mirror of
https://github.com/yuzu-emu/unicorn
synced 2024-11-24 09:48:21 +00:00
arm64eb: arm64 big endian also using little endian instructions. (#816)
* arm64eb: arm64 big endian also using little endian instructions. * arm64: using another example that depends on endians. example: 1. store a word: 0x12345678 2. load a byte: * little endian : 0x78 * big endian : 0x12
This commit is contained in:
parent
1b00d3f89a
commit
4a62409949
5 changed files with 32 additions and 25 deletions
|
@ -8,7 +8,7 @@ from unicorn.arm64_const import *
|
||||||
|
|
||||||
|
|
||||||
# code to be emulated
|
# code to be emulated
|
||||||
ARM64_CODE = b"\xab\x01\x0f\x8b" #add x11, x13, x15
|
ARM64_CODE = b"\xab\x05\x00\xb8\xaf\x05\x40\x38" # str x11, [x13]; ldrb x15, [x13]
|
||||||
|
|
||||||
# memory address where emulation starts
|
# memory address where emulation starts
|
||||||
ADDRESS = 0x10000
|
ADDRESS = 0x10000
|
||||||
|
@ -38,26 +38,27 @@ def test_arm64():
|
||||||
mu.mem_write(ADDRESS, ARM64_CODE)
|
mu.mem_write(ADDRESS, ARM64_CODE)
|
||||||
|
|
||||||
# initialize machine registers
|
# initialize machine registers
|
||||||
mu.reg_write(UC_ARM64_REG_X11, 0x1234)
|
mu.reg_write(UC_ARM64_REG_X11, 0x12345678)
|
||||||
mu.reg_write(UC_ARM64_REG_X13, 0x6789)
|
mu.reg_write(UC_ARM64_REG_X13, 0x10008)
|
||||||
mu.reg_write(UC_ARM64_REG_X15, 0x3333)
|
mu.reg_write(UC_ARM64_REG_X15, 0x33)
|
||||||
|
|
||||||
# tracing all basic blocks with customized callback
|
# tracing all basic blocks with customized callback
|
||||||
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
||||||
|
|
||||||
# tracing all instructions with customized callback
|
# tracing all instructions with customized callback
|
||||||
mu.hook_add(UC_HOOK_CODE, hook_code)
|
mu.hook_add(UC_HOOK_CODE, hook_code, begin=ADDRESS, end=ADDRESS)
|
||||||
|
|
||||||
# emulate machine code in infinite time
|
# emulate machine code in infinite time
|
||||||
mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE))
|
mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE))
|
||||||
|
|
||||||
# now print out some registers
|
# now print out some registers
|
||||||
print(">>> Emulation done. Below is the CPU context")
|
print(">>> Emulation done. Below is the CPU context")
|
||||||
|
print(">>> As little endian, X15 should be 0x78:");
|
||||||
|
|
||||||
x11 = mu.reg_read(UC_ARM64_REG_X11)
|
x11 = mu.reg_read(UC_ARM64_REG_X11)
|
||||||
x13 = mu.reg_read(UC_ARM64_REG_X13)
|
x13 = mu.reg_read(UC_ARM64_REG_X13)
|
||||||
x15 = mu.reg_read(UC_ARM64_REG_X15)
|
x15 = mu.reg_read(UC_ARM64_REG_X15)
|
||||||
print(">>> X11 = 0x%x" %x11)
|
print(">>> X15 = 0x%x" %x15)
|
||||||
|
|
||||||
except UcError as e:
|
except UcError as e:
|
||||||
print("ERROR: %s" % e)
|
print("ERROR: %s" % e)
|
||||||
|
|
|
@ -9,7 +9,7 @@ from unicorn.arm64_const import *
|
||||||
|
|
||||||
|
|
||||||
# code to be emulated
|
# code to be emulated
|
||||||
ARM64_CODE = b"\x8b\x0f\x01\xab" #add x11, x13, x15
|
ARM64_CODE = b"\xab\x05\x00\xb8\xaf\x05\x40\x38" # str x11, [x13]; ldrb x15, [x13]
|
||||||
|
|
||||||
# memory address where emulation starts
|
# memory address where emulation starts
|
||||||
ADDRESS = 0x10000
|
ADDRESS = 0x10000
|
||||||
|
@ -39,26 +39,27 @@ def test_arm64():
|
||||||
mu.mem_write(ADDRESS, ARM64_CODE)
|
mu.mem_write(ADDRESS, ARM64_CODE)
|
||||||
|
|
||||||
# initialize machine registers
|
# initialize machine registers
|
||||||
mu.reg_write(UC_ARM64_REG_X11, 0x1234)
|
mu.reg_write(UC_ARM64_REG_X11, 0x12345678)
|
||||||
mu.reg_write(UC_ARM64_REG_X13, 0x6789)
|
mu.reg_write(UC_ARM64_REG_X13, 0x10008)
|
||||||
mu.reg_write(UC_ARM64_REG_X15, 0x3333)
|
mu.reg_write(UC_ARM64_REG_X15, 0x33)
|
||||||
|
|
||||||
# tracing all basic blocks with customized callback
|
# tracing all basic blocks with customized callback
|
||||||
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
mu.hook_add(UC_HOOK_BLOCK, hook_block)
|
||||||
|
|
||||||
# tracing all instructions with customized callback
|
# tracing all instructions with customized callback
|
||||||
mu.hook_add(UC_HOOK_CODE, hook_code)
|
mu.hook_add(UC_HOOK_CODE, hook_code, begin=ADDRESS, end=ADDRESS)
|
||||||
|
|
||||||
# emulate machine code in infinite time
|
# emulate machine code in infinite time
|
||||||
mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE))
|
mu.emu_start(ADDRESS, ADDRESS + len(ARM64_CODE))
|
||||||
|
|
||||||
# now print out some registers
|
# now print out some registers
|
||||||
print(">>> Emulation done. Below is the CPU context")
|
print(">>> Emulation done. Below is the CPU context")
|
||||||
|
print(">>> As big endian, X15 should be 0x12:");
|
||||||
|
|
||||||
x11 = mu.reg_read(UC_ARM64_REG_X11)
|
x11 = mu.reg_read(UC_ARM64_REG_X11)
|
||||||
x13 = mu.reg_read(UC_ARM64_REG_X13)
|
x13 = mu.reg_read(UC_ARM64_REG_X13)
|
||||||
x15 = mu.reg_read(UC_ARM64_REG_X15)
|
x15 = mu.reg_read(UC_ARM64_REG_X15)
|
||||||
print(">>> X11 = 0x%x" %x11)
|
print(">>> X15 = 0x%x" %x15)
|
||||||
|
|
||||||
except UcError as e:
|
except UcError as e:
|
||||||
print("ERROR: %s" % e)
|
print("ERROR: %s" % e)
|
||||||
|
|
|
@ -11059,7 +11059,11 @@ void gen_intermediate_code_internal_a64(ARMCPU *cpu,
|
||||||
|
|
||||||
dc->aarch64 = 1;
|
dc->aarch64 = 1;
|
||||||
dc->thumb = 0;
|
dc->thumb = 0;
|
||||||
|
#if defined(TARGET_WORDS_BIGENDIAN)
|
||||||
|
dc->bswap_code = 1;
|
||||||
|
#else
|
||||||
dc->bswap_code = 0;
|
dc->bswap_code = 0;
|
||||||
|
#endif
|
||||||
dc->condexec_mask = 0;
|
dc->condexec_mask = 0;
|
||||||
dc->condexec_cond = 0;
|
dc->condexec_cond = 0;
|
||||||
#if !defined(CONFIG_USER_ONLY)
|
#if !defined(CONFIG_USER_ONLY)
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
|
|
||||||
|
|
||||||
// code to be emulated
|
// code to be emulated
|
||||||
#define ARM_CODE "\xab\x01\x0f\x8b" // add x11, x13, x15
|
#define ARM_CODE "\xab\x05\x00\xb8\xaf\x05\x40\x38" // str x11, [x13]; ldrb x15, [x13]
|
||||||
|
|
||||||
// memory address where emulation starts
|
// memory address where emulation starts
|
||||||
#define ADDRESS 0x10000
|
#define ADDRESS 0x10000
|
||||||
|
@ -29,9 +29,9 @@ static void test_arm64(void)
|
||||||
uc_err err;
|
uc_err err;
|
||||||
uc_hook trace1, trace2;
|
uc_hook trace1, trace2;
|
||||||
|
|
||||||
int64_t x11 = 0x1234; // X11 register
|
int64_t x11 = 0x12345678; // X11 register
|
||||||
int64_t x13 = 0x6789; // X13 register
|
int64_t x13 = 0x10000 + 0x8; // X13 register
|
||||||
int64_t x15 = 0x3333; // X15 register
|
int64_t x15 = 0x33; // X15 register
|
||||||
|
|
||||||
printf("Emulate ARM64 code\n");
|
printf("Emulate ARM64 code\n");
|
||||||
|
|
||||||
|
@ -69,9 +69,10 @@ static void test_arm64(void)
|
||||||
|
|
||||||
// now print out some registers
|
// now print out some registers
|
||||||
printf(">>> Emulation done. Below is the CPU context\n");
|
printf(">>> Emulation done. Below is the CPU context\n");
|
||||||
|
printf(">>> As little endian, X15 should be 0x78:\n");
|
||||||
|
|
||||||
uc_reg_read(uc, UC_ARM64_REG_X11, &x11);
|
uc_reg_read(uc, UC_ARM64_REG_X15, &x15);
|
||||||
printf(">>> X11 = 0x%" PRIx64 "\n", x11);
|
printf(">>> X15 = 0x%" PRIx64 "\n", x15);
|
||||||
|
|
||||||
uc_close(uc);
|
uc_close(uc);
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,9 +7,8 @@
|
||||||
#include <unicorn/unicorn.h>
|
#include <unicorn/unicorn.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
|
|
||||||
// code to be emulated
|
// code to be emulated
|
||||||
#define ARM_CODE "\x8b\x0f\x01\xab" // add x11, x13, x15
|
#define ARM_CODE "\xab\x05\x00\xb8\xaf\x05\x40\x38" // str x11, [x13]; ldrb x15, [x13]
|
||||||
|
|
||||||
// memory address where emulation starts
|
// memory address where emulation starts
|
||||||
#define ADDRESS 0x10000
|
#define ADDRESS 0x10000
|
||||||
|
@ -30,9 +29,9 @@ static void test_arm64(void)
|
||||||
uc_err err;
|
uc_err err;
|
||||||
uc_hook trace1, trace2;
|
uc_hook trace1, trace2;
|
||||||
|
|
||||||
int64_t x11 = 0x1234; // X11 register
|
int64_t x11 = 0x12345678; // X11 register
|
||||||
int64_t x13 = 0x6789; // X13 register
|
int64_t x13 = 0x10000 + 0x8; // X13 register
|
||||||
int64_t x15 = 0x3333; // X15 register
|
int64_t x15 = 0x33; // X15 register
|
||||||
|
|
||||||
printf("Emulate ARM64 Big-Endian code\n");
|
printf("Emulate ARM64 Big-Endian code\n");
|
||||||
|
|
||||||
|
@ -70,9 +69,10 @@ static void test_arm64(void)
|
||||||
|
|
||||||
// now print out some registers
|
// now print out some registers
|
||||||
printf(">>> Emulation done. Below is the CPU context\n");
|
printf(">>> Emulation done. Below is the CPU context\n");
|
||||||
|
printf(">>> As big endian, X15 should be 0x12:\n");
|
||||||
|
|
||||||
uc_reg_read(uc, UC_ARM64_REG_X11, &x11);
|
uc_reg_read(uc, UC_ARM64_REG_X15, &x15);
|
||||||
printf(">>> X11 = 0x%" PRIx64 "\n", x11);
|
printf(">>> X15 = 0x%" PRIx64 "\n", x15);
|
||||||
|
|
||||||
uc_close(uc);
|
uc_close(uc);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue