Implement an armv6-none-eabi-elf parser (to flipjump code)
Opened this issue · 0 comments
tomhea commented
Take a look at the riscv files under src/riscv2fj/ :
riscv2fj.py parser-script which resulted in the jmp.fj, ops.fj, mem.fj files.
The idea is to make a script that gets an elf file, and for every loaded section - addresses it (and for code sections - writes the code for them).
The result of this script is a working (yet to be compiled) flip-jump code.
For example, the fj code needs to first jump to the address in code-address 4 (where the reset-vector-entry is found).