From 46c53fa4b75cabffaa34631eec1f642669c3b1fb Mon Sep 17 00:00:00 2001 From: Andrew Dutcher Date: Mon, 15 Aug 2016 00:12:32 -0700 Subject: [PATCH] Add regression test for new eflags patch --- tests/regress/x86_eflags.py | 38 +++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100755 tests/regress/x86_eflags.py diff --git a/tests/regress/x86_eflags.py b/tests/regress/x86_eflags.py new file mode 100755 index 00000000..486f6d03 --- /dev/null +++ b/tests/regress/x86_eflags.py @@ -0,0 +1,38 @@ +#!/usr/bin/python +import regress +import unicorn as U + +class WrongEFLAGS2(regress.RegressTest): + def test_eflags(self): + # imul eax, ebx + CODE = '\x0f\xaf\xc3' + + uc = U.Uc(U.UC_ARCH_X86, U.UC_MODE_32) + uc.reg_write(U.x86_const.UC_X86_REG_EAX, 16) + uc.reg_write(U.x86_const.UC_X86_REG_EBX, 1) + uc.reg_write(U.x86_const.UC_X86_REG_EFLAGS, 0x292) + + uc.mem_map(0x600000, 0x1000) + uc.mem_write(0x6000b0, CODE) + uc.emu_start(0x6000b0, 0, count=1) + + + # Here's the original execution trace for this on actual hardware. + # + # (gdb) x/i $eip + # => 0x804aae5: imul eax,DWORD PTR [ebp-0x8] + # (gdb) p/x $eax + # $2 = 0x10 + # (gdb) x/wx $ebp-8 + # 0xbaaaad4c: 0x00000001 + # (gdb) p/x $eflags + # $3 = 0x292 + # (gdb) si + # 0x0804aae9 in ?? () + # (gdb) p/x $eflags + # $4 = 0x202 + + self.assertEqual(0x202, uc.reg_read(U.x86_const.UC_X86_REG_EFLAGS)) + +if __name__ == '__main__': + regress.main()