arm64eb: arm64 big endian also using little endian instructions. (#816)

* arm64eb: arm64 big endian also using little endian instructions.

* arm64: using another example that depends on endians.

example:
1. store a word: 0x12345678
2. load a byte:
   * little endian : 0x78
   * big endian    : 0x12
This commit is contained in:
zhangwm 2017-05-04 20:00:48 +08:00 committed by Nguyen Anh Quynh
parent 1b00d3f89a
commit 4a62409949
5 changed files with 32 additions and 25 deletions

View file

@ -8,7 +8,7 @@ from unicorn.arm64_const import *
# code to be emulated # code to be emulated
ARM64_CODE = b"\xab\x01\x0f\x8b" #add x11, x13, x15 ARM64_CODE = b"\xab\x05\x00\xb8\xaf\x05\x40\x38" # str x11, [x13]; ldrb x15, [x13]
# memory address where emulation starts # memory address where emulation starts
ADDRESS = 0x10000 ADDRESS = 0x10000
@ -38,26 +38,27 @@ def test_arm64():
mu.mem_write(ADDRESS, ARM64_CODE) mu.mem_write(ADDRESS, ARM64_CODE)
# initialize machine registers # initialize machine registers
mu.reg_write(UC_ARM64_REG_X11, 0x1234) mu.reg_write(UC_ARM64_REG_X11, 0x12345678)
mu.reg_write(UC_ARM64_REG_X13, 0x6789) mu.reg_write(UC_ARM64_REG_X13, 0x10008)
mu.reg_write(UC_ARM64_REG_X15, 0x3333) mu.reg_write(UC_ARM64_REG_X15, 0x33)
# tracing all basic blocks with customized callback # tracing all basic blocks with customized callback
mu.hook_add(UC_HOOK_BLOCK, hook_block) mu.hook_add(UC_HOOK_BLOCK, hook_block)
# tracing all instructions with customized callback # tracing all instructions with customized callback
mu.hook_add(UC_HOOK_CODE, hook_code) mu.hook_add(UC_HOOK_CODE, hook_code, begin=ADDRESS, end=ADDRESS)
# emulate machine code in infinite time # emulate machine code in infinite time
mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE)) mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE))
# now print out some registers # now print out some registers
print(">>> Emulation done. Below is the CPU context") print(">>> Emulation done. Below is the CPU context")
print(">>> As little endian, X15 should be 0x78:");
x11 = mu.reg_read(UC_ARM64_REG_X11) x11 = mu.reg_read(UC_ARM64_REG_X11)
x13 = mu.reg_read(UC_ARM64_REG_X13) x13 = mu.reg_read(UC_ARM64_REG_X13)
x15 = mu.reg_read(UC_ARM64_REG_X15) x15 = mu.reg_read(UC_ARM64_REG_X15)
print(">>> X11 = 0x%x" %x11) print(">>> X15 = 0x%x" %x15)
except UcError as e: except UcError as e:
print("ERROR: %s" % e) print("ERROR: %s" % e)

View file

@ -9,7 +9,7 @@ from unicorn.arm64_const import *
# code to be emulated # code to be emulated
ARM64_CODE = b"\x8b\x0f\x01\xab" #add x11, x13, x15 ARM64_CODE = b"\xab\x05\x00\xb8\xaf\x05\x40\x38" # str x11, [x13]; ldrb x15, [x13]
# memory address where emulation starts # memory address where emulation starts
ADDRESS = 0x10000 ADDRESS = 0x10000
@ -39,26 +39,27 @@ def test_arm64():
mu.mem_write(ADDRESS, ARM64_CODE) mu.mem_write(ADDRESS, ARM64_CODE)
# initialize machine registers # initialize machine registers
mu.reg_write(UC_ARM64_REG_X11, 0x1234) mu.reg_write(UC_ARM64_REG_X11, 0x12345678)
mu.reg_write(UC_ARM64_REG_X13, 0x6789) mu.reg_write(UC_ARM64_REG_X13, 0x10008)
mu.reg_write(UC_ARM64_REG_X15, 0x3333) mu.reg_write(UC_ARM64_REG_X15, 0x33)
# tracing all basic blocks with customized callback # tracing all basic blocks with customized callback
mu.hook_add(UC_HOOK_BLOCK, hook_block) mu.hook_add(UC_HOOK_BLOCK, hook_block)
# tracing all instructions with customized callback # tracing all instructions with customized callback
mu.hook_add(UC_HOOK_CODE, hook_code) mu.hook_add(UC_HOOK_CODE, hook_code, begin=ADDRESS, end=ADDRESS)
# emulate machine code in infinite time # emulate machine code in infinite time
mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE)) mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE))
# now print out some registers # now print out some registers
print(">>> Emulation done. Below is the CPU context") print(">>> Emulation done. Below is the CPU context")
print(">>> As big endian, X15 should be 0x12:");
x11 = mu.reg_read(UC_ARM64_REG_X11) x11 = mu.reg_read(UC_ARM64_REG_X11)
x13 = mu.reg_read(UC_ARM64_REG_X13) x13 = mu.reg_read(UC_ARM64_REG_X13)
x15 = mu.reg_read(UC_ARM64_REG_X15) x15 = mu.reg_read(UC_ARM64_REG_X15)
print(">>> X11 = 0x%x" %x11) print(">>> X15 = 0x%x" %x15)
except UcError as e: except UcError as e:
print("ERROR: %s" % e) print("ERROR: %s" % e)

View file

@ -11059,7 +11059,11 @@ void gen_intermediate_code_internal_a64(ARMCPU *cpu,
dc->aarch64 = 1; dc->aarch64 = 1;
dc->thumb = 0; dc->thumb = 0;
#if defined(TARGET_WORDS_BIGENDIAN)
dc->bswap_code = 1;
#else
dc->bswap_code = 0; dc->bswap_code = 0;
#endif
dc->condexec_mask = 0; dc->condexec_mask = 0;
dc->condexec_cond = 0; dc->condexec_cond = 0;
#if !defined(CONFIG_USER_ONLY) #if !defined(CONFIG_USER_ONLY)

View file

@ -8,7 +8,7 @@
// code to be emulated // code to be emulated
#define ARM_CODE "\xab\x01\x0f\x8b" // add x11, x13, x15 #define ARM_CODE "\xab\x05\x00\xb8\xaf\x05\x40\x38" // str x11, [x13]; ldrb x15, [x13]
// memory address where emulation starts // memory address where emulation starts
#define ADDRESS 0x10000 #define ADDRESS 0x10000
@ -29,9 +29,9 @@ static void test_arm64(void)
uc_err err; uc_err err;
uc_hook trace1, trace2; uc_hook trace1, trace2;
int64_t x11 = 0x1234; // X11 register int64_t x11 = 0x12345678; // X11 register
int64_t x13 = 0x6789; // X13 register int64_t x13 = 0x10000 + 0x8; // X13 register
int64_t x15 = 0x3333; // X15 register int64_t x15 = 0x33; // X15 register
printf("Emulate ARM64 code\n"); printf("Emulate ARM64 code\n");
@ -69,9 +69,10 @@ static void test_arm64(void)
// now print out some registers // now print out some registers
printf(">>> Emulation done. Below is the CPU context\n"); printf(">>> Emulation done. Below is the CPU context\n");
printf(">>> As little endian, X15 should be 0x78:\n");
uc_reg_read(uc, UC_ARM64_REG_X11, &x11); uc_reg_read(uc, UC_ARM64_REG_X15, &x15);
printf(">>> X11 = 0x%" PRIx64 "\n", x11); printf(">>> X15 = 0x%" PRIx64 "\n", x15);
uc_close(uc); uc_close(uc);
} }

View file

@ -7,9 +7,8 @@
#include <unicorn/unicorn.h> #include <unicorn/unicorn.h>
#include <string.h> #include <string.h>
// code to be emulated // code to be emulated
#define ARM_CODE "\x8b\x0f\x01\xab" // add x11, x13, x15 #define ARM_CODE "\xab\x05\x00\xb8\xaf\x05\x40\x38" // str x11, [x13]; ldrb x15, [x13]
// memory address where emulation starts // memory address where emulation starts
#define ADDRESS 0x10000 #define ADDRESS 0x10000
@ -30,9 +29,9 @@ static void test_arm64(void)
uc_err err; uc_err err;
uc_hook trace1, trace2; uc_hook trace1, trace2;
int64_t x11 = 0x1234; // X11 register int64_t x11 = 0x12345678; // X11 register
int64_t x13 = 0x6789; // X13 register int64_t x13 = 0x10000 + 0x8; // X13 register
int64_t x15 = 0x3333; // X15 register int64_t x15 = 0x33; // X15 register
printf("Emulate ARM64 Big-Endian code\n"); printf("Emulate ARM64 Big-Endian code\n");
@ -70,9 +69,10 @@ static void test_arm64(void)
// now print out some registers // now print out some registers
printf(">>> Emulation done. Below is the CPU context\n"); printf(">>> Emulation done. Below is the CPU context\n");
printf(">>> As big endian, X15 should be 0x12:\n");
uc_reg_read(uc, UC_ARM64_REG_X11, &x11); uc_reg_read(uc, UC_ARM64_REG_X15, &x15);
printf(">>> X11 = 0x%" PRIx64 "\n", x11); printf(">>> X15 = 0x%" PRIx64 "\n", x15);
uc_close(uc); uc_close(uc);
} }