Skip to content
Switch branches/tags

Latest commit

Add support for the encls, enclu and enclv instructions as described by chapter 41 "SGX Instruction References" in volume 3D of the Intel 64 and IA-32 Architectures Software Developer's Manual. These are used in supervisor mode, user mode and VMM mode respectively.

These instructions are somewhat similar to cpuid, in that they have leaf functions that can be specified through the eax register. However, unlike cpuid, the ebx, ecx and edx can both be used as inputs and outputs depending on the specific leaf function.

While Intel SGX is usable on a select set of Intel CPUs, it is usable both in 32-bit and 64-bit mode on those CPUs.

The encls, enclu, enclv instructions are two-byte opcodes with the ModRM.reg field encoding the exact opcode. Since all four registers can be used as both implicit destination as well implicit source registers, this instruction takes extra operands, i.e. mrm and xop.

This PR is as follows:

 - Implement encls, enclu and enclv in the decoder for x86.
 - Add INSTR_CREATE macros for encls, enclu and enclv.
 - Add test cases for encls, enclu and enclv.
 - Fix comment for comment for cpuid describing that it uses 2 implicit sources and 4 implicit destinations instead to match the 4 implicit source/destination of encls/enclu/enclv.

Git stats


Failed to load latest commit information.


DynamoRIO logo

About DynamoRIO

DynamoRIO is a runtime code manipulation system that supports code transformations on any part of a program, while it executes. DynamoRIO exports an interface for building dynamic tools for a wide variety of uses: program analysis and understanding, profiling, instrumentation, optimization, translation, etc. Unlike many dynamic tool systems, DynamoRIO is not limited to insertion of callouts/trampolines and allows arbitrary modifications to application instructions via a powerful IA-32/AMD64/ARM/AArch64 instruction manipulation library. DynamoRIO provides efficient, transparent, and comprehensive manipulation of unmodified applications running on stock operating systems (Windows, Linux, or Android) and commodity IA-32, AMD64, ARM, and AArch64 hardware. Mac OSX support is in progress.

Existing DynamoRIO-based tools

DynamoRIO is the basis for some well-known external tools:

Tools built on DynamoRIO and available in the release package include:

  • The memory debugging tool Dr. Memory
  • The tracing and analysis framework drmemtrace with multiple tools that operate on both online (with multi-process support) and offline instruction and memory address traces:
  • The legacy processor emulator drcpusim
  • The "strace for Windows" tool drstrace
  • The code coverage tool drcov
  • The library tracing tool drltrace
  • The memory address tracing tool memtrace (drmemtrace's offline traces are faster with more surrounding infrastructure, but this is a simpler starting point for customized memory address tracing)
  • The memory value tracing tool memval
  • The instruction tracing tool instrace (drmemtrace's offline traces are faster with more surrounding infrastructure, but this is a simpler starting point for customized instruction tracing)
  • The basic block tracing tool bbbuf
  • The instruction counting tool inscount
  • The dynamic fuzz testing tool Dr. Fuzz
  • The disassembly tool drdisas
  • And more, including opcode counts, branch instrumentation, etc.: see \ref API_samples.

Building your own custom tools

DynamoRIO's powerful API abstracts away the details of the underlying infrastructure and allows the tool builder to concentrate on analyzing or modifying the application's runtime code stream. API documentation is included in the release package and can also be browsed online. Slides from our past tutorials are also available.

Downloading DynamoRIO

DynamoRIO is available free of charge as a binary package for both Windows and Linux. DynamoRIO's source code is available primarily under a BSD license.

Obtaining Help

Use the discussion list to ask questions.

To report a bug, use the issue tracker.

See also the DynamoRIO home page: