unicorn-engine / unicorn

Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
http://www.unicorn-engine.org
GNU General Public License v2.0
7.67k stars 1.35k forks source link

How to debug or turn off dynamic code snippets #2013

Closed 1034063174 closed 1 month ago

1034063174 commented 2 months ago

In one of my runs, when executing the "shl dword ptr ss:[rsp+rcx*1-0x5D], cl" instruction, the cc_src in it is somehow equal to eip. This causes the calculated eflags to be wrong. When I tried to debug it, I found that the relevant code is dynamic code(Just like in the picture). How can I debug the relevant code of unicorn? Should I look at the assembly of the dynamic code line by line, or is there any other better way? Sorry, this question may be stupid. 1727319023745 1727319629171

1034063174 commented 2 months ago

To add, I use vs2022 on windows and unicorn to simulate x86_64

wtdcode commented 2 months ago

dup of #1717

wtdcode commented 1 month ago

Closing.