Commit Graph

7 Commits

Author SHA1 Message Date
Lephenixnoir b20731c829 basic setup for running disassembly passes 2019-12-29 19:17:33 +01:00
Lephenixnoir 468495856d
implement more of the meat of the tool
* Separate OS and Target conceptually; now an OS is created on an
  existing target which must have ROM bound.
* Add a configuration file with a data library and description files
  which are automatically loaded at startup.
* As a first application, implement target descriptions. It is now
  possible (given the proper library) to type [fxos info fx@3.10] to get
  information on the fx OS version 3.10.
* Set up the pass infrastructure and the first few easy passes. This
  is still a Work In Progress and not yet called from the command-line.
* Improve the copy/move behavior of classes (C++ concerns).
* Add instruction metadata, which will make it easier to write actual
  useful analysis passes.
2019-12-28 17:18:13 +01:00
Lephenixnoir 8aaed3dd8c basic data structures for the disassembler 2019-12-20 19:33:41 +01:00
Lephenixnoir 5d63fb11e3
implement the abstract domain of relative constants 2019-12-20 11:17:09 +01:00
Lephenixnoir 8812886e58
basic stuff on the disassembler/interpreter, nothing serious yet 2019-12-16 22:14:02 +01:00
Lephenixnoir c9ecb855de
finish the base interfaces
* switch from File to Buffer to manage file contents
* boilerplate for a proprer command-line interface, and complete help
* add a notion of Addressable to avoid losing the source address of very
  information provided by the OS type
* use addressables in the AbstractMemory interface
* fully parse the header and footer of OSes
* bring [fxos info] to the level of the previous implementation
* make most of the OS attributes public
* use char* instead of void* for translation, since void* arithmetic
  triggers a hell of warnings in C++
2019-12-15 18:40:05 +01:00
Lephenixnoir d78f7bca10 initial system: instruction load, target creation
Contains basic stuff to start working:

* Loading files and assembly instruction descriptions
* Create a 64k-entry assembly decoding table
* Standard memory regions and information
* Create targets where files can be mapped at any addresses
* Load OSes and detect a few basic things
2019-12-14 22:33:57 +01:00