blob: c81a85755f8221d3ae220b2f9206ec5b2def3176 [file] [log] [blame]
Jia Liub22310f2012-02-18 12:03:15 +00001/*===-- X86DisassemblerDecoder.c - Disassembler decoder ------------*- C -*-===*
Sean Callanan04cc3072009-12-19 02:59:52 +00002 *
3 * The LLVM Compiler Infrastructure
4 *
5 * This file is distributed under the University of Illinois Open Source
6 * License. See LICENSE.TXT for details.
7 *
8 *===----------------------------------------------------------------------===*
9 *
10 * This file is part of the X86 Disassembler.
11 * It contains the implementation of the instruction decoder.
12 * Documentation for the disassembler can be found in X86Disassembler.h.
13 *
14 *===----------------------------------------------------------------------===*/
15
Sean Callanan04cc3072009-12-19 02:59:52 +000016#include <stdarg.h> /* for va_*() */
17#include <stdio.h> /* for vsnprintf() */
18#include <stdlib.h> /* for exit() */
Daniel Dunbarc745a622009-12-19 03:31:50 +000019#include <string.h> /* for memset() */
Sean Callanan04cc3072009-12-19 02:59:52 +000020
21#include "X86DisassemblerDecoder.h"
22
23#include "X86GenDisassemblerTables.inc"
24
25#define TRUE 1
26#define FALSE 0
27
Sean Callanan010b3732010-04-02 21:23:51 +000028#ifndef NDEBUG
29#define debug(s) do { x86DisassemblerDebug(__FILE__, __LINE__, s); } while (0)
30#else
31#define debug(s) do { } while (0)
32#endif
33
Sean Callanan04cc3072009-12-19 02:59:52 +000034
35/*
36 * contextForAttrs - Client for the instruction context table. Takes a set of
37 * attributes and returns the appropriate decode context.
38 *
39 * @param attrMask - Attributes, from the enumeration attributeBits.
40 * @return - The InstructionContext to use when looking up an
41 * an instruction with these attributes.
42 */
Sean Callanan588785c2009-12-22 22:51:40 +000043static InstructionContext contextForAttrs(uint8_t attrMask) {
Sean Callanan04cc3072009-12-19 02:59:52 +000044 return CONTEXTS_SYM[attrMask];
45}
46
47/*
48 * modRMRequired - Reads the appropriate instruction table to determine whether
49 * the ModR/M byte is required to decode a particular instruction.
50 *
51 * @param type - The opcode type (i.e., how many bytes it has).
52 * @param insnContext - The context for the instruction, as returned by
53 * contextForAttrs.
54 * @param opcode - The last byte of the instruction's opcode, not counting
55 * ModR/M extensions and escapes.
56 * @return - TRUE if the ModR/M byte is required, FALSE otherwise.
57 */
Sean Callanan588785c2009-12-22 22:51:40 +000058static int modRMRequired(OpcodeType type,
Craig Topper21c33652011-10-02 16:56:09 +000059 InstructionContext insnContext,
60 uint8_t opcode) {
Daniel Dunbar8b532de2009-12-22 01:41:37 +000061 const struct ContextDecision* decision = 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +000062
Sean Callanan04cc3072009-12-19 02:59:52 +000063 switch (type) {
64 case ONEBYTE:
65 decision = &ONEBYTE_SYM;
66 break;
67 case TWOBYTE:
68 decision = &TWOBYTE_SYM;
69 break;
70 case THREEBYTE_38:
71 decision = &THREEBYTE38_SYM;
72 break;
73 case THREEBYTE_3A:
74 decision = &THREEBYTE3A_SYM;
75 break;
Joerg Sonnenbergerfc4789d2011-04-04 16:58:13 +000076 case THREEBYTE_A6:
77 decision = &THREEBYTEA6_SYM;
78 break;
79 case THREEBYTE_A7:
80 decision = &THREEBYTEA7_SYM;
81 break;
Craig Topper9e3e38a2013-10-03 05:17:48 +000082 case XOP8_MAP:
83 decision = &XOP8_MAP_SYM;
84 break;
85 case XOP9_MAP:
86 decision = &XOP9_MAP_SYM;
87 break;
88 case XOPA_MAP:
89 decision = &XOPA_MAP_SYM;
90 break;
Sean Callanan04cc3072009-12-19 02:59:52 +000091 }
Ahmed Charles636a3d62012-02-19 11:37:01 +000092
Sean Callanan04cc3072009-12-19 02:59:52 +000093 return decision->opcodeDecisions[insnContext].modRMDecisions[opcode].
94 modrm_type != MODRM_ONEENTRY;
Sean Callanan04cc3072009-12-19 02:59:52 +000095}
96
97/*
98 * decode - Reads the appropriate instruction table to obtain the unique ID of
99 * an instruction.
100 *
101 * @param type - See modRMRequired().
102 * @param insnContext - See modRMRequired().
103 * @param opcode - See modRMRequired().
104 * @param modRM - The ModR/M byte if required, or any value if not.
Sean Callanan010b3732010-04-02 21:23:51 +0000105 * @return - The UID of the instruction, or 0 on failure.
Sean Callanan04cc3072009-12-19 02:59:52 +0000106 */
Sean Callanan588785c2009-12-22 22:51:40 +0000107static InstrUID decode(OpcodeType type,
Sean Callanan010b3732010-04-02 21:23:51 +0000108 InstructionContext insnContext,
109 uint8_t opcode,
110 uint8_t modRM) {
Duncan Sandsae22c602012-02-05 14:20:11 +0000111 const struct ModRMDecision* dec = 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000112
Sean Callanan04cc3072009-12-19 02:59:52 +0000113 switch (type) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000114 case ONEBYTE:
115 dec = &ONEBYTE_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
116 break;
117 case TWOBYTE:
118 dec = &TWOBYTE_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
119 break;
120 case THREEBYTE_38:
121 dec = &THREEBYTE38_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
122 break;
123 case THREEBYTE_3A:
124 dec = &THREEBYTE3A_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
125 break;
Joerg Sonnenbergerfc4789d2011-04-04 16:58:13 +0000126 case THREEBYTE_A6:
127 dec = &THREEBYTEA6_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
128 break;
129 case THREEBYTE_A7:
130 dec = &THREEBYTEA7_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
131 break;
Craig Topper9e3e38a2013-10-03 05:17:48 +0000132 case XOP8_MAP:
133 dec = &XOP8_MAP_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
134 break;
135 case XOP9_MAP:
136 dec = &XOP9_MAP_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
137 break;
138 case XOPA_MAP:
139 dec = &XOPA_MAP_SYM.opcodeDecisions[insnContext].modRMDecisions[opcode];
140 break;
Sean Callanan04cc3072009-12-19 02:59:52 +0000141 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000142
Sean Callanan04cc3072009-12-19 02:59:52 +0000143 switch (dec->modrm_type) {
144 default:
Sean Callanan010b3732010-04-02 21:23:51 +0000145 debug("Corrupt table! Unknown modrm_type");
146 return 0;
Sean Callanan04cc3072009-12-19 02:59:52 +0000147 case MODRM_ONEENTRY:
Craig Topper487e7442012-02-09 07:45:30 +0000148 return modRMTable[dec->instructionIDs];
Sean Callanan04cc3072009-12-19 02:59:52 +0000149 case MODRM_SPLITRM:
150 if (modFromModRM(modRM) == 0x3)
Craig Topper487e7442012-02-09 07:45:30 +0000151 return modRMTable[dec->instructionIDs+1];
152 return modRMTable[dec->instructionIDs];
Craig Toppera0cd9702012-02-09 08:58:07 +0000153 case MODRM_SPLITREG:
154 if (modFromModRM(modRM) == 0x3)
155 return modRMTable[dec->instructionIDs+((modRM & 0x38) >> 3)+8];
156 return modRMTable[dec->instructionIDs+((modRM & 0x38) >> 3)];
Craig Topper963305b2012-09-13 05:45:42 +0000157 case MODRM_SPLITMISC:
158 if (modFromModRM(modRM) == 0x3)
159 return modRMTable[dec->instructionIDs+(modRM & 0x3f)+8];
160 return modRMTable[dec->instructionIDs+((modRM & 0x38) >> 3)];
Sean Callanan04cc3072009-12-19 02:59:52 +0000161 case MODRM_FULL:
Craig Topper487e7442012-02-09 07:45:30 +0000162 return modRMTable[dec->instructionIDs+modRM];
Sean Callanan04cc3072009-12-19 02:59:52 +0000163 }
Sean Callanan04cc3072009-12-19 02:59:52 +0000164}
165
166/*
167 * specifierForUID - Given a UID, returns the name and operand specification for
168 * that instruction.
169 *
170 * @param uid - The unique ID for the instruction. This should be returned by
171 * decode(); specifierForUID will not check bounds.
172 * @return - A pointer to the specification for that instruction.
173 */
Benjamin Kramerde0a4fb2010-10-23 09:10:44 +0000174static const struct InstructionSpecifier *specifierForUID(InstrUID uid) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000175 return &INSTRUCTIONS_SYM[uid];
176}
177
178/*
179 * consumeByte - Uses the reader function provided by the user to consume one
180 * byte from the instruction's memory and advance the cursor.
181 *
182 * @param insn - The instruction with the reader function to use. The cursor
183 * for this instruction is advanced.
184 * @param byte - A pointer to a pre-allocated memory buffer to be populated
185 * with the data read.
186 * @return - 0 if the read was successful; nonzero otherwise.
187 */
Sean Callanan588785c2009-12-22 22:51:40 +0000188static int consumeByte(struct InternalInstruction* insn, uint8_t* byte) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000189 int ret = insn->reader(insn->readerArg, byte, insn->readerCursor);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000190
Sean Callanan04cc3072009-12-19 02:59:52 +0000191 if (!ret)
192 ++(insn->readerCursor);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000193
Sean Callanan04cc3072009-12-19 02:59:52 +0000194 return ret;
195}
196
197/*
198 * lookAtByte - Like consumeByte, but does not advance the cursor.
199 *
200 * @param insn - See consumeByte().
201 * @param byte - See consumeByte().
202 * @return - See consumeByte().
203 */
Sean Callanan588785c2009-12-22 22:51:40 +0000204static int lookAtByte(struct InternalInstruction* insn, uint8_t* byte) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000205 return insn->reader(insn->readerArg, byte, insn->readerCursor);
206}
207
Sean Callanan588785c2009-12-22 22:51:40 +0000208static void unconsumeByte(struct InternalInstruction* insn) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000209 insn->readerCursor--;
210}
211
Sean Callanan588785c2009-12-22 22:51:40 +0000212#define CONSUME_FUNC(name, type) \
213 static int name(struct InternalInstruction* insn, type* ptr) { \
214 type combined = 0; \
215 unsigned offset; \
216 for (offset = 0; offset < sizeof(type); ++offset) { \
217 uint8_t byte; \
218 int ret = insn->reader(insn->readerArg, \
219 &byte, \
220 insn->readerCursor + offset); \
221 if (ret) \
222 return ret; \
Richard Smith228e6d42012-08-24 23:29:28 +0000223 combined = combined | ((uint64_t)byte << (offset * 8)); \
Sean Callanan588785c2009-12-22 22:51:40 +0000224 } \
225 *ptr = combined; \
226 insn->readerCursor += sizeof(type); \
227 return 0; \
Sean Callanan04cc3072009-12-19 02:59:52 +0000228 }
229
230/*
231 * consume* - Use the reader function provided by the user to consume data
232 * values of various sizes from the instruction's memory and advance the
233 * cursor appropriately. These readers perform endian conversion.
234 *
235 * @param insn - See consumeByte().
236 * @param ptr - A pointer to a pre-allocated memory of appropriate size to
237 * be populated with the data read.
238 * @return - See consumeByte().
239 */
240CONSUME_FUNC(consumeInt8, int8_t)
241CONSUME_FUNC(consumeInt16, int16_t)
242CONSUME_FUNC(consumeInt32, int32_t)
243CONSUME_FUNC(consumeUInt16, uint16_t)
244CONSUME_FUNC(consumeUInt32, uint32_t)
245CONSUME_FUNC(consumeUInt64, uint64_t)
246
247/*
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000248 * dbgprintf - Uses the logging function provided by the user to log a single
Sean Callanan04cc3072009-12-19 02:59:52 +0000249 * message, typically without a carriage-return.
250 *
251 * @param insn - The instruction containing the logging function.
252 * @param format - See printf().
253 * @param ... - See printf().
254 */
Sean Callanan588785c2009-12-22 22:51:40 +0000255static void dbgprintf(struct InternalInstruction* insn,
256 const char* format,
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000257 ...) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000258 char buffer[256];
259 va_list ap;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000260
Sean Callanan04cc3072009-12-19 02:59:52 +0000261 if (!insn->dlog)
262 return;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000263
Sean Callanan04cc3072009-12-19 02:59:52 +0000264 va_start(ap, format);
265 (void)vsnprintf(buffer, sizeof(buffer), format, ap);
266 va_end(ap);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000267
Sean Callanan04cc3072009-12-19 02:59:52 +0000268 insn->dlog(insn->dlogArg, buffer);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000269
Sean Callanan04cc3072009-12-19 02:59:52 +0000270 return;
271}
272
273/*
274 * setPrefixPresent - Marks that a particular prefix is present at a particular
275 * location.
276 *
277 * @param insn - The instruction to be marked as having the prefix.
278 * @param prefix - The prefix that is present.
279 * @param location - The location where the prefix is located (in the address
280 * space of the instruction's reader).
281 */
Sean Callanan588785c2009-12-22 22:51:40 +0000282static void setPrefixPresent(struct InternalInstruction* insn,
Sean Callanan04cc3072009-12-19 02:59:52 +0000283 uint8_t prefix,
284 uint64_t location)
285{
286 insn->prefixPresent[prefix] = 1;
287 insn->prefixLocations[prefix] = location;
288}
289
290/*
291 * isPrefixAtLocation - Queries an instruction to determine whether a prefix is
292 * present at a given location.
293 *
294 * @param insn - The instruction to be queried.
295 * @param prefix - The prefix.
296 * @param location - The location to query.
297 * @return - Whether the prefix is at that location.
298 */
Sean Callanan588785c2009-12-22 22:51:40 +0000299static BOOL isPrefixAtLocation(struct InternalInstruction* insn,
300 uint8_t prefix,
301 uint64_t location)
Sean Callanan04cc3072009-12-19 02:59:52 +0000302{
303 if (insn->prefixPresent[prefix] == 1 &&
304 insn->prefixLocations[prefix] == location)
305 return TRUE;
306 else
307 return FALSE;
308}
309
310/*
311 * readPrefixes - Consumes all of an instruction's prefix bytes, and marks the
312 * instruction as having them. Also sets the instruction's default operand,
313 * address, and other relevant data sizes to report operands correctly.
314 *
315 * @param insn - The instruction whose prefixes are to be read.
316 * @return - 0 if the instruction could be read until the end of the prefix
317 * bytes, and no prefixes conflicted; nonzero otherwise.
318 */
319static int readPrefixes(struct InternalInstruction* insn) {
320 BOOL isPrefix = TRUE;
321 BOOL prefixGroups[4] = { FALSE };
322 uint64_t prefixLocation;
Ted Kremenek3c4408c2011-01-23 17:05:06 +0000323 uint8_t byte = 0;
Richard Mitton79917a92013-08-30 21:32:42 +0000324 uint8_t nextByte;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000325
Sean Callanan04cc3072009-12-19 02:59:52 +0000326 BOOL hasAdSize = FALSE;
327 BOOL hasOpSize = FALSE;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000328
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000329 dbgprintf(insn, "readPrefixes()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000330
Sean Callanan04cc3072009-12-19 02:59:52 +0000331 while (isPrefix) {
332 prefixLocation = insn->readerCursor;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000333
Richard Mitton576ee002013-08-30 21:19:48 +0000334 /* If we fail reading prefixes, just stop here and let the opcode reader deal with it */
Sean Callanan04cc3072009-12-19 02:59:52 +0000335 if (consumeByte(insn, &byte))
Richard Mitton576ee002013-08-30 21:19:48 +0000336 break;
Kevin Enderby014e1cd2012-03-09 17:52:49 +0000337
Benjamin Krameradfc73d2012-03-10 15:10:06 +0000338 /*
Dave Zarzycki07fabee2013-03-25 18:59:38 +0000339 * If the byte is a LOCK/REP/REPNE prefix and not a part of the opcode, then
340 * break and let it be disassembled as a normal "instruction".
Benjamin Krameradfc73d2012-03-10 15:10:06 +0000341 */
Richard Mitton576ee002013-08-30 21:19:48 +0000342 if (insn->readerCursor - 1 == insn->startLocation && byte == 0xf0)
343 break;
344
Dave Zarzycki07fabee2013-03-25 18:59:38 +0000345 if (insn->readerCursor - 1 == insn->startLocation
Richard Mitton576ee002013-08-30 21:19:48 +0000346 && (byte == 0xf2 || byte == 0xf3)
347 && !lookAtByte(insn, &nextByte))
348 {
Kevin Enderby35fd7922013-06-20 22:32:18 +0000349 /*
350 * If the byte is 0xf2 or 0xf3, and any of the following conditions are
351 * met:
352 * - it is followed by a LOCK (0xf0) prefix
353 * - it is followed by an xchg instruction
354 * then it should be disassembled as a xacquire/xrelease not repne/rep.
355 */
356 if ((byte == 0xf2 || byte == 0xf3) &&
357 ((nextByte == 0xf0) |
358 ((nextByte & 0xfe) == 0x86 || (nextByte & 0xf8) == 0x90)))
359 insn->xAcquireRelease = TRUE;
360 /*
361 * Also if the byte is 0xf3, and the following condition is met:
362 * - it is followed by a "mov mem, reg" (opcode 0x88/0x89) or
363 * "mov mem, imm" (opcode 0xc6/0xc7) instructions.
364 * then it should be disassembled as an xrelease not rep.
365 */
366 if (byte == 0xf3 &&
367 (nextByte == 0x88 || nextByte == 0x89 ||
368 nextByte == 0xc6 || nextByte == 0xc7))
369 insn->xAcquireRelease = TRUE;
Dave Zarzycki07fabee2013-03-25 18:59:38 +0000370 if (insn->mode == MODE_64BIT && (nextByte & 0xf0) == 0x40) {
371 if (consumeByte(insn, &nextByte))
372 return -1;
373 if (lookAtByte(insn, &nextByte))
374 return -1;
375 unconsumeByte(insn);
376 }
377 if (nextByte != 0x0f && nextByte != 0x90)
378 break;
379 }
380
Sean Callanan04cc3072009-12-19 02:59:52 +0000381 switch (byte) {
382 case 0xf0: /* LOCK */
383 case 0xf2: /* REPNE/REPNZ */
384 case 0xf3: /* REP or REPE/REPZ */
385 if (prefixGroups[0])
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000386 dbgprintf(insn, "Redundant Group 1 prefix");
Sean Callanan04cc3072009-12-19 02:59:52 +0000387 prefixGroups[0] = TRUE;
388 setPrefixPresent(insn, byte, prefixLocation);
389 break;
390 case 0x2e: /* CS segment override -OR- Branch not taken */
391 case 0x36: /* SS segment override -OR- Branch taken */
392 case 0x3e: /* DS segment override */
393 case 0x26: /* ES segment override */
394 case 0x64: /* FS segment override */
395 case 0x65: /* GS segment override */
396 switch (byte) {
397 case 0x2e:
398 insn->segmentOverride = SEG_OVERRIDE_CS;
399 break;
400 case 0x36:
401 insn->segmentOverride = SEG_OVERRIDE_SS;
402 break;
403 case 0x3e:
404 insn->segmentOverride = SEG_OVERRIDE_DS;
405 break;
406 case 0x26:
407 insn->segmentOverride = SEG_OVERRIDE_ES;
408 break;
409 case 0x64:
410 insn->segmentOverride = SEG_OVERRIDE_FS;
411 break;
412 case 0x65:
413 insn->segmentOverride = SEG_OVERRIDE_GS;
414 break;
415 default:
Sean Callanan010b3732010-04-02 21:23:51 +0000416 debug("Unhandled override");
417 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +0000418 }
419 if (prefixGroups[1])
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000420 dbgprintf(insn, "Redundant Group 2 prefix");
Sean Callanan04cc3072009-12-19 02:59:52 +0000421 prefixGroups[1] = TRUE;
422 setPrefixPresent(insn, byte, prefixLocation);
423 break;
424 case 0x66: /* Operand-size override */
425 if (prefixGroups[2])
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000426 dbgprintf(insn, "Redundant Group 3 prefix");
Sean Callanan04cc3072009-12-19 02:59:52 +0000427 prefixGroups[2] = TRUE;
428 hasOpSize = TRUE;
429 setPrefixPresent(insn, byte, prefixLocation);
430 break;
431 case 0x67: /* Address-size override */
432 if (prefixGroups[3])
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000433 dbgprintf(insn, "Redundant Group 4 prefix");
Sean Callanan04cc3072009-12-19 02:59:52 +0000434 prefixGroups[3] = TRUE;
435 hasAdSize = TRUE;
436 setPrefixPresent(insn, byte, prefixLocation);
437 break;
438 default: /* Not a prefix byte */
439 isPrefix = FALSE;
440 break;
441 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000442
Sean Callanan04cc3072009-12-19 02:59:52 +0000443 if (isPrefix)
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000444 dbgprintf(insn, "Found prefix 0x%hhx", byte);
Sean Callanan04cc3072009-12-19 02:59:52 +0000445 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000446
Craig Topper9e3e38a2013-10-03 05:17:48 +0000447 insn->vexXopType = TYPE_NO_VEX_XOP;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000448
Sean Callananc3fd5232011-03-15 01:23:15 +0000449 if (byte == 0xc4) {
450 uint8_t byte1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000451
Sean Callananc3fd5232011-03-15 01:23:15 +0000452 if (lookAtByte(insn, &byte1)) {
453 dbgprintf(insn, "Couldn't read second byte of VEX");
454 return -1;
455 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000456
Craig Topper45faba92011-09-26 05:12:43 +0000457 if (insn->mode == MODE_64BIT || (byte1 & 0xc0) == 0xc0) {
Craig Topper9e3e38a2013-10-03 05:17:48 +0000458 insn->vexXopType = TYPE_VEX_3B;
Sean Callananc3fd5232011-03-15 01:23:15 +0000459 insn->necessaryPrefixLocation = insn->readerCursor - 1;
460 }
461 else {
Sean Callanan04cc3072009-12-19 02:59:52 +0000462 unconsumeByte(insn);
463 insn->necessaryPrefixLocation = insn->readerCursor - 1;
464 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000465
Craig Topper9e3e38a2013-10-03 05:17:48 +0000466 if (insn->vexXopType == TYPE_VEX_3B) {
467 insn->vexXopPrefix[0] = byte;
468 consumeByte(insn, &insn->vexXopPrefix[1]);
469 consumeByte(insn, &insn->vexXopPrefix[2]);
Sean Callananc3fd5232011-03-15 01:23:15 +0000470
471 /* We simulate the REX prefix for simplicity's sake */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000472
Craig Topper31854ba2011-10-03 07:51:09 +0000473 if (insn->mode == MODE_64BIT) {
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000474 insn->rexPrefix = 0x40
Craig Topper9e3e38a2013-10-03 05:17:48 +0000475 | (wFromVEX3of3(insn->vexXopPrefix[2]) << 3)
476 | (rFromVEX2of3(insn->vexXopPrefix[1]) << 2)
477 | (xFromVEX2of3(insn->vexXopPrefix[1]) << 1)
478 | (bFromVEX2of3(insn->vexXopPrefix[1]) << 0);
Craig Topper31854ba2011-10-03 07:51:09 +0000479 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000480
Craig Topper9e3e38a2013-10-03 05:17:48 +0000481 switch (ppFromVEX3of3(insn->vexXopPrefix[2]))
Sean Callananc3fd5232011-03-15 01:23:15 +0000482 {
483 default:
484 break;
485 case VEX_PREFIX_66:
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000486 hasOpSize = TRUE;
Sean Callananc3fd5232011-03-15 01:23:15 +0000487 break;
488 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000489
Craig Topper9e3e38a2013-10-03 05:17:48 +0000490 dbgprintf(insn, "Found VEX prefix 0x%hhx 0x%hhx 0x%hhx",
491 insn->vexXopPrefix[0], insn->vexXopPrefix[1],
492 insn->vexXopPrefix[2]);
Sean Callananc3fd5232011-03-15 01:23:15 +0000493 }
Sean Callanan04cc3072009-12-19 02:59:52 +0000494 }
Sean Callananc3fd5232011-03-15 01:23:15 +0000495 else if (byte == 0xc5) {
496 uint8_t byte1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000497
Sean Callananc3fd5232011-03-15 01:23:15 +0000498 if (lookAtByte(insn, &byte1)) {
499 dbgprintf(insn, "Couldn't read second byte of VEX");
500 return -1;
501 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000502
Craig Topper45faba92011-09-26 05:12:43 +0000503 if (insn->mode == MODE_64BIT || (byte1 & 0xc0) == 0xc0) {
Craig Topper9e3e38a2013-10-03 05:17:48 +0000504 insn->vexXopType = TYPE_VEX_2B;
Sean Callananc3fd5232011-03-15 01:23:15 +0000505 }
506 else {
507 unconsumeByte(insn);
508 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000509
Craig Topper9e3e38a2013-10-03 05:17:48 +0000510 if (insn->vexXopType == TYPE_VEX_2B) {
511 insn->vexXopPrefix[0] = byte;
512 consumeByte(insn, &insn->vexXopPrefix[1]);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000513
Craig Topper31854ba2011-10-03 07:51:09 +0000514 if (insn->mode == MODE_64BIT) {
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000515 insn->rexPrefix = 0x40
Craig Topper9e3e38a2013-10-03 05:17:48 +0000516 | (rFromVEX2of2(insn->vexXopPrefix[1]) << 2);
Craig Topper31854ba2011-10-03 07:51:09 +0000517 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000518
Craig Topper9e3e38a2013-10-03 05:17:48 +0000519 switch (ppFromVEX2of2(insn->vexXopPrefix[1]))
Sean Callananc3fd5232011-03-15 01:23:15 +0000520 {
521 default:
522 break;
523 case VEX_PREFIX_66:
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000524 hasOpSize = TRUE;
Sean Callananc3fd5232011-03-15 01:23:15 +0000525 break;
526 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000527
Craig Topper9e3e38a2013-10-03 05:17:48 +0000528 dbgprintf(insn, "Found VEX prefix 0x%hhx 0x%hhx", insn->vexXopPrefix[0], insn->vexXopPrefix[1]);
529 }
530 }
531 else if (byte == 0x8f) {
532 uint8_t byte1;
533
534 if (lookAtByte(insn, &byte1)) {
535 dbgprintf(insn, "Couldn't read second byte of XOP");
536 return -1;
537 }
538
Craig Topper9eb88372013-10-03 06:29:59 +0000539 if ((byte1 & 0x38) != 0x0) { /* 0 in these 3 bits is a POP instruction. */
Craig Topper9e3e38a2013-10-03 05:17:48 +0000540 insn->vexXopType = TYPE_XOP;
541 insn->necessaryPrefixLocation = insn->readerCursor - 1;
542 }
543 else {
544 unconsumeByte(insn);
545 insn->necessaryPrefixLocation = insn->readerCursor - 1;
546 }
547
548 if (insn->vexXopType == TYPE_XOP) {
549 insn->vexXopPrefix[0] = byte;
550 consumeByte(insn, &insn->vexXopPrefix[1]);
551 consumeByte(insn, &insn->vexXopPrefix[2]);
552
553 /* We simulate the REX prefix for simplicity's sake */
554
555 if (insn->mode == MODE_64BIT) {
556 insn->rexPrefix = 0x40
557 | (wFromXOP3of3(insn->vexXopPrefix[2]) << 3)
558 | (rFromXOP2of3(insn->vexXopPrefix[1]) << 2)
559 | (xFromXOP2of3(insn->vexXopPrefix[1]) << 1)
560 | (bFromXOP2of3(insn->vexXopPrefix[1]) << 0);
561 }
562
563 switch (ppFromXOP3of3(insn->vexXopPrefix[2]))
564 {
565 default:
566 break;
567 case VEX_PREFIX_66:
568 hasOpSize = TRUE;
569 break;
570 }
571
572 dbgprintf(insn, "Found XOP prefix 0x%hhx 0x%hhx 0x%hhx",
573 insn->vexXopPrefix[0], insn->vexXopPrefix[1],
574 insn->vexXopPrefix[2]);
Sean Callananc3fd5232011-03-15 01:23:15 +0000575 }
576 }
577 else {
578 if (insn->mode == MODE_64BIT) {
579 if ((byte & 0xf0) == 0x40) {
580 uint8_t opcodeByte;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000581
Sean Callananc3fd5232011-03-15 01:23:15 +0000582 if (lookAtByte(insn, &opcodeByte) || ((opcodeByte & 0xf0) == 0x40)) {
583 dbgprintf(insn, "Redundant REX prefix");
584 return -1;
585 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000586
Sean Callananc3fd5232011-03-15 01:23:15 +0000587 insn->rexPrefix = byte;
588 insn->necessaryPrefixLocation = insn->readerCursor - 2;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000589
Sean Callananc3fd5232011-03-15 01:23:15 +0000590 dbgprintf(insn, "Found REX prefix 0x%hhx", byte);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000591 } else {
Sean Callananc3fd5232011-03-15 01:23:15 +0000592 unconsumeByte(insn);
593 insn->necessaryPrefixLocation = insn->readerCursor - 1;
594 }
595 } else {
596 unconsumeByte(insn);
597 insn->necessaryPrefixLocation = insn->readerCursor - 1;
598 }
599 }
600
Sean Callanan04cc3072009-12-19 02:59:52 +0000601 if (insn->mode == MODE_16BIT) {
602 insn->registerSize = (hasOpSize ? 4 : 2);
603 insn->addressSize = (hasAdSize ? 4 : 2);
604 insn->displacementSize = (hasAdSize ? 4 : 2);
605 insn->immediateSize = (hasOpSize ? 4 : 2);
606 } else if (insn->mode == MODE_32BIT) {
607 insn->registerSize = (hasOpSize ? 2 : 4);
608 insn->addressSize = (hasAdSize ? 2 : 4);
609 insn->displacementSize = (hasAdSize ? 2 : 4);
Sean Callanan9f6c6222010-10-22 01:24:11 +0000610 insn->immediateSize = (hasOpSize ? 2 : 4);
Sean Callanan04cc3072009-12-19 02:59:52 +0000611 } else if (insn->mode == MODE_64BIT) {
612 if (insn->rexPrefix && wFromREX(insn->rexPrefix)) {
613 insn->registerSize = 8;
614 insn->addressSize = (hasAdSize ? 4 : 8);
615 insn->displacementSize = 4;
616 insn->immediateSize = 4;
617 } else if (insn->rexPrefix) {
618 insn->registerSize = (hasOpSize ? 2 : 4);
619 insn->addressSize = (hasAdSize ? 4 : 8);
620 insn->displacementSize = (hasOpSize ? 2 : 4);
621 insn->immediateSize = (hasOpSize ? 2 : 4);
622 } else {
623 insn->registerSize = (hasOpSize ? 2 : 4);
624 insn->addressSize = (hasAdSize ? 4 : 8);
625 insn->displacementSize = (hasOpSize ? 2 : 4);
626 insn->immediateSize = (hasOpSize ? 2 : 4);
627 }
628 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000629
Sean Callanan04cc3072009-12-19 02:59:52 +0000630 return 0;
631}
632
633/*
634 * readOpcode - Reads the opcode (excepting the ModR/M byte in the case of
635 * extended or escape opcodes).
636 *
637 * @param insn - The instruction whose opcode is to be read.
638 * @return - 0 if the opcode could be read successfully; nonzero otherwise.
639 */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000640static int readOpcode(struct InternalInstruction* insn) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000641 /* Determine the length of the primary opcode */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000642
Sean Callanan04cc3072009-12-19 02:59:52 +0000643 uint8_t current;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000644
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000645 dbgprintf(insn, "readOpcode()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000646
Sean Callanan04cc3072009-12-19 02:59:52 +0000647 insn->opcodeType = ONEBYTE;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000648
Craig Topper9e3e38a2013-10-03 05:17:48 +0000649 if (insn->vexXopType == TYPE_VEX_3B)
Sean Callananc3fd5232011-03-15 01:23:15 +0000650 {
Craig Topper9e3e38a2013-10-03 05:17:48 +0000651 switch (mmmmmFromVEX2of3(insn->vexXopPrefix[1]))
Sean Callananc3fd5232011-03-15 01:23:15 +0000652 {
653 default:
Craig Topper9e3e38a2013-10-03 05:17:48 +0000654 dbgprintf(insn, "Unhandled m-mmmm field for instruction (0x%hhx)",
655 mmmmmFromVEX2of3(insn->vexXopPrefix[1]));
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000656 return -1;
Sean Callananc3fd5232011-03-15 01:23:15 +0000657 case VEX_LOB_0F:
Sean Callananc3fd5232011-03-15 01:23:15 +0000658 insn->opcodeType = TWOBYTE;
659 return consumeByte(insn, &insn->opcode);
660 case VEX_LOB_0F38:
Sean Callananc3fd5232011-03-15 01:23:15 +0000661 insn->opcodeType = THREEBYTE_38;
662 return consumeByte(insn, &insn->opcode);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000663 case VEX_LOB_0F3A:
Sean Callananc3fd5232011-03-15 01:23:15 +0000664 insn->opcodeType = THREEBYTE_3A;
665 return consumeByte(insn, &insn->opcode);
666 }
667 }
Craig Topper9e3e38a2013-10-03 05:17:48 +0000668 else if (insn->vexXopType == TYPE_VEX_2B)
Sean Callananc3fd5232011-03-15 01:23:15 +0000669 {
Sean Callananc3fd5232011-03-15 01:23:15 +0000670 insn->opcodeType = TWOBYTE;
671 return consumeByte(insn, &insn->opcode);
672 }
Craig Topper9e3e38a2013-10-03 05:17:48 +0000673 else if (insn->vexXopType == TYPE_XOP)
674 {
675 switch (mmmmmFromXOP2of3(insn->vexXopPrefix[1]))
676 {
677 default:
678 dbgprintf(insn, "Unhandled m-mmmm field for instruction (0x%hhx)",
679 mmmmmFromVEX2of3(insn->vexXopPrefix[1]));
680 return -1;
681 case XOP_MAP_SELECT_8:
682 insn->opcodeType = XOP8_MAP;
683 return consumeByte(insn, &insn->opcode);
684 case XOP_MAP_SELECT_9:
685 insn->opcodeType = XOP9_MAP;
686 return consumeByte(insn, &insn->opcode);
687 case XOP_MAP_SELECT_A:
688 insn->opcodeType = XOPA_MAP;
689 return consumeByte(insn, &insn->opcode);
690 }
691 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000692
Sean Callanan04cc3072009-12-19 02:59:52 +0000693 if (consumeByte(insn, &current))
694 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000695
Sean Callanan04cc3072009-12-19 02:59:52 +0000696 if (current == 0x0f) {
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000697 dbgprintf(insn, "Found a two-byte escape prefix (0x%hhx)", current);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000698
Sean Callanan04cc3072009-12-19 02:59:52 +0000699 if (consumeByte(insn, &current))
700 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000701
Sean Callanan04cc3072009-12-19 02:59:52 +0000702 if (current == 0x38) {
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000703 dbgprintf(insn, "Found a three-byte escape prefix (0x%hhx)", current);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000704
Sean Callanan04cc3072009-12-19 02:59:52 +0000705 if (consumeByte(insn, &current))
706 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000707
Sean Callanan04cc3072009-12-19 02:59:52 +0000708 insn->opcodeType = THREEBYTE_38;
709 } else if (current == 0x3a) {
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000710 dbgprintf(insn, "Found a three-byte escape prefix (0x%hhx)", current);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000711
Sean Callanan04cc3072009-12-19 02:59:52 +0000712 if (consumeByte(insn, &current))
713 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000714
Sean Callanan04cc3072009-12-19 02:59:52 +0000715 insn->opcodeType = THREEBYTE_3A;
Joerg Sonnenbergerfc4789d2011-04-04 16:58:13 +0000716 } else if (current == 0xa6) {
717 dbgprintf(insn, "Found a three-byte escape prefix (0x%hhx)", current);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000718
Joerg Sonnenbergerfc4789d2011-04-04 16:58:13 +0000719 if (consumeByte(insn, &current))
720 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000721
Joerg Sonnenbergerfc4789d2011-04-04 16:58:13 +0000722 insn->opcodeType = THREEBYTE_A6;
723 } else if (current == 0xa7) {
724 dbgprintf(insn, "Found a three-byte escape prefix (0x%hhx)", current);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000725
Joerg Sonnenbergerfc4789d2011-04-04 16:58:13 +0000726 if (consumeByte(insn, &current))
727 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000728
Joerg Sonnenbergerfc4789d2011-04-04 16:58:13 +0000729 insn->opcodeType = THREEBYTE_A7;
Sean Callanan04cc3072009-12-19 02:59:52 +0000730 } else {
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000731 dbgprintf(insn, "Didn't find a three-byte escape prefix");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000732
Sean Callanan04cc3072009-12-19 02:59:52 +0000733 insn->opcodeType = TWOBYTE;
734 }
735 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000736
Sean Callanan04cc3072009-12-19 02:59:52 +0000737 /*
738 * At this point we have consumed the full opcode.
739 * Anything we consume from here on must be unconsumed.
740 */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000741
Sean Callanan04cc3072009-12-19 02:59:52 +0000742 insn->opcode = current;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000743
Sean Callanan04cc3072009-12-19 02:59:52 +0000744 return 0;
745}
746
747static int readModRM(struct InternalInstruction* insn);
748
749/*
750 * getIDWithAttrMask - Determines the ID of an instruction, consuming
751 * the ModR/M byte as appropriate for extended and escape opcodes,
752 * and using a supplied attribute mask.
753 *
754 * @param instructionID - A pointer whose target is filled in with the ID of the
755 * instruction.
756 * @param insn - The instruction whose ID is to be determined.
757 * @param attrMask - The attribute mask to search.
758 * @return - 0 if the ModR/M could be read when needed or was not
759 * needed; nonzero otherwise.
760 */
761static int getIDWithAttrMask(uint16_t* instructionID,
762 struct InternalInstruction* insn,
763 uint8_t attrMask) {
764 BOOL hasModRMExtension;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000765
Sean Callanan04cc3072009-12-19 02:59:52 +0000766 uint8_t instructionClass;
767
768 instructionClass = contextForAttrs(attrMask);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000769
Sean Callanan04cc3072009-12-19 02:59:52 +0000770 hasModRMExtension = modRMRequired(insn->opcodeType,
771 instructionClass,
772 insn->opcode);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000773
Sean Callanan04cc3072009-12-19 02:59:52 +0000774 if (hasModRMExtension) {
Rafael Espindola9f9a1062011-01-06 16:48:42 +0000775 if (readModRM(insn))
776 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000777
Sean Callanan04cc3072009-12-19 02:59:52 +0000778 *instructionID = decode(insn->opcodeType,
779 instructionClass,
780 insn->opcode,
781 insn->modRM);
782 } else {
783 *instructionID = decode(insn->opcodeType,
784 instructionClass,
785 insn->opcode,
786 0);
787 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000788
Sean Callanan04cc3072009-12-19 02:59:52 +0000789 return 0;
790}
791
792/*
793 * is16BitEquivalent - Determines whether two instruction names refer to
794 * equivalent instructions but one is 16-bit whereas the other is not.
795 *
796 * @param orig - The instruction that is not 16-bit
797 * @param equiv - The instruction that is 16-bit
798 */
Joerg Sonnenberger2b86e482012-10-29 17:56:15 +0000799static BOOL is16BitEquivalent(const char* orig, const char* equiv) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000800 off_t i;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000801
Sean Callanan010b3732010-04-02 21:23:51 +0000802 for (i = 0;; i++) {
803 if (orig[i] == '\0' && equiv[i] == '\0')
Sean Callanan04cc3072009-12-19 02:59:52 +0000804 return TRUE;
Sean Callanan010b3732010-04-02 21:23:51 +0000805 if (orig[i] == '\0' || equiv[i] == '\0')
Sean Callanan04cc3072009-12-19 02:59:52 +0000806 return FALSE;
Sean Callanan010b3732010-04-02 21:23:51 +0000807 if (orig[i] != equiv[i]) {
808 if ((orig[i] == 'Q' || orig[i] == 'L') && equiv[i] == 'W')
Sean Callanan04cc3072009-12-19 02:59:52 +0000809 continue;
Sean Callanan010b3732010-04-02 21:23:51 +0000810 if ((orig[i] == '6' || orig[i] == '3') && equiv[i] == '1')
Sean Callanan04cc3072009-12-19 02:59:52 +0000811 continue;
Sean Callanan010b3732010-04-02 21:23:51 +0000812 if ((orig[i] == '4' || orig[i] == '2') && equiv[i] == '6')
Sean Callanan04cc3072009-12-19 02:59:52 +0000813 continue;
814 return FALSE;
815 }
816 }
817}
818
819/*
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000820 * getID - Determines the ID of an instruction, consuming the ModR/M byte as
821 * appropriate for extended and escape opcodes. Determines the attributes and
Sean Callanan04cc3072009-12-19 02:59:52 +0000822 * context for the instruction before doing so.
823 *
824 * @param insn - The instruction whose ID is to be determined.
825 * @return - 0 if the ModR/M could be read when needed or was not needed;
826 * nonzero otherwise.
827 */
Roman Divacky67923802012-09-05 21:17:34 +0000828static int getID(struct InternalInstruction* insn, const void *miiArg) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000829 uint8_t attrMask;
830 uint16_t instructionID;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000831
Nuno Lopes3ed6d602009-12-19 12:07:00 +0000832 dbgprintf(insn, "getID()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000833
Sean Callanan04cc3072009-12-19 02:59:52 +0000834 attrMask = ATTR_NONE;
Sean Callananc3fd5232011-03-15 01:23:15 +0000835
Sean Callanan04cc3072009-12-19 02:59:52 +0000836 if (insn->mode == MODE_64BIT)
837 attrMask |= ATTR_64BIT;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000838
Craig Topper9e3e38a2013-10-03 05:17:48 +0000839 if (insn->vexXopType != TYPE_NO_VEX_XOP) {
Sean Callananc3fd5232011-03-15 01:23:15 +0000840 attrMask |= ATTR_VEX;
841
Craig Topper9e3e38a2013-10-03 05:17:48 +0000842 if (insn->vexXopType == TYPE_VEX_3B) {
843 switch (ppFromVEX3of3(insn->vexXopPrefix[2])) {
Sean Callananc3fd5232011-03-15 01:23:15 +0000844 case VEX_PREFIX_66:
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000845 attrMask |= ATTR_OPSIZE;
Sean Callananc3fd5232011-03-15 01:23:15 +0000846 break;
847 case VEX_PREFIX_F3:
848 attrMask |= ATTR_XS;
849 break;
850 case VEX_PREFIX_F2:
851 attrMask |= ATTR_XD;
852 break;
853 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000854
Craig Topper9e3e38a2013-10-03 05:17:48 +0000855 if (lFromVEX3of3(insn->vexXopPrefix[2]))
Sean Callananc3fd5232011-03-15 01:23:15 +0000856 attrMask |= ATTR_VEXL;
857 }
Craig Topper9e3e38a2013-10-03 05:17:48 +0000858 else if (insn->vexXopType == TYPE_VEX_2B) {
859 switch (ppFromVEX2of2(insn->vexXopPrefix[1])) {
Sean Callananc3fd5232011-03-15 01:23:15 +0000860 case VEX_PREFIX_66:
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000861 attrMask |= ATTR_OPSIZE;
Sean Callananc3fd5232011-03-15 01:23:15 +0000862 break;
863 case VEX_PREFIX_F3:
864 attrMask |= ATTR_XS;
865 break;
866 case VEX_PREFIX_F2:
867 attrMask |= ATTR_XD;
868 break;
869 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000870
Craig Topper9e3e38a2013-10-03 05:17:48 +0000871 if (lFromVEX2of2(insn->vexXopPrefix[1]))
872 attrMask |= ATTR_VEXL;
873 }
874 else if (insn->vexXopType == TYPE_XOP) {
875 switch (ppFromXOP3of3(insn->vexXopPrefix[2])) {
876 case VEX_PREFIX_66:
877 attrMask |= ATTR_OPSIZE;
878 break;
879 case VEX_PREFIX_F3:
880 attrMask |= ATTR_XS;
881 break;
882 case VEX_PREFIX_F2:
883 attrMask |= ATTR_XD;
884 break;
885 }
886
887 if (lFromXOP3of3(insn->vexXopPrefix[2]))
Sean Callananc3fd5232011-03-15 01:23:15 +0000888 attrMask |= ATTR_VEXL;
889 }
890 else {
891 return -1;
892 }
893 }
894 else {
Sean Callananc3fd5232011-03-15 01:23:15 +0000895 if (isPrefixAtLocation(insn, 0x66, insn->necessaryPrefixLocation))
896 attrMask |= ATTR_OPSIZE;
Craig Topper6491c802012-02-27 01:54:29 +0000897 else if (isPrefixAtLocation(insn, 0x67, insn->necessaryPrefixLocation))
898 attrMask |= ATTR_ADSIZE;
Sean Callananc3fd5232011-03-15 01:23:15 +0000899 else if (isPrefixAtLocation(insn, 0xf3, insn->necessaryPrefixLocation))
900 attrMask |= ATTR_XS;
901 else if (isPrefixAtLocation(insn, 0xf2, insn->necessaryPrefixLocation))
902 attrMask |= ATTR_XD;
Sean Callananc3fd5232011-03-15 01:23:15 +0000903 }
904
Craig Topperf18c8962011-10-04 06:30:42 +0000905 if (insn->rexPrefix & 0x08)
906 attrMask |= ATTR_REXW;
Craig Topperf01f1b52011-11-06 23:04:08 +0000907
Sean Callanan010b3732010-04-02 21:23:51 +0000908 if (getIDWithAttrMask(&instructionID, insn, attrMask))
Sean Callanan04cc3072009-12-19 02:59:52 +0000909 return -1;
Craig Topperf01f1b52011-11-06 23:04:08 +0000910
Sean Callanan04cc3072009-12-19 02:59:52 +0000911 /* The following clauses compensate for limitations of the tables. */
Craig Topperf01f1b52011-11-06 23:04:08 +0000912
Sean Callanan04cc3072009-12-19 02:59:52 +0000913 if (insn->prefixPresent[0x66] && !(attrMask & ATTR_OPSIZE)) {
914 /*
915 * The instruction tables make no distinction between instructions that
916 * allow OpSize anywhere (i.e., 16-bit operations) and that need it in a
917 * particular spot (i.e., many MMX operations). In general we're
918 * conservative, but in the specific case where OpSize is present but not
919 * in the right place we check if there's a 16-bit operation.
920 */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000921
Benjamin Kramerde0a4fb2010-10-23 09:10:44 +0000922 const struct InstructionSpecifier *spec;
Sean Callanan04cc3072009-12-19 02:59:52 +0000923 uint16_t instructionIDWithOpsize;
Benjamin Kramer915e3d92012-02-11 16:01:02 +0000924 const char *specName, *specWithOpSizeName;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000925
Sean Callanan04cc3072009-12-19 02:59:52 +0000926 spec = specifierForUID(instructionID);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000927
Sean Callanan04cc3072009-12-19 02:59:52 +0000928 if (getIDWithAttrMask(&instructionIDWithOpsize,
929 insn,
930 attrMask | ATTR_OPSIZE)) {
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000931 /*
Sean Callanan04cc3072009-12-19 02:59:52 +0000932 * ModRM required with OpSize but not present; give up and return version
933 * without OpSize set
934 */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000935
Sean Callanan04cc3072009-12-19 02:59:52 +0000936 insn->instructionID = instructionID;
937 insn->spec = spec;
938 return 0;
939 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000940
Benjamin Kramer915e3d92012-02-11 16:01:02 +0000941 specName = x86DisassemblerGetInstrName(instructionID, miiArg);
942 specWithOpSizeName =
Benjamin Kramer478e8de2012-02-11 14:50:54 +0000943 x86DisassemblerGetInstrName(instructionIDWithOpsize, miiArg);
944
Joerg Sonnenberger2b86e482012-10-29 17:56:15 +0000945 if (is16BitEquivalent(specName, specWithOpSizeName)) {
Sean Callanan04cc3072009-12-19 02:59:52 +0000946 insn->instructionID = instructionIDWithOpsize;
Benjamin Kramer915e3d92012-02-11 16:01:02 +0000947 insn->spec = specifierForUID(instructionIDWithOpsize);
Sean Callanan04cc3072009-12-19 02:59:52 +0000948 } else {
949 insn->instructionID = instructionID;
950 insn->spec = spec;
951 }
952 return 0;
953 }
Craig Topper21c33652011-10-02 16:56:09 +0000954
955 if (insn->opcodeType == ONEBYTE && insn->opcode == 0x90 &&
956 insn->rexPrefix & 0x01) {
957 /*
958 * NOOP shouldn't decode as NOOP if REX.b is set. Instead
959 * it should decode as XCHG %r8, %eax.
960 */
961
962 const struct InstructionSpecifier *spec;
963 uint16_t instructionIDWithNewOpcode;
964 const struct InstructionSpecifier *specWithNewOpcode;
965
966 spec = specifierForUID(instructionID);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000967
Craig Topperb58a9662011-10-05 03:29:32 +0000968 /* Borrow opcode from one of the other XCHGar opcodes */
Craig Topper21c33652011-10-02 16:56:09 +0000969 insn->opcode = 0x91;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000970
Craig Topper21c33652011-10-02 16:56:09 +0000971 if (getIDWithAttrMask(&instructionIDWithNewOpcode,
972 insn,
973 attrMask)) {
974 insn->opcode = 0x90;
975
976 insn->instructionID = instructionID;
977 insn->spec = spec;
978 return 0;
979 }
980
981 specWithNewOpcode = specifierForUID(instructionIDWithNewOpcode);
982
Craig Topperb58a9662011-10-05 03:29:32 +0000983 /* Change back */
Craig Topper21c33652011-10-02 16:56:09 +0000984 insn->opcode = 0x90;
985
986 insn->instructionID = instructionIDWithNewOpcode;
987 insn->spec = specWithNewOpcode;
988
989 return 0;
990 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000991
Sean Callanan04cc3072009-12-19 02:59:52 +0000992 insn->instructionID = instructionID;
993 insn->spec = specifierForUID(insn->instructionID);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +0000994
Sean Callanan04cc3072009-12-19 02:59:52 +0000995 return 0;
996}
997
998/*
999 * readSIB - Consumes the SIB byte to determine addressing information for an
1000 * instruction.
1001 *
1002 * @param insn - The instruction whose SIB byte is to be read.
1003 * @return - 0 if the SIB byte was successfully read; nonzero otherwise.
1004 */
1005static int readSIB(struct InternalInstruction* insn) {
Daniel Dunbar8b532de2009-12-22 01:41:37 +00001006 SIBIndex sibIndexBase = 0;
1007 SIBBase sibBaseBase = 0;
Sean Callanan04cc3072009-12-19 02:59:52 +00001008 uint8_t index, base;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001009
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001010 dbgprintf(insn, "readSIB()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001011
Sean Callanan04cc3072009-12-19 02:59:52 +00001012 if (insn->consumedSIB)
1013 return 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001014
Sean Callanan04cc3072009-12-19 02:59:52 +00001015 insn->consumedSIB = TRUE;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001016
Sean Callanan04cc3072009-12-19 02:59:52 +00001017 switch (insn->addressSize) {
1018 case 2:
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001019 dbgprintf(insn, "SIB-based addressing doesn't work in 16-bit mode");
Sean Callanan04cc3072009-12-19 02:59:52 +00001020 return -1;
1021 break;
1022 case 4:
1023 sibIndexBase = SIB_INDEX_EAX;
1024 sibBaseBase = SIB_BASE_EAX;
1025 break;
1026 case 8:
1027 sibIndexBase = SIB_INDEX_RAX;
1028 sibBaseBase = SIB_BASE_RAX;
1029 break;
1030 }
1031
1032 if (consumeByte(insn, &insn->sib))
1033 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001034
Sean Callanan04cc3072009-12-19 02:59:52 +00001035 index = indexFromSIB(insn->sib) | (xFromREX(insn->rexPrefix) << 3);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001036
Sean Callanan04cc3072009-12-19 02:59:52 +00001037 switch (index) {
1038 case 0x4:
1039 insn->sibIndex = SIB_INDEX_NONE;
1040 break;
1041 default:
Benjamin Kramer25bddae2011-02-27 18:13:53 +00001042 insn->sibIndex = (SIBIndex)(sibIndexBase + index);
Sean Callanan04cc3072009-12-19 02:59:52 +00001043 if (insn->sibIndex == SIB_INDEX_sib ||
1044 insn->sibIndex == SIB_INDEX_sib64)
1045 insn->sibIndex = SIB_INDEX_NONE;
1046 break;
1047 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001048
Sean Callanan04cc3072009-12-19 02:59:52 +00001049 switch (scaleFromSIB(insn->sib)) {
1050 case 0:
1051 insn->sibScale = 1;
1052 break;
1053 case 1:
1054 insn->sibScale = 2;
1055 break;
1056 case 2:
1057 insn->sibScale = 4;
1058 break;
1059 case 3:
1060 insn->sibScale = 8;
1061 break;
1062 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001063
Sean Callanan04cc3072009-12-19 02:59:52 +00001064 base = baseFromSIB(insn->sib) | (bFromREX(insn->rexPrefix) << 3);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001065
Sean Callanan04cc3072009-12-19 02:59:52 +00001066 switch (base) {
1067 case 0x5:
1068 switch (modFromModRM(insn->modRM)) {
1069 case 0x0:
1070 insn->eaDisplacement = EA_DISP_32;
1071 insn->sibBase = SIB_BASE_NONE;
1072 break;
1073 case 0x1:
1074 insn->eaDisplacement = EA_DISP_8;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001075 insn->sibBase = (insn->addressSize == 4 ?
Sean Callanan04cc3072009-12-19 02:59:52 +00001076 SIB_BASE_EBP : SIB_BASE_RBP);
1077 break;
1078 case 0x2:
1079 insn->eaDisplacement = EA_DISP_32;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001080 insn->sibBase = (insn->addressSize == 4 ?
Sean Callanan04cc3072009-12-19 02:59:52 +00001081 SIB_BASE_EBP : SIB_BASE_RBP);
1082 break;
1083 case 0x3:
Sean Callanan010b3732010-04-02 21:23:51 +00001084 debug("Cannot have Mod = 0b11 and a SIB byte");
1085 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001086 }
1087 break;
1088 default:
Benjamin Kramer25bddae2011-02-27 18:13:53 +00001089 insn->sibBase = (SIBBase)(sibBaseBase + base);
Sean Callanan04cc3072009-12-19 02:59:52 +00001090 break;
1091 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001092
Sean Callanan04cc3072009-12-19 02:59:52 +00001093 return 0;
1094}
1095
1096/*
1097 * readDisplacement - Consumes the displacement of an instruction.
1098 *
1099 * @param insn - The instruction whose displacement is to be read.
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001100 * @return - 0 if the displacement byte was successfully read; nonzero
Sean Callanan04cc3072009-12-19 02:59:52 +00001101 * otherwise.
1102 */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001103static int readDisplacement(struct InternalInstruction* insn) {
Sean Callanan04cc3072009-12-19 02:59:52 +00001104 int8_t d8;
1105 int16_t d16;
1106 int32_t d32;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001107
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001108 dbgprintf(insn, "readDisplacement()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001109
Sean Callanan04cc3072009-12-19 02:59:52 +00001110 if (insn->consumedDisplacement)
1111 return 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001112
Sean Callanan04cc3072009-12-19 02:59:52 +00001113 insn->consumedDisplacement = TRUE;
Kevin Enderby6fbcd8d2012-02-23 18:18:17 +00001114 insn->displacementOffset = insn->readerCursor - insn->startLocation;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001115
Sean Callanan04cc3072009-12-19 02:59:52 +00001116 switch (insn->eaDisplacement) {
1117 case EA_DISP_NONE:
1118 insn->consumedDisplacement = FALSE;
1119 break;
1120 case EA_DISP_8:
1121 if (consumeInt8(insn, &d8))
1122 return -1;
1123 insn->displacement = d8;
1124 break;
1125 case EA_DISP_16:
1126 if (consumeInt16(insn, &d16))
1127 return -1;
1128 insn->displacement = d16;
1129 break;
1130 case EA_DISP_32:
1131 if (consumeInt32(insn, &d32))
1132 return -1;
1133 insn->displacement = d32;
1134 break;
1135 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001136
Sean Callanan04cc3072009-12-19 02:59:52 +00001137 insn->consumedDisplacement = TRUE;
1138 return 0;
1139}
1140
1141/*
1142 * readModRM - Consumes all addressing information (ModR/M byte, SIB byte, and
1143 * displacement) for an instruction and interprets it.
1144 *
1145 * @param insn - The instruction whose addressing information is to be read.
1146 * @return - 0 if the information was successfully read; nonzero otherwise.
1147 */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001148static int readModRM(struct InternalInstruction* insn) {
Sean Callanan04cc3072009-12-19 02:59:52 +00001149 uint8_t mod, rm, reg;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001150
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001151 dbgprintf(insn, "readModRM()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001152
Sean Callanan04cc3072009-12-19 02:59:52 +00001153 if (insn->consumedModRM)
1154 return 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001155
Rafael Espindola9f9a1062011-01-06 16:48:42 +00001156 if (consumeByte(insn, &insn->modRM))
1157 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001158 insn->consumedModRM = TRUE;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001159
Sean Callanan04cc3072009-12-19 02:59:52 +00001160 mod = modFromModRM(insn->modRM);
1161 rm = rmFromModRM(insn->modRM);
1162 reg = regFromModRM(insn->modRM);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001163
Sean Callanan04cc3072009-12-19 02:59:52 +00001164 /*
1165 * This goes by insn->registerSize to pick the correct register, which messes
1166 * up if we're using (say) XMM or 8-bit register operands. That gets fixed in
1167 * fixupReg().
1168 */
1169 switch (insn->registerSize) {
1170 case 2:
Sean Callanan2f9443f2009-12-22 02:07:42 +00001171 insn->regBase = MODRM_REG_AX;
Sean Callanan04cc3072009-12-19 02:59:52 +00001172 insn->eaRegBase = EA_REG_AX;
1173 break;
1174 case 4:
Sean Callanan2f9443f2009-12-22 02:07:42 +00001175 insn->regBase = MODRM_REG_EAX;
Sean Callanan04cc3072009-12-19 02:59:52 +00001176 insn->eaRegBase = EA_REG_EAX;
1177 break;
1178 case 8:
Sean Callanan2f9443f2009-12-22 02:07:42 +00001179 insn->regBase = MODRM_REG_RAX;
Sean Callanan04cc3072009-12-19 02:59:52 +00001180 insn->eaRegBase = EA_REG_RAX;
1181 break;
1182 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001183
Sean Callanan04cc3072009-12-19 02:59:52 +00001184 reg |= rFromREX(insn->rexPrefix) << 3;
1185 rm |= bFromREX(insn->rexPrefix) << 3;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001186
Sean Callanan04cc3072009-12-19 02:59:52 +00001187 insn->reg = (Reg)(insn->regBase + reg);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001188
Sean Callanan04cc3072009-12-19 02:59:52 +00001189 switch (insn->addressSize) {
1190 case 2:
1191 insn->eaBaseBase = EA_BASE_BX_SI;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001192
Sean Callanan04cc3072009-12-19 02:59:52 +00001193 switch (mod) {
1194 case 0x0:
1195 if (rm == 0x6) {
1196 insn->eaBase = EA_BASE_NONE;
1197 insn->eaDisplacement = EA_DISP_16;
Sean Callanan010b3732010-04-02 21:23:51 +00001198 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001199 return -1;
1200 } else {
1201 insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1202 insn->eaDisplacement = EA_DISP_NONE;
1203 }
1204 break;
1205 case 0x1:
1206 insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1207 insn->eaDisplacement = EA_DISP_8;
Sean Callanan010b3732010-04-02 21:23:51 +00001208 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001209 return -1;
1210 break;
1211 case 0x2:
1212 insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1213 insn->eaDisplacement = EA_DISP_16;
Sean Callanan010b3732010-04-02 21:23:51 +00001214 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001215 return -1;
1216 break;
1217 case 0x3:
1218 insn->eaBase = (EABase)(insn->eaRegBase + rm);
Sean Callanan010b3732010-04-02 21:23:51 +00001219 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001220 return -1;
1221 break;
1222 }
1223 break;
1224 case 4:
1225 case 8:
1226 insn->eaBaseBase = (insn->addressSize == 4 ? EA_BASE_EAX : EA_BASE_RAX);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001227
Sean Callanan04cc3072009-12-19 02:59:52 +00001228 switch (mod) {
1229 case 0x0:
1230 insn->eaDisplacement = EA_DISP_NONE; /* readSIB may override this */
1231 switch (rm) {
1232 case 0x4:
1233 case 0xc: /* in case REXW.b is set */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001234 insn->eaBase = (insn->addressSize == 4 ?
Sean Callanan04cc3072009-12-19 02:59:52 +00001235 EA_BASE_sib : EA_BASE_sib64);
1236 readSIB(insn);
Sean Callanan010b3732010-04-02 21:23:51 +00001237 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001238 return -1;
1239 break;
1240 case 0x5:
1241 insn->eaBase = EA_BASE_NONE;
1242 insn->eaDisplacement = EA_DISP_32;
Sean Callanan010b3732010-04-02 21:23:51 +00001243 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001244 return -1;
1245 break;
1246 default:
1247 insn->eaBase = (EABase)(insn->eaBaseBase + rm);
1248 break;
1249 }
1250 break;
1251 case 0x1:
1252 case 0x2:
1253 insn->eaDisplacement = (mod == 0x1 ? EA_DISP_8 : EA_DISP_32);
1254 switch (rm) {
1255 case 0x4:
1256 case 0xc: /* in case REXW.b is set */
1257 insn->eaBase = EA_BASE_sib;
1258 readSIB(insn);
Sean Callanan010b3732010-04-02 21:23:51 +00001259 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001260 return -1;
1261 break;
1262 default:
1263 insn->eaBase = (EABase)(insn->eaBaseBase + rm);
Sean Callanan010b3732010-04-02 21:23:51 +00001264 if (readDisplacement(insn))
Sean Callanan04cc3072009-12-19 02:59:52 +00001265 return -1;
1266 break;
1267 }
1268 break;
1269 case 0x3:
1270 insn->eaDisplacement = EA_DISP_NONE;
1271 insn->eaBase = (EABase)(insn->eaRegBase + rm);
1272 break;
1273 }
1274 break;
1275 } /* switch (insn->addressSize) */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001276
Sean Callanan04cc3072009-12-19 02:59:52 +00001277 return 0;
1278}
1279
1280#define GENERIC_FIXUP_FUNC(name, base, prefix) \
1281 static uint8_t name(struct InternalInstruction *insn, \
1282 OperandType type, \
1283 uint8_t index, \
1284 uint8_t *valid) { \
1285 *valid = 1; \
1286 switch (type) { \
1287 default: \
Sean Callanan010b3732010-04-02 21:23:51 +00001288 debug("Unhandled register type"); \
1289 *valid = 0; \
1290 return 0; \
Sean Callanan04cc3072009-12-19 02:59:52 +00001291 case TYPE_Rv: \
1292 return base + index; \
1293 case TYPE_R8: \
Sean Callanan010b3732010-04-02 21:23:51 +00001294 if (insn->rexPrefix && \
Sean Callanan04cc3072009-12-19 02:59:52 +00001295 index >= 4 && index <= 7) { \
1296 return prefix##_SPL + (index - 4); \
1297 } else { \
1298 return prefix##_AL + index; \
1299 } \
1300 case TYPE_R16: \
1301 return prefix##_AX + index; \
1302 case TYPE_R32: \
1303 return prefix##_EAX + index; \
1304 case TYPE_R64: \
1305 return prefix##_RAX + index; \
Elena Demikhovsky003e7d72013-07-28 08:28:38 +00001306 case TYPE_XMM512: \
1307 return prefix##_ZMM0 + index; \
Sean Callananc3fd5232011-03-15 01:23:15 +00001308 case TYPE_XMM256: \
1309 return prefix##_YMM0 + index; \
Sean Callanan04cc3072009-12-19 02:59:52 +00001310 case TYPE_XMM128: \
1311 case TYPE_XMM64: \
1312 case TYPE_XMM32: \
1313 case TYPE_XMM: \
1314 return prefix##_XMM0 + index; \
1315 case TYPE_MM64: \
1316 case TYPE_MM32: \
1317 case TYPE_MM: \
Sean Callanan010b3732010-04-02 21:23:51 +00001318 if (index > 7) \
Sean Callanan04cc3072009-12-19 02:59:52 +00001319 *valid = 0; \
1320 return prefix##_MM0 + index; \
1321 case TYPE_SEGMENTREG: \
Sean Callanan010b3732010-04-02 21:23:51 +00001322 if (index > 5) \
Sean Callanan04cc3072009-12-19 02:59:52 +00001323 *valid = 0; \
1324 return prefix##_ES + index; \
1325 case TYPE_DEBUGREG: \
Sean Callanan010b3732010-04-02 21:23:51 +00001326 if (index > 7) \
Sean Callanan04cc3072009-12-19 02:59:52 +00001327 *valid = 0; \
1328 return prefix##_DR0 + index; \
Sean Callanane7e1cf92010-05-06 20:59:00 +00001329 case TYPE_CONTROLREG: \
Sean Callanan010b3732010-04-02 21:23:51 +00001330 if (index > 8) \
Sean Callanan04cc3072009-12-19 02:59:52 +00001331 *valid = 0; \
Sean Callanane7e1cf92010-05-06 20:59:00 +00001332 return prefix##_CR0 + index; \
Sean Callanan04cc3072009-12-19 02:59:52 +00001333 } \
1334 }
1335
1336/*
1337 * fixup*Value - Consults an operand type to determine the meaning of the
1338 * reg or R/M field. If the operand is an XMM operand, for example, an
1339 * operand would be XMM0 instead of AX, which readModRM() would otherwise
1340 * misinterpret it as.
1341 *
1342 * @param insn - The instruction containing the operand.
1343 * @param type - The operand type.
1344 * @param index - The existing value of the field as reported by readModRM().
1345 * @param valid - The address of a uint8_t. The target is set to 1 if the
1346 * field is valid for the register class; 0 if not.
Sean Callanan010b3732010-04-02 21:23:51 +00001347 * @return - The proper value.
Sean Callanan04cc3072009-12-19 02:59:52 +00001348 */
Sean Callanan2f9443f2009-12-22 02:07:42 +00001349GENERIC_FIXUP_FUNC(fixupRegValue, insn->regBase, MODRM_REG)
Sean Callanan04cc3072009-12-19 02:59:52 +00001350GENERIC_FIXUP_FUNC(fixupRMValue, insn->eaRegBase, EA_REG)
1351
1352/*
1353 * fixupReg - Consults an operand specifier to determine which of the
1354 * fixup*Value functions to use in correcting readModRM()'ss interpretation.
1355 *
1356 * @param insn - See fixup*Value().
1357 * @param op - The operand specifier.
1358 * @return - 0 if fixup was successful; -1 if the register returned was
1359 * invalid for its class.
1360 */
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001361static int fixupReg(struct InternalInstruction *insn,
Benjamin Kramerde0a4fb2010-10-23 09:10:44 +00001362 const struct OperandSpecifier *op) {
Sean Callanan04cc3072009-12-19 02:59:52 +00001363 uint8_t valid;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001364
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001365 dbgprintf(insn, "fixupReg()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001366
Sean Callanan04cc3072009-12-19 02:59:52 +00001367 switch ((OperandEncoding)op->encoding) {
1368 default:
Sean Callanan010b3732010-04-02 21:23:51 +00001369 debug("Expected a REG or R/M encoding in fixupReg");
1370 return -1;
Sean Callananc3fd5232011-03-15 01:23:15 +00001371 case ENCODING_VVVV:
1372 insn->vvvv = (Reg)fixupRegValue(insn,
1373 (OperandType)op->type,
1374 insn->vvvv,
1375 &valid);
1376 if (!valid)
1377 return -1;
1378 break;
Sean Callanan04cc3072009-12-19 02:59:52 +00001379 case ENCODING_REG:
1380 insn->reg = (Reg)fixupRegValue(insn,
1381 (OperandType)op->type,
1382 insn->reg - insn->regBase,
1383 &valid);
1384 if (!valid)
1385 return -1;
1386 break;
1387 case ENCODING_RM:
1388 if (insn->eaBase >= insn->eaRegBase) {
1389 insn->eaBase = (EABase)fixupRMValue(insn,
1390 (OperandType)op->type,
1391 insn->eaBase - insn->eaRegBase,
1392 &valid);
1393 if (!valid)
1394 return -1;
1395 }
1396 break;
1397 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001398
Sean Callanan04cc3072009-12-19 02:59:52 +00001399 return 0;
1400}
1401
1402/*
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001403 * readOpcodeModifier - Reads an operand from the opcode field of an
Sean Callanan04cc3072009-12-19 02:59:52 +00001404 * instruction. Handles AddRegFrm instructions.
1405 *
1406 * @param insn - The instruction whose opcode field is to be read.
1407 * @param inModRM - Indicates that the opcode field is to be read from the
1408 * ModR/M extension; useful for escape opcodes
Sean Callanan010b3732010-04-02 21:23:51 +00001409 * @return - 0 on success; nonzero otherwise.
Sean Callanan04cc3072009-12-19 02:59:52 +00001410 */
Sean Callanan010b3732010-04-02 21:23:51 +00001411static int readOpcodeModifier(struct InternalInstruction* insn) {
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001412 dbgprintf(insn, "readOpcodeModifier()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001413
Sean Callanan04cc3072009-12-19 02:59:52 +00001414 if (insn->consumedOpcodeModifier)
Sean Callanan010b3732010-04-02 21:23:51 +00001415 return 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001416
Sean Callanan04cc3072009-12-19 02:59:52 +00001417 insn->consumedOpcodeModifier = TRUE;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001418
Sean Callanan010b3732010-04-02 21:23:51 +00001419 switch (insn->spec->modifierType) {
Sean Callanan04cc3072009-12-19 02:59:52 +00001420 default:
Sean Callanan010b3732010-04-02 21:23:51 +00001421 debug("Unknown modifier type.");
1422 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001423 case MODIFIER_NONE:
Sean Callanan010b3732010-04-02 21:23:51 +00001424 debug("No modifier but an operand expects one.");
1425 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001426 case MODIFIER_OPCODE:
1427 insn->opcodeModifier = insn->opcode - insn->spec->modifierBase;
Sean Callanan010b3732010-04-02 21:23:51 +00001428 return 0;
Sean Callanan04cc3072009-12-19 02:59:52 +00001429 case MODIFIER_MODRM:
1430 insn->opcodeModifier = insn->modRM - insn->spec->modifierBase;
Sean Callanan010b3732010-04-02 21:23:51 +00001431 return 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001432 }
Sean Callanan04cc3072009-12-19 02:59:52 +00001433}
1434
1435/*
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001436 * readOpcodeRegister - Reads an operand from the opcode field of an
Sean Callanan04cc3072009-12-19 02:59:52 +00001437 * instruction and interprets it appropriately given the operand width.
1438 * Handles AddRegFrm instructions.
1439 *
1440 * @param insn - See readOpcodeModifier().
1441 * @param size - The width (in bytes) of the register being specified.
1442 * 1 means AL and friends, 2 means AX, 4 means EAX, and 8 means
1443 * RAX.
Sean Callanan010b3732010-04-02 21:23:51 +00001444 * @return - 0 on success; nonzero otherwise.
Sean Callanan04cc3072009-12-19 02:59:52 +00001445 */
Sean Callanan010b3732010-04-02 21:23:51 +00001446static int readOpcodeRegister(struct InternalInstruction* insn, uint8_t size) {
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001447 dbgprintf(insn, "readOpcodeRegister()");
Sean Callanan04cc3072009-12-19 02:59:52 +00001448
Sean Callanan010b3732010-04-02 21:23:51 +00001449 if (readOpcodeModifier(insn))
1450 return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001451
Sean Callanan04cc3072009-12-19 02:59:52 +00001452 if (size == 0)
1453 size = insn->registerSize;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001454
Sean Callanan04cc3072009-12-19 02:59:52 +00001455 switch (size) {
1456 case 1:
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001457 insn->opcodeRegister = (Reg)(MODRM_REG_AL + ((bFromREX(insn->rexPrefix) << 3)
Sean Callanan2f9443f2009-12-22 02:07:42 +00001458 | insn->opcodeModifier));
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001459 if (insn->rexPrefix &&
Sean Callanan010b3732010-04-02 21:23:51 +00001460 insn->opcodeRegister >= MODRM_REG_AL + 0x4 &&
1461 insn->opcodeRegister < MODRM_REG_AL + 0x8) {
Sean Callanan2f9443f2009-12-22 02:07:42 +00001462 insn->opcodeRegister = (Reg)(MODRM_REG_SPL
1463 + (insn->opcodeRegister - MODRM_REG_AL - 4));
Sean Callanan04cc3072009-12-19 02:59:52 +00001464 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001465
Sean Callanan04cc3072009-12-19 02:59:52 +00001466 break;
1467 case 2:
Sean Callanan2f9443f2009-12-22 02:07:42 +00001468 insn->opcodeRegister = (Reg)(MODRM_REG_AX
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001469 + ((bFromREX(insn->rexPrefix) << 3)
Sean Callanan2f9443f2009-12-22 02:07:42 +00001470 | insn->opcodeModifier));
Sean Callanan04cc3072009-12-19 02:59:52 +00001471 break;
1472 case 4:
Sean Callanan010b3732010-04-02 21:23:51 +00001473 insn->opcodeRegister = (Reg)(MODRM_REG_EAX
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001474 + ((bFromREX(insn->rexPrefix) << 3)
Sean Callanan2f9443f2009-12-22 02:07:42 +00001475 | insn->opcodeModifier));
Sean Callanan04cc3072009-12-19 02:59:52 +00001476 break;
1477 case 8:
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001478 insn->opcodeRegister = (Reg)(MODRM_REG_RAX
1479 + ((bFromREX(insn->rexPrefix) << 3)
Sean Callanan2f9443f2009-12-22 02:07:42 +00001480 | insn->opcodeModifier));
Sean Callanan04cc3072009-12-19 02:59:52 +00001481 break;
1482 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001483
Sean Callanan010b3732010-04-02 21:23:51 +00001484 return 0;
Sean Callanan04cc3072009-12-19 02:59:52 +00001485}
1486
1487/*
1488 * readImmediate - Consumes an immediate operand from an instruction, given the
1489 * desired operand size.
1490 *
1491 * @param insn - The instruction whose operand is to be read.
1492 * @param size - The width (in bytes) of the operand.
1493 * @return - 0 if the immediate was successfully consumed; nonzero
1494 * otherwise.
1495 */
1496static int readImmediate(struct InternalInstruction* insn, uint8_t size) {
1497 uint8_t imm8;
1498 uint16_t imm16;
1499 uint32_t imm32;
1500 uint64_t imm64;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001501
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001502 dbgprintf(insn, "readImmediate()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001503
Sean Callanan010b3732010-04-02 21:23:51 +00001504 if (insn->numImmediatesConsumed == 2) {
1505 debug("Already consumed two immediates");
1506 return -1;
1507 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001508
Sean Callanan04cc3072009-12-19 02:59:52 +00001509 if (size == 0)
1510 size = insn->immediateSize;
1511 else
1512 insn->immediateSize = size;
Kevin Enderby6fbcd8d2012-02-23 18:18:17 +00001513 insn->immediateOffset = insn->readerCursor - insn->startLocation;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001514
Sean Callanan04cc3072009-12-19 02:59:52 +00001515 switch (size) {
1516 case 1:
1517 if (consumeByte(insn, &imm8))
1518 return -1;
1519 insn->immediates[insn->numImmediatesConsumed] = imm8;
1520 break;
1521 case 2:
1522 if (consumeUInt16(insn, &imm16))
1523 return -1;
1524 insn->immediates[insn->numImmediatesConsumed] = imm16;
1525 break;
1526 case 4:
1527 if (consumeUInt32(insn, &imm32))
1528 return -1;
1529 insn->immediates[insn->numImmediatesConsumed] = imm32;
1530 break;
1531 case 8:
1532 if (consumeUInt64(insn, &imm64))
1533 return -1;
1534 insn->immediates[insn->numImmediatesConsumed] = imm64;
1535 break;
1536 }
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001537
Sean Callanan04cc3072009-12-19 02:59:52 +00001538 insn->numImmediatesConsumed++;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001539
Sean Callanan04cc3072009-12-19 02:59:52 +00001540 return 0;
1541}
1542
1543/*
Craig Topper8dd7bbc2011-09-13 07:37:44 +00001544 * readVVVV - Consumes vvvv from an instruction if it has a VEX prefix.
Sean Callananc3fd5232011-03-15 01:23:15 +00001545 *
1546 * @param insn - The instruction whose operand is to be read.
Craig Topper8dd7bbc2011-09-13 07:37:44 +00001547 * @return - 0 if the vvvv was successfully consumed; nonzero
Sean Callananc3fd5232011-03-15 01:23:15 +00001548 * otherwise.
1549 */
1550static int readVVVV(struct InternalInstruction* insn) {
1551 dbgprintf(insn, "readVVVV()");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001552
Craig Topper9e3e38a2013-10-03 05:17:48 +00001553 if (insn->vexXopType == TYPE_VEX_3B)
1554 insn->vvvv = vvvvFromVEX3of3(insn->vexXopPrefix[2]);
1555 else if (insn->vexXopType == TYPE_VEX_2B)
1556 insn->vvvv = vvvvFromVEX2of2(insn->vexXopPrefix[1]);
1557 else if (insn->vexXopType == TYPE_XOP)
1558 insn->vvvv = vvvvFromXOP3of3(insn->vexXopPrefix[2]);
Sean Callananc3fd5232011-03-15 01:23:15 +00001559 else
1560 return -1;
1561
Craig Topper0d0be472011-10-03 08:14:29 +00001562 if (insn->mode != MODE_64BIT)
1563 insn->vvvv &= 0x7;
1564
Sean Callananc3fd5232011-03-15 01:23:15 +00001565 return 0;
1566}
1567
1568/*
Sean Callanan04cc3072009-12-19 02:59:52 +00001569 * readOperands - Consults the specifier for an instruction and consumes all
1570 * operands for that instruction, interpreting them as it goes.
1571 *
1572 * @param insn - The instruction whose operands are to be read and interpreted.
1573 * @return - 0 if all operands could be read; nonzero otherwise.
1574 */
1575static int readOperands(struct InternalInstruction* insn) {
1576 int index;
Craig Topper8dd7bbc2011-09-13 07:37:44 +00001577 int hasVVVV, needVVVV;
Craig Topper2ba766a2011-12-30 06:23:39 +00001578 int sawRegImm = 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001579
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001580 dbgprintf(insn, "readOperands()");
Craig Topper8dd7bbc2011-09-13 07:37:44 +00001581
1582 /* If non-zero vvvv specified, need to make sure one of the operands
1583 uses it. */
1584 hasVVVV = !readVVVV(insn);
1585 needVVVV = hasVVVV && (insn->vvvv != 0);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001586
Sean Callanan04cc3072009-12-19 02:59:52 +00001587 for (index = 0; index < X86_MAX_OPERANDS; ++index) {
Craig Topperb8aec082012-08-01 07:39:18 +00001588 switch (x86OperandSets[insn->spec->operands][index].encoding) {
Sean Callanan04cc3072009-12-19 02:59:52 +00001589 case ENCODING_NONE:
1590 break;
1591 case ENCODING_REG:
1592 case ENCODING_RM:
1593 if (readModRM(insn))
1594 return -1;
Craig Topperb8aec082012-08-01 07:39:18 +00001595 if (fixupReg(insn, &x86OperandSets[insn->spec->operands][index]))
Sean Callanan04cc3072009-12-19 02:59:52 +00001596 return -1;
1597 break;
1598 case ENCODING_CB:
1599 case ENCODING_CW:
1600 case ENCODING_CD:
1601 case ENCODING_CP:
1602 case ENCODING_CO:
1603 case ENCODING_CT:
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001604 dbgprintf(insn, "We currently don't hande code-offset encodings");
Sean Callanan04cc3072009-12-19 02:59:52 +00001605 return -1;
1606 case ENCODING_IB:
Craig Topper2ba766a2011-12-30 06:23:39 +00001607 if (sawRegImm) {
Benjamin Kramer9c48f262012-01-04 22:06:45 +00001608 /* Saw a register immediate so don't read again and instead split the
1609 previous immediate. FIXME: This is a hack. */
Benjamin Kramer47aecca2012-01-01 17:55:36 +00001610 insn->immediates[insn->numImmediatesConsumed] =
1611 insn->immediates[insn->numImmediatesConsumed - 1] & 0xf;
1612 ++insn->numImmediatesConsumed;
Craig Topper2ba766a2011-12-30 06:23:39 +00001613 break;
1614 }
Sean Callanan04cc3072009-12-19 02:59:52 +00001615 if (readImmediate(insn, 1))
1616 return -1;
Craig Topperb8aec082012-08-01 07:39:18 +00001617 if (x86OperandSets[insn->spec->operands][index].type == TYPE_IMM3 &&
Sean Callanan1efe6612010-04-07 21:42:19 +00001618 insn->immediates[insn->numImmediatesConsumed - 1] > 7)
1619 return -1;
Craig Topperb8aec082012-08-01 07:39:18 +00001620 if (x86OperandSets[insn->spec->operands][index].type == TYPE_IMM5 &&
Craig Topper7629d632012-04-03 05:20:24 +00001621 insn->immediates[insn->numImmediatesConsumed - 1] > 31)
1622 return -1;
Craig Topperb8aec082012-08-01 07:39:18 +00001623 if (x86OperandSets[insn->spec->operands][index].type == TYPE_XMM128 ||
1624 x86OperandSets[insn->spec->operands][index].type == TYPE_XMM256)
Craig Topper2ba766a2011-12-30 06:23:39 +00001625 sawRegImm = 1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001626 break;
1627 case ENCODING_IW:
1628 if (readImmediate(insn, 2))
1629 return -1;
1630 break;
1631 case ENCODING_ID:
1632 if (readImmediate(insn, 4))
1633 return -1;
1634 break;
1635 case ENCODING_IO:
1636 if (readImmediate(insn, 8))
1637 return -1;
1638 break;
1639 case ENCODING_Iv:
Sean Callanan010b3732010-04-02 21:23:51 +00001640 if (readImmediate(insn, insn->immediateSize))
1641 return -1;
Chris Lattnerd4758fc2010-04-16 21:15:15 +00001642 break;
Sean Callanan04cc3072009-12-19 02:59:52 +00001643 case ENCODING_Ia:
Sean Callanan010b3732010-04-02 21:23:51 +00001644 if (readImmediate(insn, insn->addressSize))
1645 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001646 break;
1647 case ENCODING_RB:
Sean Callanan010b3732010-04-02 21:23:51 +00001648 if (readOpcodeRegister(insn, 1))
1649 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001650 break;
1651 case ENCODING_RW:
Sean Callanan010b3732010-04-02 21:23:51 +00001652 if (readOpcodeRegister(insn, 2))
1653 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001654 break;
1655 case ENCODING_RD:
Sean Callanan010b3732010-04-02 21:23:51 +00001656 if (readOpcodeRegister(insn, 4))
1657 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001658 break;
1659 case ENCODING_RO:
Sean Callanan010b3732010-04-02 21:23:51 +00001660 if (readOpcodeRegister(insn, 8))
1661 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001662 break;
1663 case ENCODING_Rv:
Sean Callanan010b3732010-04-02 21:23:51 +00001664 if (readOpcodeRegister(insn, 0))
1665 return -1;
Sean Callanan04cc3072009-12-19 02:59:52 +00001666 break;
1667 case ENCODING_I:
Sean Callanan010b3732010-04-02 21:23:51 +00001668 if (readOpcodeModifier(insn))
1669 return -1;
Sean Callananc3fd5232011-03-15 01:23:15 +00001670 break;
1671 case ENCODING_VVVV:
Craig Topper8dd7bbc2011-09-13 07:37:44 +00001672 needVVVV = 0; /* Mark that we have found a VVVV operand. */
1673 if (!hasVVVV)
Sean Callananc3fd5232011-03-15 01:23:15 +00001674 return -1;
Craig Topperb8aec082012-08-01 07:39:18 +00001675 if (fixupReg(insn, &x86OperandSets[insn->spec->operands][index]))
Sean Callananc3fd5232011-03-15 01:23:15 +00001676 return -1;
1677 break;
Sean Callanan04cc3072009-12-19 02:59:52 +00001678 case ENCODING_DUP:
1679 break;
1680 default:
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001681 dbgprintf(insn, "Encountered an operand with an unknown encoding.");
Sean Callanan04cc3072009-12-19 02:59:52 +00001682 return -1;
1683 }
1684 }
Craig Topper8dd7bbc2011-09-13 07:37:44 +00001685
1686 /* If we didn't find ENCODING_VVVV operand, but non-zero vvvv present, fail */
1687 if (needVVVV) return -1;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001688
Sean Callanan04cc3072009-12-19 02:59:52 +00001689 return 0;
1690}
1691
1692/*
1693 * decodeInstruction - Reads and interprets a full instruction provided by the
1694 * user.
1695 *
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001696 * @param insn - A pointer to the instruction to be populated. Must be
Sean Callanan04cc3072009-12-19 02:59:52 +00001697 * pre-allocated.
1698 * @param reader - The function to be used to read the instruction's bytes.
1699 * @param readerArg - A generic argument to be passed to the reader to store
1700 * any internal state.
1701 * @param logger - If non-NULL, the function to be used to write log messages
1702 * and warnings.
1703 * @param loggerArg - A generic argument to be passed to the logger to store
1704 * any internal state.
1705 * @param startLoc - The address (in the reader's address space) of the first
1706 * byte in the instruction.
1707 * @param mode - The mode (real mode, IA-32e, or IA-32e in 64-bit mode) to
1708 * decode the instruction in.
1709 * @return - 0 if the instruction's memory could be read; nonzero if
1710 * not.
1711 */
1712int decodeInstruction(struct InternalInstruction* insn,
1713 byteReader_t reader,
Roman Divacky67923802012-09-05 21:17:34 +00001714 const void* readerArg,
Sean Callanan04cc3072009-12-19 02:59:52 +00001715 dlog_t logger,
1716 void* loggerArg,
Roman Divacky67923802012-09-05 21:17:34 +00001717 const void* miiArg,
Sean Callanan04cc3072009-12-19 02:59:52 +00001718 uint64_t startLoc,
1719 DisassemblerMode mode) {
Daniel Dunbarc745a622009-12-19 03:31:50 +00001720 memset(insn, 0, sizeof(struct InternalInstruction));
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001721
Sean Callanan04cc3072009-12-19 02:59:52 +00001722 insn->reader = reader;
1723 insn->readerArg = readerArg;
1724 insn->dlog = logger;
1725 insn->dlogArg = loggerArg;
1726 insn->startLocation = startLoc;
1727 insn->readerCursor = startLoc;
1728 insn->mode = mode;
1729 insn->numImmediatesConsumed = 0;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001730
Sean Callanan04cc3072009-12-19 02:59:52 +00001731 if (readPrefixes(insn) ||
1732 readOpcode(insn) ||
Benjamin Kramer478e8de2012-02-11 14:50:54 +00001733 getID(insn, miiArg) ||
Sean Callanan04cc3072009-12-19 02:59:52 +00001734 insn->instructionID == 0 ||
1735 readOperands(insn))
1736 return -1;
Craig Topperb8aec082012-08-01 07:39:18 +00001737
1738 insn->operands = &x86OperandSets[insn->spec->operands][0];
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001739
Sean Callanan04cc3072009-12-19 02:59:52 +00001740 insn->length = insn->readerCursor - insn->startLocation;
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001741
Benjamin Kramer4f672272010-03-18 12:18:36 +00001742 dbgprintf(insn, "Read from 0x%llx to 0x%llx: length %zu",
1743 startLoc, insn->readerCursor, insn->length);
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001744
Sean Callanan04cc3072009-12-19 02:59:52 +00001745 if (insn->length > 15)
Nuno Lopes3ed6d602009-12-19 12:07:00 +00001746 dbgprintf(insn, "Instruction exceeds 15-byte limit");
NAKAMURA Takumidde7fa82013-03-25 20:55:43 +00001747
Sean Callanan04cc3072009-12-19 02:59:52 +00001748 return 0;
1749}