insn->vectorExtensionPrefix[1]);
519*9880d681SAndroid Build Coastguard Worker consumeByte(insn, &insn->vectorExtensionPrefix[2]);
520*9880d681SAndroid Build Coastguard Worker
521*9880d681SAndroid Build Coastguard Worker /* We simulate the REX prefix for simplicity's sake */
522*9880d681SAndroid Build Coastguard Worker
523*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT) {
524*9880d681SAndroid Build Coastguard Worker insn->rexPrefix = 0x40
525*9880d681SAndroid Build Coastguard Worker | (wFromVEX3of3(insn->vectorExtensionPrefix[2]) << 3)
526*9880d681SAndroid Build Coastguard Worker | (rFromVEX2of3(insn->vectorExtensionPrefix[1]) << 2)
527*9880d681SAndroid Build Coastguard Worker | (xFromVEX2of3(insn->vectorExtensionPrefix[1]) << 1)
528*9880d681SAndroid Build Coastguard Worker | (bFromVEX2of3(insn->vectorExtensionPrefix[1]) << 0);
529*9880d681SAndroid Build Coastguard Worker }
530*9880d681SAndroid Build Coastguard Worker
531*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found VEX prefix 0x%hhx 0x%hhx 0x%hhx",
532*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0], insn->vectorExtensionPrefix[1],
533*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[2]);
534*9880d681SAndroid Build Coastguard Worker }
535*9880d681SAndroid Build Coastguard Worker } else if (byte == 0xc5) {
536*9880d681SAndroid Build Coastguard Worker uint8_t byte1;
537*9880d681SAndroid Build Coastguard Worker
538*9880d681SAndroid Build Coastguard Worker if (lookAtByte(insn, &byte1)) {
539*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Couldn't read second byte of VEX");
540*9880d681SAndroid Build Coastguard Worker return -1;
541*9880d681SAndroid Build Coastguard Worker }
542*9880d681SAndroid Build Coastguard Worker
543*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT || (byte1 & 0xc0) == 0xc0) {
544*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionType = TYPE_VEX_2B;
545*9880d681SAndroid Build Coastguard Worker } else {
546*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn);
547*9880d681SAndroid Build Coastguard Worker }
548*9880d681SAndroid Build Coastguard Worker
549*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_VEX_2B) {
550*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0] = byte;
551*9880d681SAndroid Build Coastguard Worker consumeByte(insn, &insn->vectorExtensionPrefix[1]);
552*9880d681SAndroid Build Coastguard Worker
553*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT) {
554*9880d681SAndroid Build Coastguard Worker insn->rexPrefix = 0x40
555*9880d681SAndroid Build Coastguard Worker | (rFromVEX2of2(insn->vectorExtensionPrefix[1]) << 2);
556*9880d681SAndroid Build Coastguard Worker }
557*9880d681SAndroid Build Coastguard Worker
558*9880d681SAndroid Build Coastguard Worker switch (ppFromVEX2of2(insn->vectorExtensionPrefix[1])) {
559*9880d681SAndroid Build Coastguard Worker default:
560*9880d681SAndroid Build Coastguard Worker break;
561*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_66:
562*9880d681SAndroid Build Coastguard Worker hasOpSize = true;
563*9880d681SAndroid Build Coastguard Worker break;
564*9880d681SAndroid Build Coastguard Worker }
565*9880d681SAndroid Build Coastguard Worker
566*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found VEX prefix 0x%hhx 0x%hhx",
567*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0],
568*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[1]);
569*9880d681SAndroid Build Coastguard Worker }
570*9880d681SAndroid Build Coastguard Worker } else if (byte == 0x8f) {
571*9880d681SAndroid Build Coastguard Worker uint8_t byte1;
572*9880d681SAndroid Build Coastguard Worker
573*9880d681SAndroid Build Coastguard Worker if (lookAtByte(insn, &byte1)) {
574*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Couldn't read second byte of XOP");
575*9880d681SAndroid Build Coastguard Worker return -1;
576*9880d681SAndroid Build Coastguard Worker }
577*9880d681SAndroid Build Coastguard Worker
578*9880d681SAndroid Build Coastguard Worker if ((byte1 & 0x38) != 0x0) { /* 0 in these 3 bits is a POP instruction. */
579*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionType = TYPE_XOP;
580*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 1;
581*9880d681SAndroid Build Coastguard Worker } else {
582*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn);
583*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 1;
584*9880d681SAndroid Build Coastguard Worker }
585*9880d681SAndroid Build Coastguard Worker
586*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_XOP) {
587*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0] = byte;
588*9880d681SAndroid Build Coastguard Worker consumeByte(insn, &insn->vectorExtensionPrefix[1]);
589*9880d681SAndroid Build Coastguard Worker consumeByte(insn, &insn->vectorExtensionPrefix[2]);
590*9880d681SAndroid Build Coastguard Worker
591*9880d681SAndroid Build Coastguard Worker /* We simulate the REX prefix for simplicity's sake */
592*9880d681SAndroid Build Coastguard Worker
593*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT) {
594*9880d681SAndroid Build Coastguard Worker insn->rexPrefix = 0x40
595*9880d681SAndroid Build Coastguard Worker | (wFromXOP3of3(insn->vectorExtensionPrefix[2]) << 3)
596*9880d681SAndroid Build Coastguard Worker | (rFromXOP2of3(insn->vectorExtensionPrefix[1]) << 2)
597*9880d681SAndroid Build Coastguard Worker | (xFromXOP2of3(insn->vectorExtensionPrefix[1]) << 1)
598*9880d681SAndroid Build Coastguard Worker | (bFromXOP2of3(insn->vectorExtensionPrefix[1]) << 0);
599*9880d681SAndroid Build Coastguard Worker }
600*9880d681SAndroid Build Coastguard Worker
601*9880d681SAndroid Build Coastguard Worker switch (ppFromXOP3of3(insn->vectorExtensionPrefix[2])) {
602*9880d681SAndroid Build Coastguard Worker default:
603*9880d681SAndroid Build Coastguard Worker break;
604*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_66:
605*9880d681SAndroid Build Coastguard Worker hasOpSize = true;
606*9880d681SAndroid Build Coastguard Worker break;
607*9880d681SAndroid Build Coastguard Worker }
608*9880d681SAndroid Build Coastguard Worker
609*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found XOP prefix 0x%hhx 0x%hhx 0x%hhx",
610*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[0], insn->vectorExtensionPrefix[1],
611*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionPrefix[2]);
612*9880d681SAndroid Build Coastguard Worker }
613*9880d681SAndroid Build Coastguard Worker } else {
614*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT) {
615*9880d681SAndroid Build Coastguard Worker if ((byte & 0xf0) == 0x40) {
616*9880d681SAndroid Build Coastguard Worker uint8_t opcodeByte;
617*9880d681SAndroid Build Coastguard Worker
618*9880d681SAndroid Build Coastguard Worker if (lookAtByte(insn, &opcodeByte) || ((opcodeByte & 0xf0) == 0x40)) {
619*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Redundant REX prefix");
620*9880d681SAndroid Build Coastguard Worker return -1;
621*9880d681SAndroid Build Coastguard Worker }
622*9880d681SAndroid Build Coastguard Worker
623*9880d681SAndroid Build Coastguard Worker insn->rexPrefix = byte;
624*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 2;
625*9880d681SAndroid Build Coastguard Worker
626*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found REX prefix 0x%hhx", byte);
627*9880d681SAndroid Build Coastguard Worker } else {
628*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn);
629*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 1;
630*9880d681SAndroid Build Coastguard Worker }
631*9880d681SAndroid Build Coastguard Worker } else {
632*9880d681SAndroid Build Coastguard Worker unconsumeByte(insn);
633*9880d681SAndroid Build Coastguard Worker insn->necessaryPrefixLocation = insn->readerCursor - 1;
634*9880d681SAndroid Build Coastguard Worker }
635*9880d681SAndroid Build Coastguard Worker }
636*9880d681SAndroid Build Coastguard Worker
637*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_16BIT) {
638*9880d681SAndroid Build Coastguard Worker insn->registerSize = (hasOpSize ? 4 : 2);
639*9880d681SAndroid Build Coastguard Worker insn->addressSize = (hasAdSize ? 4 : 2);
640*9880d681SAndroid Build Coastguard Worker insn->displacementSize = (hasAdSize ? 4 : 2);
641*9880d681SAndroid Build Coastguard Worker insn->immediateSize = (hasOpSize ? 4 : 2);
642*9880d681SAndroid Build Coastguard Worker } else if (insn->mode == MODE_32BIT) {
643*9880d681SAndroid Build Coastguard Worker insn->registerSize = (hasOpSize ? 2 : 4);
644*9880d681SAndroid Build Coastguard Worker insn->addressSize = (hasAdSize ? 2 : 4);
645*9880d681SAndroid Build Coastguard Worker insn->displacementSize = (hasAdSize ? 2 : 4);
646*9880d681SAndroid Build Coastguard Worker insn->immediateSize = (hasOpSize ? 2 : 4);
647*9880d681SAndroid Build Coastguard Worker } else if (insn->mode == MODE_64BIT) {
648*9880d681SAndroid Build Coastguard Worker if (insn->rexPrefix && wFromREX(insn->rexPrefix)) {
649*9880d681SAndroid Build Coastguard Worker insn->registerSize = 8;
650*9880d681SAndroid Build Coastguard Worker insn->addressSize = (hasAdSize ? 4 : 8);
651*9880d681SAndroid Build Coastguard Worker insn->displacementSize = 4;
652*9880d681SAndroid Build Coastguard Worker insn->immediateSize = 4;
653*9880d681SAndroid Build Coastguard Worker } else if (insn->rexPrefix) {
654*9880d681SAndroid Build Coastguard Worker insn->registerSize = (hasOpSize ? 2 : 4);
655*9880d681SAndroid Build Coastguard Worker insn->addressSize = (hasAdSize ? 4 : 8);
656*9880d681SAndroid Build Coastguard Worker insn->displacementSize = (hasOpSize ? 2 : 4);
657*9880d681SAndroid Build Coastguard Worker insn->immediateSize = (hasOpSize ? 2 : 4);
658*9880d681SAndroid Build Coastguard Worker } else {
659*9880d681SAndroid Build Coastguard Worker insn->registerSize = (hasOpSize ? 2 : 4);
660*9880d681SAndroid Build Coastguard Worker insn->addressSize = (hasAdSize ? 4 : 8);
661*9880d681SAndroid Build Coastguard Worker insn->displacementSize = (hasOpSize ? 2 : 4);
662*9880d681SAndroid Build Coastguard Worker insn->immediateSize = (hasOpSize ? 2 : 4);
663*9880d681SAndroid Build Coastguard Worker }
664*9880d681SAndroid Build Coastguard Worker }
665*9880d681SAndroid Build Coastguard Worker
666*9880d681SAndroid Build Coastguard Worker return 0;
667*9880d681SAndroid Build Coastguard Worker }
668*9880d681SAndroid Build Coastguard Worker
669*9880d681SAndroid Build Coastguard Worker /*
670*9880d681SAndroid Build Coastguard Worker * readOpcode - Reads the opcode (excepting the ModR/M byte in the case of
671*9880d681SAndroid Build Coastguard Worker * extended or escape opcodes).
672*9880d681SAndroid Build Coastguard Worker *
673*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose opcode is to be read.
674*9880d681SAndroid Build Coastguard Worker * @return - 0 if the opcode could be read successfully; nonzero otherwise.
675*9880d681SAndroid Build Coastguard Worker */
readOpcode(struct InternalInstruction * insn)676*9880d681SAndroid Build Coastguard Worker static int readOpcode(struct InternalInstruction* insn) {
677*9880d681SAndroid Build Coastguard Worker /* Determine the length of the primary opcode */
678*9880d681SAndroid Build Coastguard Worker
679*9880d681SAndroid Build Coastguard Worker uint8_t current;
680*9880d681SAndroid Build Coastguard Worker
681*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readOpcode()");
682*9880d681SAndroid Build Coastguard Worker
683*9880d681SAndroid Build Coastguard Worker insn->opcodeType = ONEBYTE;
684*9880d681SAndroid Build Coastguard Worker
685*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_EVEX) {
686*9880d681SAndroid Build Coastguard Worker switch (mmFromEVEX2of4(insn->vectorExtensionPrefix[1])) {
687*9880d681SAndroid Build Coastguard Worker default:
688*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Unhandled mm field for instruction (0x%hhx)",
689*9880d681SAndroid Build Coastguard Worker mmFromEVEX2of4(insn->vectorExtensionPrefix[1]));
690*9880d681SAndroid Build Coastguard Worker return -1;
691*9880d681SAndroid Build Coastguard Worker case VEX_LOB_0F:
692*9880d681SAndroid Build Coastguard Worker insn->opcodeType = TWOBYTE;
693*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
694*9880d681SAndroid Build Coastguard Worker case VEX_LOB_0F38:
695*9880d681SAndroid Build Coastguard Worker insn->opcodeType = THREEBYTE_38;
696*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
697*9880d681SAndroid Build Coastguard Worker case VEX_LOB_0F3A:
698*9880d681SAndroid Build Coastguard Worker insn->opcodeType = THREEBYTE_3A;
699*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
700*9880d681SAndroid Build Coastguard Worker }
701*9880d681SAndroid Build Coastguard Worker } else if (insn->vectorExtensionType == TYPE_VEX_3B) {
702*9880d681SAndroid Build Coastguard Worker switch (mmmmmFromVEX2of3(insn->vectorExtensionPrefix[1])) {
703*9880d681SAndroid Build Coastguard Worker default:
704*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Unhandled m-mmmm field for instruction (0x%hhx)",
705*9880d681SAndroid Build Coastguard Worker mmmmmFromVEX2of3(insn->vectorExtensionPrefix[1]));
706*9880d681SAndroid Build Coastguard Worker return -1;
707*9880d681SAndroid Build Coastguard Worker case VEX_LOB_0F:
708*9880d681SAndroid Build Coastguard Worker insn->opcodeType = TWOBYTE;
709*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
710*9880d681SAndroid Build Coastguard Worker case VEX_LOB_0F38:
711*9880d681SAndroid Build Coastguard Worker insn->opcodeType = THREEBYTE_38;
712*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
713*9880d681SAndroid Build Coastguard Worker case VEX_LOB_0F3A:
714*9880d681SAndroid Build Coastguard Worker insn->opcodeType = THREEBYTE_3A;
715*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
716*9880d681SAndroid Build Coastguard Worker }
717*9880d681SAndroid Build Coastguard Worker } else if (insn->vectorExtensionType == TYPE_VEX_2B) {
718*9880d681SAndroid Build Coastguard Worker insn->opcodeType = TWOBYTE;
719*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
720*9880d681SAndroid Build Coastguard Worker } else if (insn->vectorExtensionType == TYPE_XOP) {
721*9880d681SAndroid Build Coastguard Worker switch (mmmmmFromXOP2of3(insn->vectorExtensionPrefix[1])) {
722*9880d681SAndroid Build Coastguard Worker default:
723*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Unhandled m-mmmm field for instruction (0x%hhx)",
724*9880d681SAndroid Build Coastguard Worker mmmmmFromVEX2of3(insn->vectorExtensionPrefix[1]));
725*9880d681SAndroid Build Coastguard Worker return -1;
726*9880d681SAndroid Build Coastguard Worker case XOP_MAP_SELECT_8:
727*9880d681SAndroid Build Coastguard Worker insn->opcodeType = XOP8_MAP;
728*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
729*9880d681SAndroid Build Coastguard Worker case XOP_MAP_SELECT_9:
730*9880d681SAndroid Build Coastguard Worker insn->opcodeType = XOP9_MAP;
731*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
732*9880d681SAndroid Build Coastguard Worker case XOP_MAP_SELECT_A:
733*9880d681SAndroid Build Coastguard Worker insn->opcodeType = XOPA_MAP;
734*9880d681SAndroid Build Coastguard Worker return consumeByte(insn, &insn->opcode);
735*9880d681SAndroid Build Coastguard Worker }
736*9880d681SAndroid Build Coastguard Worker }
737*9880d681SAndroid Build Coastguard Worker
738*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, ¤t))
739*9880d681SAndroid Build Coastguard Worker return -1;
740*9880d681SAndroid Build Coastguard Worker
741*9880d681SAndroid Build Coastguard Worker if (current == 0x0f) {
742*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found a two-byte escape prefix (0x%hhx)", current);
743*9880d681SAndroid Build Coastguard Worker
744*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, ¤t))
745*9880d681SAndroid Build Coastguard Worker return -1;
746*9880d681SAndroid Build Coastguard Worker
747*9880d681SAndroid Build Coastguard Worker if (current == 0x38) {
748*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found a three-byte escape prefix (0x%hhx)", current);
749*9880d681SAndroid Build Coastguard Worker
750*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, ¤t))
751*9880d681SAndroid Build Coastguard Worker return -1;
752*9880d681SAndroid Build Coastguard Worker
753*9880d681SAndroid Build Coastguard Worker insn->opcodeType = THREEBYTE_38;
754*9880d681SAndroid Build Coastguard Worker } else if (current == 0x3a) {
755*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Found a three-byte escape prefix (0x%hhx)", current);
756*9880d681SAndroid Build Coastguard Worker
757*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, ¤t))
758*9880d681SAndroid Build Coastguard Worker return -1;
759*9880d681SAndroid Build Coastguard Worker
760*9880d681SAndroid Build Coastguard Worker insn->opcodeType = THREEBYTE_3A;
761*9880d681SAndroid Build Coastguard Worker } else {
762*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Didn't find a three-byte escape prefix");
763*9880d681SAndroid Build Coastguard Worker
764*9880d681SAndroid Build Coastguard Worker insn->opcodeType = TWOBYTE;
765*9880d681SAndroid Build Coastguard Worker }
766*9880d681SAndroid Build Coastguard Worker }
767*9880d681SAndroid Build Coastguard Worker
768*9880d681SAndroid Build Coastguard Worker /*
769*9880d681SAndroid Build Coastguard Worker * At this point we have consumed the full opcode.
770*9880d681SAndroid Build Coastguard Worker * Anything we consume from here on must be unconsumed.
771*9880d681SAndroid Build Coastguard Worker */
772*9880d681SAndroid Build Coastguard Worker
773*9880d681SAndroid Build Coastguard Worker insn->opcode = current;
774*9880d681SAndroid Build Coastguard Worker
775*9880d681SAndroid Build Coastguard Worker return 0;
776*9880d681SAndroid Build Coastguard Worker }
777*9880d681SAndroid Build Coastguard Worker
778*9880d681SAndroid Build Coastguard Worker static int readModRM(struct InternalInstruction* insn);
779*9880d681SAndroid Build Coastguard Worker
780*9880d681SAndroid Build Coastguard Worker /*
781*9880d681SAndroid Build Coastguard Worker * getIDWithAttrMask - Determines the ID of an instruction, consuming
782*9880d681SAndroid Build Coastguard Worker * the ModR/M byte as appropriate for extended and escape opcodes,
783*9880d681SAndroid Build Coastguard Worker * and using a supplied attribute mask.
784*9880d681SAndroid Build Coastguard Worker *
785*9880d681SAndroid Build Coastguard Worker * @param instructionID - A pointer whose target is filled in with the ID of the
786*9880d681SAndroid Build Coastguard Worker * instruction.
787*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose ID is to be determined.
788*9880d681SAndroid Build Coastguard Worker * @param attrMask - The attribute mask to search.
789*9880d681SAndroid Build Coastguard Worker * @return - 0 if the ModR/M could be read when needed or was not
790*9880d681SAndroid Build Coastguard Worker * needed; nonzero otherwise.
791*9880d681SAndroid Build Coastguard Worker */
getIDWithAttrMask(uint16_t * instructionID,struct InternalInstruction * insn,uint16_t attrMask)792*9880d681SAndroid Build Coastguard Worker static int getIDWithAttrMask(uint16_t* instructionID,
793*9880d681SAndroid Build Coastguard Worker struct InternalInstruction* insn,
794*9880d681SAndroid Build Coastguard Worker uint16_t attrMask) {
795*9880d681SAndroid Build Coastguard Worker bool hasModRMExtension;
796*9880d681SAndroid Build Coastguard Worker
797*9880d681SAndroid Build Coastguard Worker InstructionContext instructionClass = contextForAttrs(attrMask);
798*9880d681SAndroid Build Coastguard Worker
799*9880d681SAndroid Build Coastguard Worker hasModRMExtension = modRMRequired(insn->opcodeType,
800*9880d681SAndroid Build Coastguard Worker instructionClass,
801*9880d681SAndroid Build Coastguard Worker insn->opcode);
802*9880d681SAndroid Build Coastguard Worker
803*9880d681SAndroid Build Coastguard Worker if (hasModRMExtension) {
804*9880d681SAndroid Build Coastguard Worker if (readModRM(insn))
805*9880d681SAndroid Build Coastguard Worker return -1;
806*9880d681SAndroid Build Coastguard Worker
807*9880d681SAndroid Build Coastguard Worker *instructionID = decode(insn->opcodeType,
808*9880d681SAndroid Build Coastguard Worker instructionClass,
809*9880d681SAndroid Build Coastguard Worker insn->opcode,
810*9880d681SAndroid Build Coastguard Worker insn->modRM);
811*9880d681SAndroid Build Coastguard Worker } else {
812*9880d681SAndroid Build Coastguard Worker *instructionID = decode(insn->opcodeType,
813*9880d681SAndroid Build Coastguard Worker instructionClass,
814*9880d681SAndroid Build Coastguard Worker insn->opcode,
815*9880d681SAndroid Build Coastguard Worker 0);
816*9880d681SAndroid Build Coastguard Worker }
817*9880d681SAndroid Build Coastguard Worker
818*9880d681SAndroid Build Coastguard Worker return 0;
819*9880d681SAndroid Build Coastguard Worker }
820*9880d681SAndroid Build Coastguard Worker
821*9880d681SAndroid Build Coastguard Worker /*
822*9880d681SAndroid Build Coastguard Worker * is16BitEquivalent - Determines whether two instruction names refer to
823*9880d681SAndroid Build Coastguard Worker * equivalent instructions but one is 16-bit whereas the other is not.
824*9880d681SAndroid Build Coastguard Worker *
825*9880d681SAndroid Build Coastguard Worker * @param orig - The instruction that is not 16-bit
826*9880d681SAndroid Build Coastguard Worker * @param equiv - The instruction that is 16-bit
827*9880d681SAndroid Build Coastguard Worker */
is16BitEquivalent(const char * orig,const char * equiv)828*9880d681SAndroid Build Coastguard Worker static bool is16BitEquivalent(const char* orig, const char* equiv) {
829*9880d681SAndroid Build Coastguard Worker off_t i;
830*9880d681SAndroid Build Coastguard Worker
831*9880d681SAndroid Build Coastguard Worker for (i = 0;; i++) {
832*9880d681SAndroid Build Coastguard Worker if (orig[i] == '\0' && equiv[i] == '\0')
833*9880d681SAndroid Build Coastguard Worker return true;
834*9880d681SAndroid Build Coastguard Worker if (orig[i] == '\0' || equiv[i] == '\0')
835*9880d681SAndroid Build Coastguard Worker return false;
836*9880d681SAndroid Build Coastguard Worker if (orig[i] != equiv[i]) {
837*9880d681SAndroid Build Coastguard Worker if ((orig[i] == 'Q' || orig[i] == 'L') && equiv[i] == 'W')
838*9880d681SAndroid Build Coastguard Worker continue;
839*9880d681SAndroid Build Coastguard Worker if ((orig[i] == '6' || orig[i] == '3') && equiv[i] == '1')
840*9880d681SAndroid Build Coastguard Worker continue;
841*9880d681SAndroid Build Coastguard Worker if ((orig[i] == '4' || orig[i] == '2') && equiv[i] == '6')
842*9880d681SAndroid Build Coastguard Worker continue;
843*9880d681SAndroid Build Coastguard Worker return false;
844*9880d681SAndroid Build Coastguard Worker }
845*9880d681SAndroid Build Coastguard Worker }
846*9880d681SAndroid Build Coastguard Worker }
847*9880d681SAndroid Build Coastguard Worker
848*9880d681SAndroid Build Coastguard Worker /*
849*9880d681SAndroid Build Coastguard Worker * is64Bit - Determines whether this instruction is a 64-bit instruction.
850*9880d681SAndroid Build Coastguard Worker *
851*9880d681SAndroid Build Coastguard Worker * @param name - The instruction that is not 16-bit
852*9880d681SAndroid Build Coastguard Worker */
is64Bit(const char * name)853*9880d681SAndroid Build Coastguard Worker static bool is64Bit(const char* name) {
854*9880d681SAndroid Build Coastguard Worker off_t i;
855*9880d681SAndroid Build Coastguard Worker
856*9880d681SAndroid Build Coastguard Worker for (i = 0;; ++i) {
857*9880d681SAndroid Build Coastguard Worker if (name[i] == '\0')
858*9880d681SAndroid Build Coastguard Worker return false;
859*9880d681SAndroid Build Coastguard Worker if (name[i] == '6' && name[i+1] == '4')
860*9880d681SAndroid Build Coastguard Worker return true;
861*9880d681SAndroid Build Coastguard Worker }
862*9880d681SAndroid Build Coastguard Worker }
863*9880d681SAndroid Build Coastguard Worker
864*9880d681SAndroid Build Coastguard Worker /*
865*9880d681SAndroid Build Coastguard Worker * getID - Determines the ID of an instruction, consuming the ModR/M byte as
866*9880d681SAndroid Build Coastguard Worker * appropriate for extended and escape opcodes. Determines the attributes and
867*9880d681SAndroid Build Coastguard Worker * context for the instruction before doing so.
868*9880d681SAndroid Build Coastguard Worker *
869*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose ID is to be determined.
870*9880d681SAndroid Build Coastguard Worker * @return - 0 if the ModR/M could be read when needed or was not needed;
871*9880d681SAndroid Build Coastguard Worker * nonzero otherwise.
872*9880d681SAndroid Build Coastguard Worker */
getID(struct InternalInstruction * insn,const void * miiArg)873*9880d681SAndroid Build Coastguard Worker static int getID(struct InternalInstruction* insn, const void *miiArg) {
874*9880d681SAndroid Build Coastguard Worker uint16_t attrMask;
875*9880d681SAndroid Build Coastguard Worker uint16_t instructionID;
876*9880d681SAndroid Build Coastguard Worker
877*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "getID()");
878*9880d681SAndroid Build Coastguard Worker
879*9880d681SAndroid Build Coastguard Worker attrMask = ATTR_NONE;
880*9880d681SAndroid Build Coastguard Worker
881*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT)
882*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_64BIT;
883*9880d681SAndroid Build Coastguard Worker
884*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType != TYPE_NO_VEX_XOP) {
885*9880d681SAndroid Build Coastguard Worker attrMask |= (insn->vectorExtensionType == TYPE_EVEX) ? ATTR_EVEX : ATTR_VEX;
886*9880d681SAndroid Build Coastguard Worker
887*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_EVEX) {
888*9880d681SAndroid Build Coastguard Worker switch (ppFromEVEX3of4(insn->vectorExtensionPrefix[2])) {
889*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_66:
890*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_OPSIZE;
891*9880d681SAndroid Build Coastguard Worker break;
892*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F3:
893*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XS;
894*9880d681SAndroid Build Coastguard Worker break;
895*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F2:
896*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XD;
897*9880d681SAndroid Build Coastguard Worker break;
898*9880d681SAndroid Build Coastguard Worker }
899*9880d681SAndroid Build Coastguard Worker
900*9880d681SAndroid Build Coastguard Worker if (zFromEVEX4of4(insn->vectorExtensionPrefix[3]))
901*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_EVEXKZ;
902*9880d681SAndroid Build Coastguard Worker if (bFromEVEX4of4(insn->vectorExtensionPrefix[3]))
903*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_EVEXB;
904*9880d681SAndroid Build Coastguard Worker if (aaaFromEVEX4of4(insn->vectorExtensionPrefix[3]))
905*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_EVEXK;
906*9880d681SAndroid Build Coastguard Worker if (lFromEVEX4of4(insn->vectorExtensionPrefix[3]))
907*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_EVEXL;
908*9880d681SAndroid Build Coastguard Worker if (l2FromEVEX4of4(insn->vectorExtensionPrefix[3]))
909*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_EVEXL2;
910*9880d681SAndroid Build Coastguard Worker } else if (insn->vectorExtensionType == TYPE_VEX_3B) {
911*9880d681SAndroid Build Coastguard Worker switch (ppFromVEX3of3(insn->vectorExtensionPrefix[2])) {
912*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_66:
913*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_OPSIZE;
914*9880d681SAndroid Build Coastguard Worker break;
915*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F3:
916*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XS;
917*9880d681SAndroid Build Coastguard Worker break;
918*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F2:
919*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XD;
920*9880d681SAndroid Build Coastguard Worker break;
921*9880d681SAndroid Build Coastguard Worker }
922*9880d681SAndroid Build Coastguard Worker
923*9880d681SAndroid Build Coastguard Worker if (lFromVEX3of3(insn->vectorExtensionPrefix[2]))
924*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_VEXL;
925*9880d681SAndroid Build Coastguard Worker } else if (insn->vectorExtensionType == TYPE_VEX_2B) {
926*9880d681SAndroid Build Coastguard Worker switch (ppFromVEX2of2(insn->vectorExtensionPrefix[1])) {
927*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_66:
928*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_OPSIZE;
929*9880d681SAndroid Build Coastguard Worker break;
930*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F3:
931*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XS;
932*9880d681SAndroid Build Coastguard Worker break;
933*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F2:
934*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XD;
935*9880d681SAndroid Build Coastguard Worker break;
936*9880d681SAndroid Build Coastguard Worker }
937*9880d681SAndroid Build Coastguard Worker
938*9880d681SAndroid Build Coastguard Worker if (lFromVEX2of2(insn->vectorExtensionPrefix[1]))
939*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_VEXL;
940*9880d681SAndroid Build Coastguard Worker } else if (insn->vectorExtensionType == TYPE_XOP) {
941*9880d681SAndroid Build Coastguard Worker switch (ppFromXOP3of3(insn->vectorExtensionPrefix[2])) {
942*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_66:
943*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_OPSIZE;
944*9880d681SAndroid Build Coastguard Worker break;
945*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F3:
946*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XS;
947*9880d681SAndroid Build Coastguard Worker break;
948*9880d681SAndroid Build Coastguard Worker case VEX_PREFIX_F2:
949*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XD;
950*9880d681SAndroid Build Coastguard Worker break;
951*9880d681SAndroid Build Coastguard Worker }
952*9880d681SAndroid Build Coastguard Worker
953*9880d681SAndroid Build Coastguard Worker if (lFromXOP3of3(insn->vectorExtensionPrefix[2]))
954*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_VEXL;
955*9880d681SAndroid Build Coastguard Worker } else {
956*9880d681SAndroid Build Coastguard Worker return -1;
957*9880d681SAndroid Build Coastguard Worker }
958*9880d681SAndroid Build Coastguard Worker } else {
959*9880d681SAndroid Build Coastguard Worker if (insn->mode != MODE_16BIT && isPrefixAtLocation(insn, 0x66, insn->necessaryPrefixLocation))
960*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_OPSIZE;
961*9880d681SAndroid Build Coastguard Worker else if (isPrefixAtLocation(insn, 0x67, insn->necessaryPrefixLocation))
962*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_ADSIZE;
963*9880d681SAndroid Build Coastguard Worker else if (isPrefixAtLocation(insn, 0xf3, insn->necessaryPrefixLocation))
964*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XS;
965*9880d681SAndroid Build Coastguard Worker else if (isPrefixAtLocation(insn, 0xf2, insn->necessaryPrefixLocation))
966*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_XD;
967*9880d681SAndroid Build Coastguard Worker }
968*9880d681SAndroid Build Coastguard Worker
969*9880d681SAndroid Build Coastguard Worker if (insn->rexPrefix & 0x08)
970*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_REXW;
971*9880d681SAndroid Build Coastguard Worker
972*9880d681SAndroid Build Coastguard Worker /*
973*9880d681SAndroid Build Coastguard Worker * JCXZ/JECXZ need special handling for 16-bit mode because the meaning
974*9880d681SAndroid Build Coastguard Worker * of the AdSize prefix is inverted w.r.t. 32-bit mode.
975*9880d681SAndroid Build Coastguard Worker */
976*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_16BIT && insn->opcodeType == ONEBYTE &&
977*9880d681SAndroid Build Coastguard Worker insn->opcode == 0xE3)
978*9880d681SAndroid Build Coastguard Worker attrMask ^= ATTR_ADSIZE;
979*9880d681SAndroid Build Coastguard Worker
980*9880d681SAndroid Build Coastguard Worker /*
981*9880d681SAndroid Build Coastguard Worker * In 64-bit mode all f64 superscripted opcodes ignore opcode size prefix
982*9880d681SAndroid Build Coastguard Worker * CALL/JMP/JCC instructions need to ignore 0x66 and consume 4 bytes
983*9880d681SAndroid Build Coastguard Worker */
984*9880d681SAndroid Build Coastguard Worker
985*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_64BIT &&
986*9880d681SAndroid Build Coastguard Worker isPrefixAtLocation(insn, 0x66, insn->necessaryPrefixLocation)) {
987*9880d681SAndroid Build Coastguard Worker switch (insn->opcode) {
988*9880d681SAndroid Build Coastguard Worker case 0xE8:
989*9880d681SAndroid Build Coastguard Worker case 0xE9:
990*9880d681SAndroid Build Coastguard Worker // Take care of psubsb and other mmx instructions.
991*9880d681SAndroid Build Coastguard Worker if (insn->opcodeType == ONEBYTE) {
992*9880d681SAndroid Build Coastguard Worker attrMask ^= ATTR_OPSIZE;
993*9880d681SAndroid Build Coastguard Worker insn->immediateSize = 4;
994*9880d681SAndroid Build Coastguard Worker insn->displacementSize = 4;
995*9880d681SAndroid Build Coastguard Worker }
996*9880d681SAndroid Build Coastguard Worker break;
997*9880d681SAndroid Build Coastguard Worker case 0x82:
998*9880d681SAndroid Build Coastguard Worker case 0x83:
999*9880d681SAndroid Build Coastguard Worker case 0x84:
1000*9880d681SAndroid Build Coastguard Worker case 0x85:
1001*9880d681SAndroid Build Coastguard Worker case 0x86:
1002*9880d681SAndroid Build Coastguard Worker case 0x87:
1003*9880d681SAndroid Build Coastguard Worker case 0x88:
1004*9880d681SAndroid Build Coastguard Worker case 0x89:
1005*9880d681SAndroid Build Coastguard Worker case 0x8A:
1006*9880d681SAndroid Build Coastguard Worker case 0x8B:
1007*9880d681SAndroid Build Coastguard Worker case 0x8C:
1008*9880d681SAndroid Build Coastguard Worker case 0x8D:
1009*9880d681SAndroid Build Coastguard Worker case 0x8E:
1010*9880d681SAndroid Build Coastguard Worker case 0x8F:
1011*9880d681SAndroid Build Coastguard Worker // Take care of lea and three byte ops.
1012*9880d681SAndroid Build Coastguard Worker if (insn->opcodeType == TWOBYTE) {
1013*9880d681SAndroid Build Coastguard Worker attrMask ^= ATTR_OPSIZE;
1014*9880d681SAndroid Build Coastguard Worker insn->immediateSize = 4;
1015*9880d681SAndroid Build Coastguard Worker insn->displacementSize = 4;
1016*9880d681SAndroid Build Coastguard Worker }
1017*9880d681SAndroid Build Coastguard Worker break;
1018*9880d681SAndroid Build Coastguard Worker }
1019*9880d681SAndroid Build Coastguard Worker }
1020*9880d681SAndroid Build Coastguard Worker
1021*9880d681SAndroid Build Coastguard Worker if (getIDWithAttrMask(&instructionID, insn, attrMask))
1022*9880d681SAndroid Build Coastguard Worker return -1;
1023*9880d681SAndroid Build Coastguard Worker
1024*9880d681SAndroid Build Coastguard Worker /* The following clauses compensate for limitations of the tables. */
1025*9880d681SAndroid Build Coastguard Worker
1026*9880d681SAndroid Build Coastguard Worker if (insn->mode != MODE_64BIT &&
1027*9880d681SAndroid Build Coastguard Worker insn->vectorExtensionType != TYPE_NO_VEX_XOP) {
1028*9880d681SAndroid Build Coastguard Worker /*
1029*9880d681SAndroid Build Coastguard Worker * The tables can't distinquish between cases where the W-bit is used to
1030*9880d681SAndroid Build Coastguard Worker * select register size and cases where its a required part of the opcode.
1031*9880d681SAndroid Build Coastguard Worker */
1032*9880d681SAndroid Build Coastguard Worker if ((insn->vectorExtensionType == TYPE_EVEX &&
1033*9880d681SAndroid Build Coastguard Worker wFromEVEX3of4(insn->vectorExtensionPrefix[2])) ||
1034*9880d681SAndroid Build Coastguard Worker (insn->vectorExtensionType == TYPE_VEX_3B &&
1035*9880d681SAndroid Build Coastguard Worker wFromVEX3of3(insn->vectorExtensionPrefix[2])) ||
1036*9880d681SAndroid Build Coastguard Worker (insn->vectorExtensionType == TYPE_XOP &&
1037*9880d681SAndroid Build Coastguard Worker wFromXOP3of3(insn->vectorExtensionPrefix[2]))) {
1038*9880d681SAndroid Build Coastguard Worker
1039*9880d681SAndroid Build Coastguard Worker uint16_t instructionIDWithREXW;
1040*9880d681SAndroid Build Coastguard Worker if (getIDWithAttrMask(&instructionIDWithREXW,
1041*9880d681SAndroid Build Coastguard Worker insn, attrMask | ATTR_REXW)) {
1042*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionID;
1043*9880d681SAndroid Build Coastguard Worker insn->spec = specifierForUID(instructionID);
1044*9880d681SAndroid Build Coastguard Worker return 0;
1045*9880d681SAndroid Build Coastguard Worker }
1046*9880d681SAndroid Build Coastguard Worker
1047*9880d681SAndroid Build Coastguard Worker const char *SpecName = GetInstrName(instructionIDWithREXW, miiArg);
1048*9880d681SAndroid Build Coastguard Worker // If not a 64-bit instruction. Switch the opcode.
1049*9880d681SAndroid Build Coastguard Worker if (!is64Bit(SpecName)) {
1050*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionIDWithREXW;
1051*9880d681SAndroid Build Coastguard Worker insn->spec = specifierForUID(instructionIDWithREXW);
1052*9880d681SAndroid Build Coastguard Worker return 0;
1053*9880d681SAndroid Build Coastguard Worker }
1054*9880d681SAndroid Build Coastguard Worker }
1055*9880d681SAndroid Build Coastguard Worker }
1056*9880d681SAndroid Build Coastguard Worker
1057*9880d681SAndroid Build Coastguard Worker /*
1058*9880d681SAndroid Build Coastguard Worker * Absolute moves need special handling.
1059*9880d681SAndroid Build Coastguard Worker * -For 16-bit mode because the meaning of the AdSize and OpSize prefixes are
1060*9880d681SAndroid Build Coastguard Worker * inverted w.r.t.
1061*9880d681SAndroid Build Coastguard Worker * -For 32-bit mode we need to ensure the ADSIZE prefix is observed in
1062*9880d681SAndroid Build Coastguard Worker * any position.
1063*9880d681SAndroid Build Coastguard Worker */
1064*9880d681SAndroid Build Coastguard Worker if (insn->opcodeType == ONEBYTE && ((insn->opcode & 0xFC) == 0xA0)) {
1065*9880d681SAndroid Build Coastguard Worker /* Make sure we observed the prefixes in any position. */
1066*9880d681SAndroid Build Coastguard Worker if (insn->prefixPresent[0x67])
1067*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_ADSIZE;
1068*9880d681SAndroid Build Coastguard Worker if (insn->prefixPresent[0x66])
1069*9880d681SAndroid Build Coastguard Worker attrMask |= ATTR_OPSIZE;
1070*9880d681SAndroid Build Coastguard Worker
1071*9880d681SAndroid Build Coastguard Worker /* In 16-bit, invert the attributes. */
1072*9880d681SAndroid Build Coastguard Worker if (insn->mode == MODE_16BIT)
1073*9880d681SAndroid Build Coastguard Worker attrMask ^= ATTR_ADSIZE | ATTR_OPSIZE;
1074*9880d681SAndroid Build Coastguard Worker
1075*9880d681SAndroid Build Coastguard Worker if (getIDWithAttrMask(&instructionID, insn, attrMask))
1076*9880d681SAndroid Build Coastguard Worker return -1;
1077*9880d681SAndroid Build Coastguard Worker
1078*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionID;
1079*9880d681SAndroid Build Coastguard Worker insn->spec = specifierForUID(instructionID);
1080*9880d681SAndroid Build Coastguard Worker return 0;
1081*9880d681SAndroid Build Coastguard Worker }
1082*9880d681SAndroid Build Coastguard Worker
1083*9880d681SAndroid Build Coastguard Worker if ((insn->mode == MODE_16BIT || insn->prefixPresent[0x66]) &&
1084*9880d681SAndroid Build Coastguard Worker !(attrMask & ATTR_OPSIZE)) {
1085*9880d681SAndroid Build Coastguard Worker /*
1086*9880d681SAndroid Build Coastguard Worker * The instruction tables make no distinction between instructions that
1087*9880d681SAndroid Build Coastguard Worker * allow OpSize anywhere (i.e., 16-bit operations) and that need it in a
1088*9880d681SAndroid Build Coastguard Worker * particular spot (i.e., many MMX operations). In general we're
1089*9880d681SAndroid Build Coastguard Worker * conservative, but in the specific case where OpSize is present but not
1090*9880d681SAndroid Build Coastguard Worker * in the right place we check if there's a 16-bit operation.
1091*9880d681SAndroid Build Coastguard Worker */
1092*9880d681SAndroid Build Coastguard Worker
1093*9880d681SAndroid Build Coastguard Worker const struct InstructionSpecifier *spec;
1094*9880d681SAndroid Build Coastguard Worker uint16_t instructionIDWithOpsize;
1095*9880d681SAndroid Build Coastguard Worker const char *specName, *specWithOpSizeName;
1096*9880d681SAndroid Build Coastguard Worker
1097*9880d681SAndroid Build Coastguard Worker spec = specifierForUID(instructionID);
1098*9880d681SAndroid Build Coastguard Worker
1099*9880d681SAndroid Build Coastguard Worker if (getIDWithAttrMask(&instructionIDWithOpsize,
1100*9880d681SAndroid Build Coastguard Worker insn,
1101*9880d681SAndroid Build Coastguard Worker attrMask | ATTR_OPSIZE)) {
1102*9880d681SAndroid Build Coastguard Worker /*
1103*9880d681SAndroid Build Coastguard Worker * ModRM required with OpSize but not present; give up and return version
1104*9880d681SAndroid Build Coastguard Worker * without OpSize set
1105*9880d681SAndroid Build Coastguard Worker */
1106*9880d681SAndroid Build Coastguard Worker
1107*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionID;
1108*9880d681SAndroid Build Coastguard Worker insn->spec = spec;
1109*9880d681SAndroid Build Coastguard Worker return 0;
1110*9880d681SAndroid Build Coastguard Worker }
1111*9880d681SAndroid Build Coastguard Worker
1112*9880d681SAndroid Build Coastguard Worker specName = GetInstrName(instructionID, miiArg);
1113*9880d681SAndroid Build Coastguard Worker specWithOpSizeName = GetInstrName(instructionIDWithOpsize, miiArg);
1114*9880d681SAndroid Build Coastguard Worker
1115*9880d681SAndroid Build Coastguard Worker if (is16BitEquivalent(specName, specWithOpSizeName) &&
1116*9880d681SAndroid Build Coastguard Worker (insn->mode == MODE_16BIT) ^ insn->prefixPresent[0x66]) {
1117*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionIDWithOpsize;
1118*9880d681SAndroid Build Coastguard Worker insn->spec = specifierForUID(instructionIDWithOpsize);
1119*9880d681SAndroid Build Coastguard Worker } else {
1120*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionID;
1121*9880d681SAndroid Build Coastguard Worker insn->spec = spec;
1122*9880d681SAndroid Build Coastguard Worker }
1123*9880d681SAndroid Build Coastguard Worker return 0;
1124*9880d681SAndroid Build Coastguard Worker }
1125*9880d681SAndroid Build Coastguard Worker
1126*9880d681SAndroid Build Coastguard Worker if (insn->opcodeType == ONEBYTE && insn->opcode == 0x90 &&
1127*9880d681SAndroid Build Coastguard Worker insn->rexPrefix & 0x01) {
1128*9880d681SAndroid Build Coastguard Worker /*
1129*9880d681SAndroid Build Coastguard Worker * NOOP shouldn't decode as NOOP if REX.b is set. Instead
1130*9880d681SAndroid Build Coastguard Worker * it should decode as XCHG %r8, %eax.
1131*9880d681SAndroid Build Coastguard Worker */
1132*9880d681SAndroid Build Coastguard Worker
1133*9880d681SAndroid Build Coastguard Worker const struct InstructionSpecifier *spec;
1134*9880d681SAndroid Build Coastguard Worker uint16_t instructionIDWithNewOpcode;
1135*9880d681SAndroid Build Coastguard Worker const struct InstructionSpecifier *specWithNewOpcode;
1136*9880d681SAndroid Build Coastguard Worker
1137*9880d681SAndroid Build Coastguard Worker spec = specifierForUID(instructionID);
1138*9880d681SAndroid Build Coastguard Worker
1139*9880d681SAndroid Build Coastguard Worker /* Borrow opcode from one of the other XCHGar opcodes */
1140*9880d681SAndroid Build Coastguard Worker insn->opcode = 0x91;
1141*9880d681SAndroid Build Coastguard Worker
1142*9880d681SAndroid Build Coastguard Worker if (getIDWithAttrMask(&instructionIDWithNewOpcode,
1143*9880d681SAndroid Build Coastguard Worker insn,
1144*9880d681SAndroid Build Coastguard Worker attrMask)) {
1145*9880d681SAndroid Build Coastguard Worker insn->opcode = 0x90;
1146*9880d681SAndroid Build Coastguard Worker
1147*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionID;
1148*9880d681SAndroid Build Coastguard Worker insn->spec = spec;
1149*9880d681SAndroid Build Coastguard Worker return 0;
1150*9880d681SAndroid Build Coastguard Worker }
1151*9880d681SAndroid Build Coastguard Worker
1152*9880d681SAndroid Build Coastguard Worker specWithNewOpcode = specifierForUID(instructionIDWithNewOpcode);
1153*9880d681SAndroid Build Coastguard Worker
1154*9880d681SAndroid Build Coastguard Worker /* Change back */
1155*9880d681SAndroid Build Coastguard Worker insn->opcode = 0x90;
1156*9880d681SAndroid Build Coastguard Worker
1157*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionIDWithNewOpcode;
1158*9880d681SAndroid Build Coastguard Worker insn->spec = specWithNewOpcode;
1159*9880d681SAndroid Build Coastguard Worker
1160*9880d681SAndroid Build Coastguard Worker return 0;
1161*9880d681SAndroid Build Coastguard Worker }
1162*9880d681SAndroid Build Coastguard Worker
1163*9880d681SAndroid Build Coastguard Worker insn->instructionID = instructionID;
1164*9880d681SAndroid Build Coastguard Worker insn->spec = specifierForUID(insn->instructionID);
1165*9880d681SAndroid Build Coastguard Worker
1166*9880d681SAndroid Build Coastguard Worker return 0;
1167*9880d681SAndroid Build Coastguard Worker }
1168*9880d681SAndroid Build Coastguard Worker
1169*9880d681SAndroid Build Coastguard Worker /*
1170*9880d681SAndroid Build Coastguard Worker * readSIB - Consumes the SIB byte to determine addressing information for an
1171*9880d681SAndroid Build Coastguard Worker * instruction.
1172*9880d681SAndroid Build Coastguard Worker *
1173*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose SIB byte is to be read.
1174*9880d681SAndroid Build Coastguard Worker * @return - 0 if the SIB byte was successfully read; nonzero otherwise.
1175*9880d681SAndroid Build Coastguard Worker */
readSIB(struct InternalInstruction * insn)1176*9880d681SAndroid Build Coastguard Worker static int readSIB(struct InternalInstruction* insn) {
1177*9880d681SAndroid Build Coastguard Worker SIBIndex sibIndexBase = SIB_INDEX_NONE;
1178*9880d681SAndroid Build Coastguard Worker SIBBase sibBaseBase = SIB_BASE_NONE;
1179*9880d681SAndroid Build Coastguard Worker uint8_t index, base;
1180*9880d681SAndroid Build Coastguard Worker
1181*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readSIB()");
1182*9880d681SAndroid Build Coastguard Worker
1183*9880d681SAndroid Build Coastguard Worker if (insn->consumedSIB)
1184*9880d681SAndroid Build Coastguard Worker return 0;
1185*9880d681SAndroid Build Coastguard Worker
1186*9880d681SAndroid Build Coastguard Worker insn->consumedSIB = true;
1187*9880d681SAndroid Build Coastguard Worker
1188*9880d681SAndroid Build Coastguard Worker switch (insn->addressSize) {
1189*9880d681SAndroid Build Coastguard Worker case 2:
1190*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "SIB-based addressing doesn't work in 16-bit mode");
1191*9880d681SAndroid Build Coastguard Worker return -1;
1192*9880d681SAndroid Build Coastguard Worker case 4:
1193*9880d681SAndroid Build Coastguard Worker sibIndexBase = SIB_INDEX_EAX;
1194*9880d681SAndroid Build Coastguard Worker sibBaseBase = SIB_BASE_EAX;
1195*9880d681SAndroid Build Coastguard Worker break;
1196*9880d681SAndroid Build Coastguard Worker case 8:
1197*9880d681SAndroid Build Coastguard Worker sibIndexBase = SIB_INDEX_RAX;
1198*9880d681SAndroid Build Coastguard Worker sibBaseBase = SIB_BASE_RAX;
1199*9880d681SAndroid Build Coastguard Worker break;
1200*9880d681SAndroid Build Coastguard Worker }
1201*9880d681SAndroid Build Coastguard Worker
1202*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &insn->sib))
1203*9880d681SAndroid Build Coastguard Worker return -1;
1204*9880d681SAndroid Build Coastguard Worker
1205*9880d681SAndroid Build Coastguard Worker index = indexFromSIB(insn->sib) | (xFromREX(insn->rexPrefix) << 3);
1206*9880d681SAndroid Build Coastguard Worker
1207*9880d681SAndroid Build Coastguard Worker // FIXME: The fifth bit (bit index 4) is only to be used for instructions
1208*9880d681SAndroid Build Coastguard Worker // that understand VSIB indexing. ORing the bit in here is mildy dangerous
1209*9880d681SAndroid Build Coastguard Worker // because performing math on an 'enum SIBIndex' can produce garbage.
1210*9880d681SAndroid Build Coastguard Worker // Excluding the "none" value, it should cover 6 spaces of register names:
1211*9880d681SAndroid Build Coastguard Worker // - 16 possibilities for 16-bit GPR starting at SIB_INDEX_BX_SI
1212*9880d681SAndroid Build Coastguard Worker // - 16 possibilities for 32-bit GPR starting at SIB_INDEX_EAX
1213*9880d681SAndroid Build Coastguard Worker // - 16 possibilities for 64-bit GPR starting at SIB_INDEX_RAX
1214*9880d681SAndroid Build Coastguard Worker // - 32 possibilities for each of XMM, YMM, ZMM registers
1215*9880d681SAndroid Build Coastguard Worker // When sibIndexBase gets assigned SIB_INDEX_RAX as it does in 64-bit mode,
1216*9880d681SAndroid Build Coastguard Worker // summing in a fully decoded index between 0 and 31 can end up with a value
1217*9880d681SAndroid Build Coastguard Worker // that looks like something in the low half of the XMM range.
1218*9880d681SAndroid Build Coastguard Worker // translateRMMemory() tries to reverse the damage, with only partial success,
1219*9880d681SAndroid Build Coastguard Worker // as evidenced by known bugs in "test/MC/Disassembler/X86/x86-64.txt"
1220*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_EVEX)
1221*9880d681SAndroid Build Coastguard Worker index |= v2FromEVEX4of4(insn->vectorExtensionPrefix[3]) << 4;
1222*9880d681SAndroid Build Coastguard Worker
1223*9880d681SAndroid Build Coastguard Worker if (index == 0x4) {
1224*9880d681SAndroid Build Coastguard Worker insn->sibIndex = SIB_INDEX_NONE;
1225*9880d681SAndroid Build Coastguard Worker } else {
1226*9880d681SAndroid Build Coastguard Worker insn->sibIndex = (SIBIndex)(sibIndexBase + index);
1227*9880d681SAndroid Build Coastguard Worker }
1228*9880d681SAndroid Build Coastguard Worker
1229*9880d681SAndroid Build Coastguard Worker insn->sibScale = 1 << scaleFromSIB(insn->sib);
1230*9880d681SAndroid Build Coastguard Worker
1231*9880d681SAndroid Build Coastguard Worker base = baseFromSIB(insn->sib) | (bFromREX(insn->rexPrefix) << 3);
1232*9880d681SAndroid Build Coastguard Worker
1233*9880d681SAndroid Build Coastguard Worker switch (base) {
1234*9880d681SAndroid Build Coastguard Worker case 0x5:
1235*9880d681SAndroid Build Coastguard Worker case 0xd:
1236*9880d681SAndroid Build Coastguard Worker switch (modFromModRM(insn->modRM)) {
1237*9880d681SAndroid Build Coastguard Worker case 0x0:
1238*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_32;
1239*9880d681SAndroid Build Coastguard Worker insn->sibBase = SIB_BASE_NONE;
1240*9880d681SAndroid Build Coastguard Worker break;
1241*9880d681SAndroid Build Coastguard Worker case 0x1:
1242*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_8;
1243*9880d681SAndroid Build Coastguard Worker insn->sibBase = (SIBBase)(sibBaseBase + base);
1244*9880d681SAndroid Build Coastguard Worker break;
1245*9880d681SAndroid Build Coastguard Worker case 0x2:
1246*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_32;
1247*9880d681SAndroid Build Coastguard Worker insn->sibBase = (SIBBase)(sibBaseBase + base);
1248*9880d681SAndroid Build Coastguard Worker break;
1249*9880d681SAndroid Build Coastguard Worker case 0x3:
1250*9880d681SAndroid Build Coastguard Worker debug("Cannot have Mod = 0b11 and a SIB byte");
1251*9880d681SAndroid Build Coastguard Worker return -1;
1252*9880d681SAndroid Build Coastguard Worker }
1253*9880d681SAndroid Build Coastguard Worker break;
1254*9880d681SAndroid Build Coastguard Worker default:
1255*9880d681SAndroid Build Coastguard Worker insn->sibBase = (SIBBase)(sibBaseBase + base);
1256*9880d681SAndroid Build Coastguard Worker break;
1257*9880d681SAndroid Build Coastguard Worker }
1258*9880d681SAndroid Build Coastguard Worker
1259*9880d681SAndroid Build Coastguard Worker return 0;
1260*9880d681SAndroid Build Coastguard Worker }
1261*9880d681SAndroid Build Coastguard Worker
1262*9880d681SAndroid Build Coastguard Worker /*
1263*9880d681SAndroid Build Coastguard Worker * readDisplacement - Consumes the displacement of an instruction.
1264*9880d681SAndroid Build Coastguard Worker *
1265*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose displacement is to be read.
1266*9880d681SAndroid Build Coastguard Worker * @return - 0 if the displacement byte was successfully read; nonzero
1267*9880d681SAndroid Build Coastguard Worker * otherwise.
1268*9880d681SAndroid Build Coastguard Worker */
readDisplacement(struct InternalInstruction * insn)1269*9880d681SAndroid Build Coastguard Worker static int readDisplacement(struct InternalInstruction* insn) {
1270*9880d681SAndroid Build Coastguard Worker int8_t d8;
1271*9880d681SAndroid Build Coastguard Worker int16_t d16;
1272*9880d681SAndroid Build Coastguard Worker int32_t d32;
1273*9880d681SAndroid Build Coastguard Worker
1274*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readDisplacement()");
1275*9880d681SAndroid Build Coastguard Worker
1276*9880d681SAndroid Build Coastguard Worker if (insn->consumedDisplacement)
1277*9880d681SAndroid Build Coastguard Worker return 0;
1278*9880d681SAndroid Build Coastguard Worker
1279*9880d681SAndroid Build Coastguard Worker insn->consumedDisplacement = true;
1280*9880d681SAndroid Build Coastguard Worker insn->displacementOffset = insn->readerCursor - insn->startLocation;
1281*9880d681SAndroid Build Coastguard Worker
1282*9880d681SAndroid Build Coastguard Worker switch (insn->eaDisplacement) {
1283*9880d681SAndroid Build Coastguard Worker case EA_DISP_NONE:
1284*9880d681SAndroid Build Coastguard Worker insn->consumedDisplacement = false;
1285*9880d681SAndroid Build Coastguard Worker break;
1286*9880d681SAndroid Build Coastguard Worker case EA_DISP_8:
1287*9880d681SAndroid Build Coastguard Worker if (consumeInt8(insn, &d8))
1288*9880d681SAndroid Build Coastguard Worker return -1;
1289*9880d681SAndroid Build Coastguard Worker insn->displacement = d8;
1290*9880d681SAndroid Build Coastguard Worker break;
1291*9880d681SAndroid Build Coastguard Worker case EA_DISP_16:
1292*9880d681SAndroid Build Coastguard Worker if (consumeInt16(insn, &d16))
1293*9880d681SAndroid Build Coastguard Worker return -1;
1294*9880d681SAndroid Build Coastguard Worker insn->displacement = d16;
1295*9880d681SAndroid Build Coastguard Worker break;
1296*9880d681SAndroid Build Coastguard Worker case EA_DISP_32:
1297*9880d681SAndroid Build Coastguard Worker if (consumeInt32(insn, &d32))
1298*9880d681SAndroid Build Coastguard Worker return -1;
1299*9880d681SAndroid Build Coastguard Worker insn->displacement = d32;
1300*9880d681SAndroid Build Coastguard Worker break;
1301*9880d681SAndroid Build Coastguard Worker }
1302*9880d681SAndroid Build Coastguard Worker
1303*9880d681SAndroid Build Coastguard Worker insn->consumedDisplacement = true;
1304*9880d681SAndroid Build Coastguard Worker return 0;
1305*9880d681SAndroid Build Coastguard Worker }
1306*9880d681SAndroid Build Coastguard Worker
1307*9880d681SAndroid Build Coastguard Worker /*
1308*9880d681SAndroid Build Coastguard Worker * readModRM - Consumes all addressing information (ModR/M byte, SIB byte, and
1309*9880d681SAndroid Build Coastguard Worker * displacement) for an instruction and interprets it.
1310*9880d681SAndroid Build Coastguard Worker *
1311*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose addressing information is to be read.
1312*9880d681SAndroid Build Coastguard Worker * @return - 0 if the information was successfully read; nonzero otherwise.
1313*9880d681SAndroid Build Coastguard Worker */
readModRM(struct InternalInstruction * insn)1314*9880d681SAndroid Build Coastguard Worker static int readModRM(struct InternalInstruction* insn) {
1315*9880d681SAndroid Build Coastguard Worker uint8_t mod, rm, reg;
1316*9880d681SAndroid Build Coastguard Worker
1317*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readModRM()");
1318*9880d681SAndroid Build Coastguard Worker
1319*9880d681SAndroid Build Coastguard Worker if (insn->consumedModRM)
1320*9880d681SAndroid Build Coastguard Worker return 0;
1321*9880d681SAndroid Build Coastguard Worker
1322*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &insn->modRM))
1323*9880d681SAndroid Build Coastguard Worker return -1;
1324*9880d681SAndroid Build Coastguard Worker insn->consumedModRM = true;
1325*9880d681SAndroid Build Coastguard Worker
1326*9880d681SAndroid Build Coastguard Worker mod = modFromModRM(insn->modRM);
1327*9880d681SAndroid Build Coastguard Worker rm = rmFromModRM(insn->modRM);
1328*9880d681SAndroid Build Coastguard Worker reg = regFromModRM(insn->modRM);
1329*9880d681SAndroid Build Coastguard Worker
1330*9880d681SAndroid Build Coastguard Worker /*
1331*9880d681SAndroid Build Coastguard Worker * This goes by insn->registerSize to pick the correct register, which messes
1332*9880d681SAndroid Build Coastguard Worker * up if we're using (say) XMM or 8-bit register operands. That gets fixed in
1333*9880d681SAndroid Build Coastguard Worker * fixupReg().
1334*9880d681SAndroid Build Coastguard Worker */
1335*9880d681SAndroid Build Coastguard Worker switch (insn->registerSize) {
1336*9880d681SAndroid Build Coastguard Worker case 2:
1337*9880d681SAndroid Build Coastguard Worker insn->regBase = MODRM_REG_AX;
1338*9880d681SAndroid Build Coastguard Worker insn->eaRegBase = EA_REG_AX;
1339*9880d681SAndroid Build Coastguard Worker break;
1340*9880d681SAndroid Build Coastguard Worker case 4:
1341*9880d681SAndroid Build Coastguard Worker insn->regBase = MODRM_REG_EAX;
1342*9880d681SAndroid Build Coastguard Worker insn->eaRegBase = EA_REG_EAX;
1343*9880d681SAndroid Build Coastguard Worker break;
1344*9880d681SAndroid Build Coastguard Worker case 8:
1345*9880d681SAndroid Build Coastguard Worker insn->regBase = MODRM_REG_RAX;
1346*9880d681SAndroid Build Coastguard Worker insn->eaRegBase = EA_REG_RAX;
1347*9880d681SAndroid Build Coastguard Worker break;
1348*9880d681SAndroid Build Coastguard Worker }
1349*9880d681SAndroid Build Coastguard Worker
1350*9880d681SAndroid Build Coastguard Worker reg |= rFromREX(insn->rexPrefix) << 3;
1351*9880d681SAndroid Build Coastguard Worker rm |= bFromREX(insn->rexPrefix) << 3;
1352*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_EVEX) {
1353*9880d681SAndroid Build Coastguard Worker reg |= r2FromEVEX2of4(insn->vectorExtensionPrefix[1]) << 4;
1354*9880d681SAndroid Build Coastguard Worker rm |= xFromEVEX2of4(insn->vectorExtensionPrefix[1]) << 4;
1355*9880d681SAndroid Build Coastguard Worker }
1356*9880d681SAndroid Build Coastguard Worker
1357*9880d681SAndroid Build Coastguard Worker insn->reg = (Reg)(insn->regBase + reg);
1358*9880d681SAndroid Build Coastguard Worker
1359*9880d681SAndroid Build Coastguard Worker switch (insn->addressSize) {
1360*9880d681SAndroid Build Coastguard Worker case 2:
1361*9880d681SAndroid Build Coastguard Worker insn->eaBaseBase = EA_BASE_BX_SI;
1362*9880d681SAndroid Build Coastguard Worker
1363*9880d681SAndroid Build Coastguard Worker switch (mod) {
1364*9880d681SAndroid Build Coastguard Worker case 0x0:
1365*9880d681SAndroid Build Coastguard Worker if (rm == 0x6) {
1366*9880d681SAndroid Build Coastguard Worker insn->eaBase = EA_BASE_NONE;
1367*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_16;
1368*9880d681SAndroid Build Coastguard Worker if (readDisplacement(insn))
1369*9880d681SAndroid Build Coastguard Worker return -1;
1370*9880d681SAndroid Build Coastguard Worker } else {
1371*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1372*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_NONE;
1373*9880d681SAndroid Build Coastguard Worker }
1374*9880d681SAndroid Build Coastguard Worker break;
1375*9880d681SAndroid Build Coastguard Worker case 0x1:
1376*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1377*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_8;
1378*9880d681SAndroid Build Coastguard Worker insn->displacementSize = 1;
1379*9880d681SAndroid Build Coastguard Worker if (readDisplacement(insn))
1380*9880d681SAndroid Build Coastguard Worker return -1;
1381*9880d681SAndroid Build Coastguard Worker break;
1382*9880d681SAndroid Build Coastguard Worker case 0x2:
1383*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1384*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_16;
1385*9880d681SAndroid Build Coastguard Worker if (readDisplacement(insn))
1386*9880d681SAndroid Build Coastguard Worker return -1;
1387*9880d681SAndroid Build Coastguard Worker break;
1388*9880d681SAndroid Build Coastguard Worker case 0x3:
1389*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)(insn->eaRegBase + rm);
1390*9880d681SAndroid Build Coastguard Worker if (readDisplacement(insn))
1391*9880d681SAndroid Build Coastguard Worker return -1;
1392*9880d681SAndroid Build Coastguard Worker break;
1393*9880d681SAndroid Build Coastguard Worker }
1394*9880d681SAndroid Build Coastguard Worker break;
1395*9880d681SAndroid Build Coastguard Worker case 4:
1396*9880d681SAndroid Build Coastguard Worker case 8:
1397*9880d681SAndroid Build Coastguard Worker insn->eaBaseBase = (insn->addressSize == 4 ? EA_BASE_EAX : EA_BASE_RAX);
1398*9880d681SAndroid Build Coastguard Worker
1399*9880d681SAndroid Build Coastguard Worker switch (mod) {
1400*9880d681SAndroid Build Coastguard Worker case 0x0:
1401*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_NONE; /* readSIB may override this */
1402*9880d681SAndroid Build Coastguard Worker // In determining whether RIP-relative mode is used (rm=5),
1403*9880d681SAndroid Build Coastguard Worker // or whether a SIB byte is present (rm=4),
1404*9880d681SAndroid Build Coastguard Worker // the extension bits (REX.b and EVEX.x) are ignored.
1405*9880d681SAndroid Build Coastguard Worker switch (rm & 7) {
1406*9880d681SAndroid Build Coastguard Worker case 0x4: // SIB byte is present
1407*9880d681SAndroid Build Coastguard Worker insn->eaBase = (insn->addressSize == 4 ?
1408*9880d681SAndroid Build Coastguard Worker EA_BASE_sib : EA_BASE_sib64);
1409*9880d681SAndroid Build Coastguard Worker if (readSIB(insn) || readDisplacement(insn))
1410*9880d681SAndroid Build Coastguard Worker return -1;
1411*9880d681SAndroid Build Coastguard Worker break;
1412*9880d681SAndroid Build Coastguard Worker case 0x5: // RIP-relative
1413*9880d681SAndroid Build Coastguard Worker insn->eaBase = EA_BASE_NONE;
1414*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_32;
1415*9880d681SAndroid Build Coastguard Worker if (readDisplacement(insn))
1416*9880d681SAndroid Build Coastguard Worker return -1;
1417*9880d681SAndroid Build Coastguard Worker break;
1418*9880d681SAndroid Build Coastguard Worker default:
1419*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1420*9880d681SAndroid Build Coastguard Worker break;
1421*9880d681SAndroid Build Coastguard Worker }
1422*9880d681SAndroid Build Coastguard Worker break;
1423*9880d681SAndroid Build Coastguard Worker case 0x1:
1424*9880d681SAndroid Build Coastguard Worker insn->displacementSize = 1;
1425*9880d681SAndroid Build Coastguard Worker /* FALLTHROUGH */
1426*9880d681SAndroid Build Coastguard Worker case 0x2:
1427*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = (mod == 0x1 ? EA_DISP_8 : EA_DISP_32);
1428*9880d681SAndroid Build Coastguard Worker switch (rm & 7) {
1429*9880d681SAndroid Build Coastguard Worker case 0x4: // SIB byte is present
1430*9880d681SAndroid Build Coastguard Worker insn->eaBase = EA_BASE_sib;
1431*9880d681SAndroid Build Coastguard Worker if (readSIB(insn) || readDisplacement(insn))
1432*9880d681SAndroid Build Coastguard Worker return -1;
1433*9880d681SAndroid Build Coastguard Worker break;
1434*9880d681SAndroid Build Coastguard Worker default:
1435*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1436*9880d681SAndroid Build Coastguard Worker if (readDisplacement(insn))
1437*9880d681SAndroid Build Coastguard Worker return -1;
1438*9880d681SAndroid Build Coastguard Worker break;
1439*9880d681SAndroid Build Coastguard Worker }
1440*9880d681SAndroid Build Coastguard Worker break;
1441*9880d681SAndroid Build Coastguard Worker case 0x3:
1442*9880d681SAndroid Build Coastguard Worker insn->eaDisplacement = EA_DISP_NONE;
1443*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)(insn->eaRegBase + rm);
1444*9880d681SAndroid Build Coastguard Worker break;
1445*9880d681SAndroid Build Coastguard Worker }
1446*9880d681SAndroid Build Coastguard Worker break;
1447*9880d681SAndroid Build Coastguard Worker } /* switch (insn->addressSize) */
1448*9880d681SAndroid Build Coastguard Worker
1449*9880d681SAndroid Build Coastguard Worker return 0;
1450*9880d681SAndroid Build Coastguard Worker }
1451*9880d681SAndroid Build Coastguard Worker
1452*9880d681SAndroid Build Coastguard Worker #define GENERIC_FIXUP_FUNC(name, base, prefix) \
1453*9880d681SAndroid Build Coastguard Worker static uint16_t name(struct InternalInstruction *insn, \
1454*9880d681SAndroid Build Coastguard Worker OperandType type, \
1455*9880d681SAndroid Build Coastguard Worker uint8_t index, \
1456*9880d681SAndroid Build Coastguard Worker uint8_t *valid) { \
1457*9880d681SAndroid Build Coastguard Worker *valid = 1; \
1458*9880d681SAndroid Build Coastguard Worker switch (type) { \
1459*9880d681SAndroid Build Coastguard Worker default: \
1460*9880d681SAndroid Build Coastguard Worker debug("Unhandled register type"); \
1461*9880d681SAndroid Build Coastguard Worker *valid = 0; \
1462*9880d681SAndroid Build Coastguard Worker return 0; \
1463*9880d681SAndroid Build Coastguard Worker case TYPE_Rv: \
1464*9880d681SAndroid Build Coastguard Worker return base + index; \
1465*9880d681SAndroid Build Coastguard Worker case TYPE_R8: \
1466*9880d681SAndroid Build Coastguard Worker if (insn->rexPrefix && \
1467*9880d681SAndroid Build Coastguard Worker index >= 4 && index <= 7) { \
1468*9880d681SAndroid Build Coastguard Worker return prefix##_SPL + (index - 4); \
1469*9880d681SAndroid Build Coastguard Worker } else { \
1470*9880d681SAndroid Build Coastguard Worker return prefix##_AL + index; \
1471*9880d681SAndroid Build Coastguard Worker } \
1472*9880d681SAndroid Build Coastguard Worker case TYPE_R16: \
1473*9880d681SAndroid Build Coastguard Worker return prefix##_AX + index; \
1474*9880d681SAndroid Build Coastguard Worker case TYPE_R32: \
1475*9880d681SAndroid Build Coastguard Worker return prefix##_EAX + index; \
1476*9880d681SAndroid Build Coastguard Worker case TYPE_R64: \
1477*9880d681SAndroid Build Coastguard Worker return prefix##_RAX + index; \
1478*9880d681SAndroid Build Coastguard Worker case TYPE_XMM512: \
1479*9880d681SAndroid Build Coastguard Worker return prefix##_ZMM0 + index; \
1480*9880d681SAndroid Build Coastguard Worker case TYPE_XMM256: \
1481*9880d681SAndroid Build Coastguard Worker return prefix##_YMM0 + index; \
1482*9880d681SAndroid Build Coastguard Worker case TYPE_XMM128: \
1483*9880d681SAndroid Build Coastguard Worker case TYPE_XMM64: \
1484*9880d681SAndroid Build Coastguard Worker case TYPE_XMM32: \
1485*9880d681SAndroid Build Coastguard Worker return prefix##_XMM0 + index; \
1486*9880d681SAndroid Build Coastguard Worker case TYPE_VK1: \
1487*9880d681SAndroid Build Coastguard Worker case TYPE_VK2: \
1488*9880d681SAndroid Build Coastguard Worker case TYPE_VK4: \
1489*9880d681SAndroid Build Coastguard Worker case TYPE_VK8: \
1490*9880d681SAndroid Build Coastguard Worker case TYPE_VK16: \
1491*9880d681SAndroid Build Coastguard Worker case TYPE_VK32: \
1492*9880d681SAndroid Build Coastguard Worker case TYPE_VK64: \
1493*9880d681SAndroid Build Coastguard Worker if (index > 7) \
1494*9880d681SAndroid Build Coastguard Worker *valid = 0; \
1495*9880d681SAndroid Build Coastguard Worker return prefix##_K0 + index; \
1496*9880d681SAndroid Build Coastguard Worker case TYPE_MM64: \
1497*9880d681SAndroid Build Coastguard Worker return prefix##_MM0 + (index & 0x7); \
1498*9880d681SAndroid Build Coastguard Worker case TYPE_SEGMENTREG: \
1499*9880d681SAndroid Build Coastguard Worker if (index > 5) \
1500*9880d681SAndroid Build Coastguard Worker *valid = 0; \
1501*9880d681SAndroid Build Coastguard Worker return prefix##_ES + index; \
1502*9880d681SAndroid Build Coastguard Worker case TYPE_DEBUGREG: \
1503*9880d681SAndroid Build Coastguard Worker return prefix##_DR0 + index; \
1504*9880d681SAndroid Build Coastguard Worker case TYPE_CONTROLREG: \
1505*9880d681SAndroid Build Coastguard Worker return prefix##_CR0 + index; \
1506*9880d681SAndroid Build Coastguard Worker case TYPE_BNDR: \
1507*9880d681SAndroid Build Coastguard Worker if (index > 3) \
1508*9880d681SAndroid Build Coastguard Worker *valid = 0; \
1509*9880d681SAndroid Build Coastguard Worker return prefix##_BND0 + index; \
1510*9880d681SAndroid Build Coastguard Worker } \
1511*9880d681SAndroid Build Coastguard Worker }
1512*9880d681SAndroid Build Coastguard Worker
1513*9880d681SAndroid Build Coastguard Worker /*
1514*9880d681SAndroid Build Coastguard Worker * fixup*Value - Consults an operand type to determine the meaning of the
1515*9880d681SAndroid Build Coastguard Worker * reg or R/M field. If the operand is an XMM operand, for example, an
1516*9880d681SAndroid Build Coastguard Worker * operand would be XMM0 instead of AX, which readModRM() would otherwise
1517*9880d681SAndroid Build Coastguard Worker * misinterpret it as.
1518*9880d681SAndroid Build Coastguard Worker *
1519*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction containing the operand.
1520*9880d681SAndroid Build Coastguard Worker * @param type - The operand type.
1521*9880d681SAndroid Build Coastguard Worker * @param index - The existing value of the field as reported by readModRM().
1522*9880d681SAndroid Build Coastguard Worker * @param valid - The address of a uint8_t. The target is set to 1 if the
1523*9880d681SAndroid Build Coastguard Worker * field is valid for the register class; 0 if not.
1524*9880d681SAndroid Build Coastguard Worker * @return - The proper value.
1525*9880d681SAndroid Build Coastguard Worker */
1526*9880d681SAndroid Build Coastguard Worker GENERIC_FIXUP_FUNC(fixupRegValue, insn->regBase, MODRM_REG)
1527*9880d681SAndroid Build Coastguard Worker GENERIC_FIXUP_FUNC(fixupRMValue, insn->eaRegBase, EA_REG)
1528*9880d681SAndroid Build Coastguard Worker
1529*9880d681SAndroid Build Coastguard Worker /*
1530*9880d681SAndroid Build Coastguard Worker * fixupReg - Consults an operand specifier to determine which of the
1531*9880d681SAndroid Build Coastguard Worker * fixup*Value functions to use in correcting readModRM()'ss interpretation.
1532*9880d681SAndroid Build Coastguard Worker *
1533*9880d681SAndroid Build Coastguard Worker * @param insn - See fixup*Value().
1534*9880d681SAndroid Build Coastguard Worker * @param op - The operand specifier.
1535*9880d681SAndroid Build Coastguard Worker * @return - 0 if fixup was successful; -1 if the register returned was
1536*9880d681SAndroid Build Coastguard Worker * invalid for its class.
1537*9880d681SAndroid Build Coastguard Worker */
fixupReg(struct InternalInstruction * insn,const struct OperandSpecifier * op)1538*9880d681SAndroid Build Coastguard Worker static int fixupReg(struct InternalInstruction *insn,
1539*9880d681SAndroid Build Coastguard Worker const struct OperandSpecifier *op) {
1540*9880d681SAndroid Build Coastguard Worker uint8_t valid;
1541*9880d681SAndroid Build Coastguard Worker
1542*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "fixupReg()");
1543*9880d681SAndroid Build Coastguard Worker
1544*9880d681SAndroid Build Coastguard Worker switch ((OperandEncoding)op->encoding) {
1545*9880d681SAndroid Build Coastguard Worker default:
1546*9880d681SAndroid Build Coastguard Worker debug("Expected a REG or R/M encoding in fixupReg");
1547*9880d681SAndroid Build Coastguard Worker return -1;
1548*9880d681SAndroid Build Coastguard Worker case ENCODING_VVVV:
1549*9880d681SAndroid Build Coastguard Worker insn->vvvv = (Reg)fixupRegValue(insn,
1550*9880d681SAndroid Build Coastguard Worker (OperandType)op->type,
1551*9880d681SAndroid Build Coastguard Worker insn->vvvv,
1552*9880d681SAndroid Build Coastguard Worker &valid);
1553*9880d681SAndroid Build Coastguard Worker if (!valid)
1554*9880d681SAndroid Build Coastguard Worker return -1;
1555*9880d681SAndroid Build Coastguard Worker break;
1556*9880d681SAndroid Build Coastguard Worker case ENCODING_REG:
1557*9880d681SAndroid Build Coastguard Worker insn->reg = (Reg)fixupRegValue(insn,
1558*9880d681SAndroid Build Coastguard Worker (OperandType)op->type,
1559*9880d681SAndroid Build Coastguard Worker insn->reg - insn->regBase,
1560*9880d681SAndroid Build Coastguard Worker &valid);
1561*9880d681SAndroid Build Coastguard Worker if (!valid)
1562*9880d681SAndroid Build Coastguard Worker return -1;
1563*9880d681SAndroid Build Coastguard Worker break;
1564*9880d681SAndroid Build Coastguard Worker CASE_ENCODING_RM:
1565*9880d681SAndroid Build Coastguard Worker if (insn->eaBase >= insn->eaRegBase) {
1566*9880d681SAndroid Build Coastguard Worker insn->eaBase = (EABase)fixupRMValue(insn,
1567*9880d681SAndroid Build Coastguard Worker (OperandType)op->type,
1568*9880d681SAndroid Build Coastguard Worker insn->eaBase - insn->eaRegBase,
1569*9880d681SAndroid Build Coastguard Worker &valid);
1570*9880d681SAndroid Build Coastguard Worker if (!valid)
1571*9880d681SAndroid Build Coastguard Worker return -1;
1572*9880d681SAndroid Build Coastguard Worker }
1573*9880d681SAndroid Build Coastguard Worker break;
1574*9880d681SAndroid Build Coastguard Worker }
1575*9880d681SAndroid Build Coastguard Worker
1576*9880d681SAndroid Build Coastguard Worker return 0;
1577*9880d681SAndroid Build Coastguard Worker }
1578*9880d681SAndroid Build Coastguard Worker
1579*9880d681SAndroid Build Coastguard Worker /*
1580*9880d681SAndroid Build Coastguard Worker * readOpcodeRegister - Reads an operand from the opcode field of an
1581*9880d681SAndroid Build Coastguard Worker * instruction and interprets it appropriately given the operand width.
1582*9880d681SAndroid Build Coastguard Worker * Handles AddRegFrm instructions.
1583*9880d681SAndroid Build Coastguard Worker *
1584*9880d681SAndroid Build Coastguard Worker * @param insn - the instruction whose opcode field is to be read.
1585*9880d681SAndroid Build Coastguard Worker * @param size - The width (in bytes) of the register being specified.
1586*9880d681SAndroid Build Coastguard Worker * 1 means AL and friends, 2 means AX, 4 means EAX, and 8 means
1587*9880d681SAndroid Build Coastguard Worker * RAX.
1588*9880d681SAndroid Build Coastguard Worker * @return - 0 on success; nonzero otherwise.
1589*9880d681SAndroid Build Coastguard Worker */
readOpcodeRegister(struct InternalInstruction * insn,uint8_t size)1590*9880d681SAndroid Build Coastguard Worker static int readOpcodeRegister(struct InternalInstruction* insn, uint8_t size) {
1591*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readOpcodeRegister()");
1592*9880d681SAndroid Build Coastguard Worker
1593*9880d681SAndroid Build Coastguard Worker if (size == 0)
1594*9880d681SAndroid Build Coastguard Worker size = insn->registerSize;
1595*9880d681SAndroid Build Coastguard Worker
1596*9880d681SAndroid Build Coastguard Worker switch (size) {
1597*9880d681SAndroid Build Coastguard Worker case 1:
1598*9880d681SAndroid Build Coastguard Worker insn->opcodeRegister = (Reg)(MODRM_REG_AL + ((bFromREX(insn->rexPrefix) << 3)
1599*9880d681SAndroid Build Coastguard Worker | (insn->opcode & 7)));
1600*9880d681SAndroid Build Coastguard Worker if (insn->rexPrefix &&
1601*9880d681SAndroid Build Coastguard Worker insn->opcodeRegister >= MODRM_REG_AL + 0x4 &&
1602*9880d681SAndroid Build Coastguard Worker insn->opcodeRegister < MODRM_REG_AL + 0x8) {
1603*9880d681SAndroid Build Coastguard Worker insn->opcodeRegister = (Reg)(MODRM_REG_SPL
1604*9880d681SAndroid Build Coastguard Worker + (insn->opcodeRegister - MODRM_REG_AL - 4));
1605*9880d681SAndroid Build Coastguard Worker }
1606*9880d681SAndroid Build Coastguard Worker
1607*9880d681SAndroid Build Coastguard Worker break;
1608*9880d681SAndroid Build Coastguard Worker case 2:
1609*9880d681SAndroid Build Coastguard Worker insn->opcodeRegister = (Reg)(MODRM_REG_AX
1610*9880d681SAndroid Build Coastguard Worker + ((bFromREX(insn->rexPrefix) << 3)
1611*9880d681SAndroid Build Coastguard Worker | (insn->opcode & 7)));
1612*9880d681SAndroid Build Coastguard Worker break;
1613*9880d681SAndroid Build Coastguard Worker case 4:
1614*9880d681SAndroid Build Coastguard Worker insn->opcodeRegister = (Reg)(MODRM_REG_EAX
1615*9880d681SAndroid Build Coastguard Worker + ((bFromREX(insn->rexPrefix) << 3)
1616*9880d681SAndroid Build Coastguard Worker | (insn->opcode & 7)));
1617*9880d681SAndroid Build Coastguard Worker break;
1618*9880d681SAndroid Build Coastguard Worker case 8:
1619*9880d681SAndroid Build Coastguard Worker insn->opcodeRegister = (Reg)(MODRM_REG_RAX
1620*9880d681SAndroid Build Coastguard Worker + ((bFromREX(insn->rexPrefix) << 3)
1621*9880d681SAndroid Build Coastguard Worker | (insn->opcode & 7)));
1622*9880d681SAndroid Build Coastguard Worker break;
1623*9880d681SAndroid Build Coastguard Worker }
1624*9880d681SAndroid Build Coastguard Worker
1625*9880d681SAndroid Build Coastguard Worker return 0;
1626*9880d681SAndroid Build Coastguard Worker }
1627*9880d681SAndroid Build Coastguard Worker
1628*9880d681SAndroid Build Coastguard Worker /*
1629*9880d681SAndroid Build Coastguard Worker * readImmediate - Consumes an immediate operand from an instruction, given the
1630*9880d681SAndroid Build Coastguard Worker * desired operand size.
1631*9880d681SAndroid Build Coastguard Worker *
1632*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose operand is to be read.
1633*9880d681SAndroid Build Coastguard Worker * @param size - The width (in bytes) of the operand.
1634*9880d681SAndroid Build Coastguard Worker * @return - 0 if the immediate was successfully consumed; nonzero
1635*9880d681SAndroid Build Coastguard Worker * otherwise.
1636*9880d681SAndroid Build Coastguard Worker */
readImmediate(struct InternalInstruction * insn,uint8_t size)1637*9880d681SAndroid Build Coastguard Worker static int readImmediate(struct InternalInstruction* insn, uint8_t size) {
1638*9880d681SAndroid Build Coastguard Worker uint8_t imm8;
1639*9880d681SAndroid Build Coastguard Worker uint16_t imm16;
1640*9880d681SAndroid Build Coastguard Worker uint32_t imm32;
1641*9880d681SAndroid Build Coastguard Worker uint64_t imm64;
1642*9880d681SAndroid Build Coastguard Worker
1643*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readImmediate()");
1644*9880d681SAndroid Build Coastguard Worker
1645*9880d681SAndroid Build Coastguard Worker if (insn->numImmediatesConsumed == 2) {
1646*9880d681SAndroid Build Coastguard Worker debug("Already consumed two immediates");
1647*9880d681SAndroid Build Coastguard Worker return -1;
1648*9880d681SAndroid Build Coastguard Worker }
1649*9880d681SAndroid Build Coastguard Worker
1650*9880d681SAndroid Build Coastguard Worker if (size == 0)
1651*9880d681SAndroid Build Coastguard Worker size = insn->immediateSize;
1652*9880d681SAndroid Build Coastguard Worker else
1653*9880d681SAndroid Build Coastguard Worker insn->immediateSize = size;
1654*9880d681SAndroid Build Coastguard Worker insn->immediateOffset = insn->readerCursor - insn->startLocation;
1655*9880d681SAndroid Build Coastguard Worker
1656*9880d681SAndroid Build Coastguard Worker switch (size) {
1657*9880d681SAndroid Build Coastguard Worker case 1:
1658*9880d681SAndroid Build Coastguard Worker if (consumeByte(insn, &imm8))
1659*9880d681SAndroid Build Coastguard Worker return -1;
1660*9880d681SAndroid Build Coastguard Worker insn->immediates[insn->numImmediatesConsumed] = imm8;
1661*9880d681SAndroid Build Coastguard Worker break;
1662*9880d681SAndroid Build Coastguard Worker case 2:
1663*9880d681SAndroid Build Coastguard Worker if (consumeUInt16(insn, &imm16))
1664*9880d681SAndroid Build Coastguard Worker return -1;
1665*9880d681SAndroid Build Coastguard Worker insn->immediates[insn->numImmediatesConsumed] = imm16;
1666*9880d681SAndroid Build Coastguard Worker break;
1667*9880d681SAndroid Build Coastguard Worker case 4:
1668*9880d681SAndroid Build Coastguard Worker if (consumeUInt32(insn, &imm32))
1669*9880d681SAndroid Build Coastguard Worker return -1;
1670*9880d681SAndroid Build Coastguard Worker insn->immediates[insn->numImmediatesConsumed] = imm32;
1671*9880d681SAndroid Build Coastguard Worker break;
1672*9880d681SAndroid Build Coastguard Worker case 8:
1673*9880d681SAndroid Build Coastguard Worker if (consumeUInt64(insn, &imm64))
1674*9880d681SAndroid Build Coastguard Worker return -1;
1675*9880d681SAndroid Build Coastguard Worker insn->immediates[insn->numImmediatesConsumed] = imm64;
1676*9880d681SAndroid Build Coastguard Worker break;
1677*9880d681SAndroid Build Coastguard Worker }
1678*9880d681SAndroid Build Coastguard Worker
1679*9880d681SAndroid Build Coastguard Worker insn->numImmediatesConsumed++;
1680*9880d681SAndroid Build Coastguard Worker
1681*9880d681SAndroid Build Coastguard Worker return 0;
1682*9880d681SAndroid Build Coastguard Worker }
1683*9880d681SAndroid Build Coastguard Worker
1684*9880d681SAndroid Build Coastguard Worker /*
1685*9880d681SAndroid Build Coastguard Worker * readVVVV - Consumes vvvv from an instruction if it has a VEX prefix.
1686*9880d681SAndroid Build Coastguard Worker *
1687*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose operand is to be read.
1688*9880d681SAndroid Build Coastguard Worker * @return - 0 if the vvvv was successfully consumed; nonzero
1689*9880d681SAndroid Build Coastguard Worker * otherwise.
1690*9880d681SAndroid Build Coastguard Worker */
readVVVV(struct InternalInstruction * insn)1691*9880d681SAndroid Build Coastguard Worker static int readVVVV(struct InternalInstruction* insn) {
1692*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readVVVV()");
1693*9880d681SAndroid Build Coastguard Worker
1694*9880d681SAndroid Build Coastguard Worker int vvvv;
1695*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType == TYPE_EVEX)
1696*9880d681SAndroid Build Coastguard Worker vvvv = (v2FromEVEX4of4(insn->vectorExtensionPrefix[3]) << 4 |
1697*9880d681SAndroid Build Coastguard Worker vvvvFromEVEX3of4(insn->vectorExtensionPrefix[2]));
1698*9880d681SAndroid Build Coastguard Worker else if (insn->vectorExtensionType == TYPE_VEX_3B)
1699*9880d681SAndroid Build Coastguard Worker vvvv = vvvvFromVEX3of3(insn->vectorExtensionPrefix[2]);
1700*9880d681SAndroid Build Coastguard Worker else if (insn->vectorExtensionType == TYPE_VEX_2B)
1701*9880d681SAndroid Build Coastguard Worker vvvv = vvvvFromVEX2of2(insn->vectorExtensionPrefix[1]);
1702*9880d681SAndroid Build Coastguard Worker else if (insn->vectorExtensionType == TYPE_XOP)
1703*9880d681SAndroid Build Coastguard Worker vvvv = vvvvFromXOP3of3(insn->vectorExtensionPrefix[2]);
1704*9880d681SAndroid Build Coastguard Worker else
1705*9880d681SAndroid Build Coastguard Worker return -1;
1706*9880d681SAndroid Build Coastguard Worker
1707*9880d681SAndroid Build Coastguard Worker if (insn->mode != MODE_64BIT)
1708*9880d681SAndroid Build Coastguard Worker vvvv &= 0x7;
1709*9880d681SAndroid Build Coastguard Worker
1710*9880d681SAndroid Build Coastguard Worker insn->vvvv = static_cast<Reg>(vvvv);
1711*9880d681SAndroid Build Coastguard Worker return 0;
1712*9880d681SAndroid Build Coastguard Worker }
1713*9880d681SAndroid Build Coastguard Worker
1714*9880d681SAndroid Build Coastguard Worker /*
1715*9880d681SAndroid Build Coastguard Worker * readMaskRegister - Reads an mask register from the opcode field of an
1716*9880d681SAndroid Build Coastguard Worker * instruction.
1717*9880d681SAndroid Build Coastguard Worker *
1718*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose opcode field is to be read.
1719*9880d681SAndroid Build Coastguard Worker * @return - 0 on success; nonzero otherwise.
1720*9880d681SAndroid Build Coastguard Worker */
readMaskRegister(struct InternalInstruction * insn)1721*9880d681SAndroid Build Coastguard Worker static int readMaskRegister(struct InternalInstruction* insn) {
1722*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readMaskRegister()");
1723*9880d681SAndroid Build Coastguard Worker
1724*9880d681SAndroid Build Coastguard Worker if (insn->vectorExtensionType != TYPE_EVEX)
1725*9880d681SAndroid Build Coastguard Worker return -1;
1726*9880d681SAndroid Build Coastguard Worker
1727*9880d681SAndroid Build Coastguard Worker insn->writemask =
1728*9880d681SAndroid Build Coastguard Worker static_cast<Reg>(aaaFromEVEX4of4(insn->vectorExtensionPrefix[3]));
1729*9880d681SAndroid Build Coastguard Worker return 0;
1730*9880d681SAndroid Build Coastguard Worker }
1731*9880d681SAndroid Build Coastguard Worker
1732*9880d681SAndroid Build Coastguard Worker /*
1733*9880d681SAndroid Build Coastguard Worker * readOperands - Consults the specifier for an instruction and consumes all
1734*9880d681SAndroid Build Coastguard Worker * operands for that instruction, interpreting them as it goes.
1735*9880d681SAndroid Build Coastguard Worker *
1736*9880d681SAndroid Build Coastguard Worker * @param insn - The instruction whose operands are to be read and interpreted.
1737*9880d681SAndroid Build Coastguard Worker * @return - 0 if all operands could be read; nonzero otherwise.
1738*9880d681SAndroid Build Coastguard Worker */
readOperands(struct InternalInstruction * insn)1739*9880d681SAndroid Build Coastguard Worker static int readOperands(struct InternalInstruction* insn) {
1740*9880d681SAndroid Build Coastguard Worker int hasVVVV, needVVVV;
1741*9880d681SAndroid Build Coastguard Worker int sawRegImm = 0;
1742*9880d681SAndroid Build Coastguard Worker
1743*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "readOperands()");
1744*9880d681SAndroid Build Coastguard Worker
1745*9880d681SAndroid Build Coastguard Worker /* If non-zero vvvv specified, need to make sure one of the operands
1746*9880d681SAndroid Build Coastguard Worker uses it. */
1747*9880d681SAndroid Build Coastguard Worker hasVVVV = !readVVVV(insn);
1748*9880d681SAndroid Build Coastguard Worker needVVVV = hasVVVV && (insn->vvvv != 0);
1749*9880d681SAndroid Build Coastguard Worker
1750*9880d681SAndroid Build Coastguard Worker for (const auto &Op : x86OperandSets[insn->spec->operands]) {
1751*9880d681SAndroid Build Coastguard Worker switch (Op.encoding) {
1752*9880d681SAndroid Build Coastguard Worker case ENCODING_NONE:
1753*9880d681SAndroid Build Coastguard Worker case ENCODING_SI:
1754*9880d681SAndroid Build Coastguard Worker case ENCODING_DI:
1755*9880d681SAndroid Build Coastguard Worker break;
1756*9880d681SAndroid Build Coastguard Worker case ENCODING_REG:
1757*9880d681SAndroid Build Coastguard Worker CASE_ENCODING_RM:
1758*9880d681SAndroid Build Coastguard Worker if (readModRM(insn))
1759*9880d681SAndroid Build Coastguard Worker return -1;
1760*9880d681SAndroid Build Coastguard Worker if (fixupReg(insn, &Op))
1761*9880d681SAndroid Build Coastguard Worker return -1;
1762*9880d681SAndroid Build Coastguard Worker // Apply the AVX512 compressed displacement scaling factor.
1763*9880d681SAndroid Build Coastguard Worker if (Op.encoding != ENCODING_REG && insn->eaDisplacement == EA_DISP_8)
1764*9880d681SAndroid Build Coastguard Worker insn->displacement *= 1 << (Op.encoding - ENCODING_RM);
1765*9880d681SAndroid Build Coastguard Worker break;
1766*9880d681SAndroid Build Coastguard Worker case ENCODING_IB:
1767*9880d681SAndroid Build Coastguard Worker if (sawRegImm) {
1768*9880d681SAndroid Build Coastguard Worker /* Saw a register immediate so don't read again and instead split the
1769*9880d681SAndroid Build Coastguard Worker previous immediate. FIXME: This is a hack. */
1770*9880d681SAndroid Build Coastguard Worker insn->immediates[insn->numImmediatesConsumed] =
1771*9880d681SAndroid Build Coastguard Worker insn->immediates[insn->numImmediatesConsumed - 1] & 0xf;
1772*9880d681SAndroid Build Coastguard Worker ++insn->numImmediatesConsumed;
1773*9880d681SAndroid Build Coastguard Worker break;
1774*9880d681SAndroid Build Coastguard Worker }
1775*9880d681SAndroid Build Coastguard Worker if (readImmediate(insn, 1))
1776*9880d681SAndroid Build Coastguard Worker return -1;
1777*9880d681SAndroid Build Coastguard Worker if (Op.type == TYPE_XMM128 ||
1778*9880d681SAndroid Build Coastguard Worker Op.type == TYPE_XMM256)
1779*9880d681SAndroid Build Coastguard Worker sawRegImm = 1;
1780*9880d681SAndroid Build Coastguard Worker break;
1781*9880d681SAndroid Build Coastguard Worker case ENCODING_IW:
1782*9880d681SAndroid Build Coastguard Worker if (readImmediate(insn, 2))
1783*9880d681SAndroid Build Coastguard Worker return -1;
1784*9880d681SAndroid Build Coastguard Worker break;
1785*9880d681SAndroid Build Coastguard Worker case ENCODING_ID:
1786*9880d681SAndroid Build Coastguard Worker if (readImmediate(insn, 4))
1787*9880d681SAndroid Build Coastguard Worker return -1;
1788*9880d681SAndroid Build Coastguard Worker break;
1789*9880d681SAndroid Build Coastguard Worker case ENCODING_IO:
1790*9880d681SAndroid Build Coastguard Worker if (readImmediate(insn, 8))
1791*9880d681SAndroid Build Coastguard Worker return -1;
1792*9880d681SAndroid Build Coastguard Worker break;
1793*9880d681SAndroid Build Coastguard Worker case ENCODING_Iv:
1794*9880d681SAndroid Build Coastguard Worker if (readImmediate(insn, insn->immediateSize))
1795*9880d681SAndroid Build Coastguard Worker return -1;
1796*9880d681SAndroid Build Coastguard Worker break;
1797*9880d681SAndroid Build Coastguard Worker case ENCODING_Ia:
1798*9880d681SAndroid Build Coastguard Worker if (readImmediate(insn, insn->addressSize))
1799*9880d681SAndroid Build Coastguard Worker return -1;
1800*9880d681SAndroid Build Coastguard Worker break;
1801*9880d681SAndroid Build Coastguard Worker case ENCODING_RB:
1802*9880d681SAndroid Build Coastguard Worker if (readOpcodeRegister(insn, 1))
1803*9880d681SAndroid Build Coastguard Worker return -1;
1804*9880d681SAndroid Build Coastguard Worker break;
1805*9880d681SAndroid Build Coastguard Worker case ENCODING_RW:
1806*9880d681SAndroid Build Coastguard Worker if (readOpcodeRegister(insn, 2))
1807*9880d681SAndroid Build Coastguard Worker return -1;
1808*9880d681SAndroid Build Coastguard Worker break;
1809*9880d681SAndroid Build Coastguard Worker case ENCODING_RD:
1810*9880d681SAndroid Build Coastguard Worker if (readOpcodeRegister(insn, 4))
1811*9880d681SAndroid Build Coastguard Worker return -1;
1812*9880d681SAndroid Build Coastguard Worker break;
1813*9880d681SAndroid Build Coastguard Worker case ENCODING_RO:
1814*9880d681SAndroid Build Coastguard Worker if (readOpcodeRegister(insn, 8))
1815*9880d681SAndroid Build Coastguard Worker return -1;
1816*9880d681SAndroid Build Coastguard Worker break;
1817*9880d681SAndroid Build Coastguard Worker case ENCODING_Rv:
1818*9880d681SAndroid Build Coastguard Worker if (readOpcodeRegister(insn, 0))
1819*9880d681SAndroid Build Coastguard Worker return -1;
1820*9880d681SAndroid Build Coastguard Worker break;
1821*9880d681SAndroid Build Coastguard Worker case ENCODING_FP:
1822*9880d681SAndroid Build Coastguard Worker break;
1823*9880d681SAndroid Build Coastguard Worker case ENCODING_VVVV:
1824*9880d681SAndroid Build Coastguard Worker needVVVV = 0; /* Mark that we have found a VVVV operand. */
1825*9880d681SAndroid Build Coastguard Worker if (!hasVVVV)
1826*9880d681SAndroid Build Coastguard Worker return -1;
1827*9880d681SAndroid Build Coastguard Worker if (fixupReg(insn, &Op))
1828*9880d681SAndroid Build Coastguard Worker return -1;
1829*9880d681SAndroid Build Coastguard Worker break;
1830*9880d681SAndroid Build Coastguard Worker case ENCODING_WRITEMASK:
1831*9880d681SAndroid Build Coastguard Worker if (readMaskRegister(insn))
1832*9880d681SAndroid Build Coastguard Worker return -1;
1833*9880d681SAndroid Build Coastguard Worker break;
1834*9880d681SAndroid Build Coastguard Worker case ENCODING_DUP:
1835*9880d681SAndroid Build Coastguard Worker break;
1836*9880d681SAndroid Build Coastguard Worker default:
1837*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Encountered an operand with an unknown encoding.");
1838*9880d681SAndroid Build Coastguard Worker return -1;
1839*9880d681SAndroid Build Coastguard Worker }
1840*9880d681SAndroid Build Coastguard Worker }
1841*9880d681SAndroid Build Coastguard Worker
1842*9880d681SAndroid Build Coastguard Worker /* If we didn't find ENCODING_VVVV operand, but non-zero vvvv present, fail */
1843*9880d681SAndroid Build Coastguard Worker if (needVVVV) return -1;
1844*9880d681SAndroid Build Coastguard Worker
1845*9880d681SAndroid Build Coastguard Worker return 0;
1846*9880d681SAndroid Build Coastguard Worker }
1847*9880d681SAndroid Build Coastguard Worker
1848*9880d681SAndroid Build Coastguard Worker /*
1849*9880d681SAndroid Build Coastguard Worker * decodeInstruction - Reads and interprets a full instruction provided by the
1850*9880d681SAndroid Build Coastguard Worker * user.
1851*9880d681SAndroid Build Coastguard Worker *
1852*9880d681SAndroid Build Coastguard Worker * @param insn - A pointer to the instruction to be populated. Must be
1853*9880d681SAndroid Build Coastguard Worker * pre-allocated.
1854*9880d681SAndroid Build Coastguard Worker * @param reader - The function to be used to read the instruction's bytes.
1855*9880d681SAndroid Build Coastguard Worker * @param readerArg - A generic argument to be passed to the reader to store
1856*9880d681SAndroid Build Coastguard Worker * any internal state.
1857*9880d681SAndroid Build Coastguard Worker * @param logger - If non-NULL, the function to be used to write log messages
1858*9880d681SAndroid Build Coastguard Worker * and warnings.
1859*9880d681SAndroid Build Coastguard Worker * @param loggerArg - A generic argument to be passed to the logger to store
1860*9880d681SAndroid Build Coastguard Worker * any internal state.
1861*9880d681SAndroid Build Coastguard Worker * @param startLoc - The address (in the reader's address space) of the first
1862*9880d681SAndroid Build Coastguard Worker * byte in the instruction.
1863*9880d681SAndroid Build Coastguard Worker * @param mode - The mode (real mode, IA-32e, or IA-32e in 64-bit mode) to
1864*9880d681SAndroid Build Coastguard Worker * decode the instruction in.
1865*9880d681SAndroid Build Coastguard Worker * @return - 0 if the instruction's memory could be read; nonzero if
1866*9880d681SAndroid Build Coastguard Worker * not.
1867*9880d681SAndroid Build Coastguard Worker */
decodeInstruction(struct InternalInstruction * insn,byteReader_t reader,const void * readerArg,dlog_t logger,void * loggerArg,const void * miiArg,uint64_t startLoc,DisassemblerMode mode)1868*9880d681SAndroid Build Coastguard Worker int llvm::X86Disassembler::decodeInstruction(
1869*9880d681SAndroid Build Coastguard Worker struct InternalInstruction *insn, byteReader_t reader,
1870*9880d681SAndroid Build Coastguard Worker const void *readerArg, dlog_t logger, void *loggerArg, const void *miiArg,
1871*9880d681SAndroid Build Coastguard Worker uint64_t startLoc, DisassemblerMode mode) {
1872*9880d681SAndroid Build Coastguard Worker memset(insn, 0, sizeof(struct InternalInstruction));
1873*9880d681SAndroid Build Coastguard Worker
1874*9880d681SAndroid Build Coastguard Worker insn->reader = reader;
1875*9880d681SAndroid Build Coastguard Worker insn->readerArg = readerArg;
1876*9880d681SAndroid Build Coastguard Worker insn->dlog = logger;
1877*9880d681SAndroid Build Coastguard Worker insn->dlogArg = loggerArg;
1878*9880d681SAndroid Build Coastguard Worker insn->startLocation = startLoc;
1879*9880d681SAndroid Build Coastguard Worker insn->readerCursor = startLoc;
1880*9880d681SAndroid Build Coastguard Worker insn->mode = mode;
1881*9880d681SAndroid Build Coastguard Worker insn->numImmediatesConsumed = 0;
1882*9880d681SAndroid Build Coastguard Worker
1883*9880d681SAndroid Build Coastguard Worker if (readPrefixes(insn) ||
1884*9880d681SAndroid Build Coastguard Worker readOpcode(insn) ||
1885*9880d681SAndroid Build Coastguard Worker getID(insn, miiArg) ||
1886*9880d681SAndroid Build Coastguard Worker insn->instructionID == 0 ||
1887*9880d681SAndroid Build Coastguard Worker readOperands(insn))
1888*9880d681SAndroid Build Coastguard Worker return -1;
1889*9880d681SAndroid Build Coastguard Worker
1890*9880d681SAndroid Build Coastguard Worker insn->operands = x86OperandSets[insn->spec->operands];
1891*9880d681SAndroid Build Coastguard Worker
1892*9880d681SAndroid Build Coastguard Worker insn->length = insn->readerCursor - insn->startLocation;
1893*9880d681SAndroid Build Coastguard Worker
1894*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Read from 0x%llx to 0x%llx: length %zu",
1895*9880d681SAndroid Build Coastguard Worker startLoc, insn->readerCursor, insn->length);
1896*9880d681SAndroid Build Coastguard Worker
1897*9880d681SAndroid Build Coastguard Worker if (insn->length > 15)
1898*9880d681SAndroid Build Coastguard Worker dbgprintf(insn, "Instruction exceeds 15-byte limit");
1899*9880d681SAndroid Build Coastguard Worker
1900*9880d681SAndroid Build Coastguard Worker return 0;
1901*9880d681SAndroid Build Coastguard Worker }
1902