about summary refs log tree commit diff stats
path: root/example/test_jit_arm_sc.py
diff options
context:
space:
mode:
authorFabrice Desclaux <fabrice.desclaux@cea.fr>2014-10-09 17:47:22 +0200
committerFabrice Desclaux <fabrice.desclaux@cea.fr>2014-10-09 17:47:22 +0200
commite5ad0b4553329263240efeb7e7b0563d284355a8 (patch)
treeda566a52c9acaa9529c6a1daf84f9489594a1bc8 /example/test_jit_arm_sc.py
parent7101a6d9d5998102d0dc6a86ac01ba332fed3506 (diff)
downloadmiasm-e5ad0b4553329263240efeb7e7b0563d284355a8.tar.gz
miasm-e5ad0b4553329263240efeb7e7b0563d284355a8.zip
Reg test: add arm jit little/big endian
Diffstat (limited to 'example/test_jit_arm_sc.py')
-rw-r--r--example/test_jit_arm_sc.py47
1 files changed, 47 insertions, 0 deletions
diff --git a/example/test_jit_arm_sc.py b/example/test_jit_arm_sc.py
new file mode 100644
index 00000000..1ecafe69
--- /dev/null
+++ b/example/test_jit_arm_sc.py
@@ -0,0 +1,47 @@
+#!/usr/bin/env python
+#-*- coding:utf-8 -*-
+from miasm2.analysis import debugging, gdbserver
+
+from miasm2.analysis.sandbox import Sandbox_Linux_armb_str
+from miasm2.analysis.sandbox import Sandbox_Linux_arml_str
+from miasm2.jitter.jitload import vm_load_elf, libimp, preload_elf
+from miasm2.analysis.machine import Machine
+from elfesteem.strpatchwork import StrPatchwork
+import logging
+
+from pdb import pm
+
+parser = Sandbox_Linux_arml_str.parser(description="""Sandbox an elf binary with arm engine
+(ex: test_jit_arm_sc.py example/demo_arm_l.bin)""")
+parser.add_argument("filename", help="string Filename")
+parser.add_argument("endianess", help="endianness [b/l]")
+parser.add_argument('-v', "--verbose",
+                    help="verbose mode", action="store_true")
+
+options = parser.parse_args()
+
+if options.endianess == 'b':
+    sandbox = Sandbox_Linux_armb_str
+elif options.endianess == 'l':
+    sandbox = Sandbox_Linux_arml_str
+else:
+    raise ValueError("Bad endianess!")
+
+sb = sandbox(options.filename, options, globals())
+
+if options.address is None:
+    raise ValueError('invalid address')
+
+sb.run()
+
+# test correct de xor
+start = sb.jitter.cpu.R0
+stop = sb.jitter.cpu.R1
+s = sb.jitter.vm.get_mem(start, stop-start)
+s = StrPatchwork(s)
+for i, c in enumerate(s):
+    s[i] = chr(ord(c)^0x11)
+s = str(s)
+assert(s == "test string\x00")
+
+