This commit is contained in:
Nguyen Anh Quynh 2015-12-23 01:40:42 +08:00
commit 24d344bf61
4 changed files with 144 additions and 0 deletions

1
.gitignore vendored
View File

@ -128,6 +128,7 @@ mips_branch_likely_issue
test_mem_map_ptr
test_mem_high
rw_hookstack
hook_extrainvoke
#################

View File

@ -34,6 +34,7 @@ TESTS += rw_hookstack
TESTS += threaded_emu_start
TESTS += emu_stop_in_hook_overrun
TESTS += mips_branch_likely_issue
TESTS += hook_extrainvoke
all: $(TESTS)

View File

@ -0,0 +1,48 @@
#!/usr/bin/python
'''https://github.com/unicorn-engine/unicorn/issues/334'''
from __future__ import print_function
import regress
from unicorn import *
from unicorn.x86_const import *
ADDRESS = 0x8048000
STACK_ADDRESS = 0xffff000
STACK_SIZE = 4096
'''
31 DB xor ebx, ebx
53 push ebx
43 inc ebx
53 push ebx
6A 02 push 2
6A 66 push 66h
58 pop eax
89 E1 mov ecx, esp
CD 80 int 80h
'''
CODE = "\x31\xDB\x53\x43\x53\x6A\x02\x6A\x66\x58\x89\xE1\xCD\x80"
EP = ADDRESS + 0x54
def hook_code(mu, address, size, user_data):
print(">>> Tracing instruction at 0x%x, instruction size = %u" %(address, size))
class HookCodeAddDelTest(regress.RegressTest):
def runTest(self):
emu = Uc(UC_ARCH_X86, UC_MODE_32)
emu.mem_map(ADDRESS, 0x1000)
emu.mem_write(EP, CODE)
emu.mem_map(STACK_ADDRESS, STACK_SIZE)
emu.reg_write(UC_X86_REG_ESP, STACK_ADDRESS + STACK_SIZE)
# UC_HOOK_CODE hook will work even after deletion
emu.hook_add(UC_HOOK_CODE, hook_code, None)
emu.hook_del(UC_HOOK_CODE)
emu.emu_start(EP, EP + len(CODE), count = 3)
print("EIP: 0x%x" % emu.reg_read(UC_X86_REG_EIP))
if __name__ == '__main__':
regress.main()

View File

@ -0,0 +1,94 @@
#include <stdlib.h>
#include <stdio.h>
#include <stdint.h>
#include <unicorn/unicorn.h>
#define X86_CODE32 "\xf3\xab" // rep stosd dword ptr es:[edi], eax -> Fill (E)CX doublewords at ES:[(E)DI] with EAX
#define ADDRESS 0x1000000
#define ECX_OPS 2
static long unsigned int hook_called = 0;
void hook_ins(uc_engine *uc, uint64_t address, uint32_t size, void *user_data)
{
hook_called++;
printf("hook called\n");
}
static void VM_exec()
{
uc_engine *uc;
uc_err err;
uc_hook trace;
unsigned int r_eax, eflags, r_esp, r_edi, r_ecx;
r_eax = 0xbaadbabe;
r_esp = ADDRESS+0x20;
r_edi = ADDRESS+0x300; //some safe distance from main code.
eflags = 0x00000206;
r_ecx = ECX_OPS;
// Initialize emulator in X86-32bit mode
err = uc_open(UC_ARCH_X86, UC_MODE_32, &uc);
if(err)
{
printf("Failed on uc_open() with error returned: %s\n", uc_strerror(err));
return;
}
err = uc_mem_map(uc, ADDRESS, (2 * 1024 * 1024), UC_PROT_ALL);
if(err != UC_ERR_OK)
{
printf("Failed to map memory %s\n", uc_strerror(err));
return;
}
// write machine code to be emulated to memory
err = uc_mem_write(uc, ADDRESS, X86_CODE32, sizeof(X86_CODE32) - 1);
if(err != UC_ERR_OK)
{
printf("Failed to write emulation code to memory, quit!: %s(len %lu)\n", uc_strerror(err), (unsigned long)sizeof(X86_CODE32) - 1);
return;
}
// initialize machine registers
uc_reg_write(uc, UC_X86_REG_EAX, &r_eax);
uc_reg_write(uc, UC_X86_REG_EDI, &r_edi);
uc_reg_write(uc, UC_X86_REG_ECX, &r_ecx);
uc_reg_write(uc, UC_X86_REG_ESP, &r_esp); //make stack pointer point to already mapped memory so we don't need to hook.
uc_reg_write(uc, UC_X86_REG_EFLAGS, &eflags);
uc_hook_add(uc, &trace, UC_HOOK_CODE, (void *)hook_ins, NULL, (uint64_t)1, (uint64_t)0);
// emulate machine code in infinite time
err = uc_emu_start(uc, ADDRESS, ADDRESS + (sizeof(X86_CODE32) - 1), 0, 0);
if(err)
{
printf("Failed on uc_emu_start() with error returned %u: %s\n", err, uc_strerror(err));
uc_close(uc);
return;
}
uc_reg_read(uc, UC_X86_REG_EAX, &r_eax);
uc_reg_read(uc, UC_X86_REG_ECX, &r_ecx);
uc_reg_read(uc, UC_X86_REG_EDI, &r_edi);
uc_reg_read(uc, UC_X86_REG_EFLAGS, &eflags);
uc_close(uc);
printf("\n>>> Emulation done. Below is the CPU context\n");
printf(">>> EAX = 0x%08X\n", r_eax);
printf(">>> ECX = 0x%08X\n", r_ecx);
printf(">>> EDI = 0x%08X\n", r_edi);
printf(">>> EFLAGS = 0x%08X\n", eflags);
printf("\nHook called %lu times. Test %s\n", hook_called, (hook_called == ECX_OPS ? "PASSED!!" : "FAILED!!!"));
}
int main(int argc, char *argv[])
{
VM_exec();
return 0;
}