Andrei KISARI
ee235fa5de
Modified the python-disassembler-wraper to be able to be installed using pip.
2020-08-04 13:57:03 +03:00
vlutas
ad128fd72a
Merge pull request #13 from ianichitei/master
...
Use GitHub actions C/C++ workflow
2020-07-31 20:16:29 +03:00
Anichitei Ionel-Cristinel
a496ab16e5
Rename c-cpp.yml to ci.yml
...
It currently does more than just the C/C++ build
2020-07-31 18:21:31 +03:00
Anichitei Ionel-Cristinel
d06fe6cf56
Don't build bdshemu_fuzzer
...
It currently expects AFL to be installed on the build machine. I should change that.
2020-07-31 18:18:59 +03:00
Anichitei Ionel-Cristinel
f734bc600b
Try to build bdshemu_fuzz
...
We build it with gcc just to ensure that is stays up to date when bddisasm or bdshemu are changed
2020-07-31 18:16:41 +03:00
Anichitei Ionel-Cristinel
053e105fd2
Skip the build in certain situations
2020-07-31 18:12:55 +03:00
Anichitei Ionel-Cristinel
c0e7a43db3
Disable disasmtool build
...
I can't figure out why it can not find the dependency it needs
2020-07-31 18:08:24 +03:00
Anichitei Ionel-Cristinel
4d077a75eb
Try to fix disasmtool build
2020-07-31 18:05:45 +03:00
Anichitei Ionel-Cristinel
079fbb8802
Rebuild disasmtool Windows
2020-07-31 18:02:30 +03:00
Anichitei Ionel-Cristinel
6e8937a71b
Fix jobnames
2020-07-31 17:59:54 +03:00
Anichitei Ionel-Cristinel
8c92cccdbb
Run the Windows build as well
2020-07-31 17:58:48 +03:00
Anichitei Ionel-Cristinel
1184a314a1
Install setuptools before building pydis
2020-07-31 17:29:10 +03:00
Anichitei Ionel-Cristinel
374dd532e6
Try to build pydis
2020-07-31 17:25:43 +03:00
Anichitei Ionel-Cristinel
15629ff302
Clone rapidjson into a dedicated directory
2020-07-31 17:17:46 +03:00
Anichitei Ionel-Cristinel
21d20ba584
Try to build disasmtool_lix
...
This should clone Tencent/rapidjson, build it, install it, and then build disasmtool_lix
2020-07-31 17:15:50 +03:00
Anichitei Ionel-Cristinel
af8a0cc52f
.github/workflows: Add CI workflow
...
This should build bddisasm and bdshemu
2020-07-31 16:50:27 +03:00
Ionel-Cristinel ANICHITEI
c1e796625a
bdshemu_fuzz: Fix build
2020-07-30 12:31:39 +03:00
Andrei Vlad LUTAS
ed564dba32
Specifically flag multi-byte NOP operands as not-accessed.
...
New capability - bddisasm can now be instructed whether to decode some instructions as NOPs are as MPX/CET/CLDEMOTE. This is the case for instructions that are mapped onto the wide NOP space: in that case, an encoding might be NOP if the feature is off, but might be something else (even #UD) if the feature is on.
Added NdDecodeWithContext API - this becomes the base decode API; it received the input information filled in a ND_CONTEXT structure, whih has to be initialized only once, and can be reused across calls. The NdInitContext function must be used to initialize the context, as it ensures backwards compatibility by filling new options with default values.
Improvements to the README file.
2020-07-30 11:07:14 +03:00
Andrei Vlad LUTAS
4328dc4efa
Changed REG_xxx to NDR_xxx in docs too.
2020-07-29 11:26:07 +03:00
Andrei Vlad LUTAS
144baa5140
Renamed REG_* fields to NDR_*, so that we don't conflict with _GNU_SOURCES.
2020-07-29 11:05:27 +03:00
vlutas
02b7177b99
Merge pull request #10 from cbsirb/master
...
Small enhancements to the disamtool_lix
2020-07-28 17:04:22 +03:00
Cristian-Bogdan SIRB
2868b2afde
disasmtool_lix: Added the --extended parameter which shows the instructions info
2020-07-28 16:14:28 +03:00
Cristian-Bogdan SIRB
75702e9f0d
disasmtool_lix: Align the address part to the biggest one
...
This way, it will always be aligned when dumping instructions:
0 50 PUSH rax
...
10 50 PUSH rax
...
100 50 PUSH rax
2020-07-28 16:05:53 +03:00
Andrei Kisari
5e14a6f25c
Merge pull request #9 from cbsirb/master
...
Fix the disasmtool_lix build
2020-07-28 15:48:37 +03:00
Cristian-Bogdan SIRB
daa0d403a1
Fix the disasmtool_lix build
...
The build wasn't checking properly for the compiler (was checking for C, but
this is a CPP project).
Also added a few more compiler options for GCC 9 and Clang 10.
2020-07-28 15:15:53 +03:00
Ionel-Cristinel ANICHITEI
b0b7a67c8e
Add braces around the ND_INSTRUCTION.Operands initializer
2020-07-27 17:15:12 +03:00
Ionel-Cristinel ANICHITEI
a20db3ce54
Fix constants.h include path
2020-07-27 17:04:04 +03:00
Ionel-Cristinel ANICHITEI
11f1f548ff
Regenerate autogenerated files
2020-07-27 16:52:26 +03:00
Ionel-Cristinel ANICHITEI
049ecc0ab7
Don't use reserved identifiers for include guards
...
This fixes #5
2020-07-27 16:51:16 +03:00
Andrei KISARI
0d5d2a9625
Fixed include path.
2020-07-27 11:51:02 +03:00
Andrei KISARI
9d98a67c70
Added the 'nd_memset' implementation for pydis.
2020-07-27 11:43:41 +03:00
Andrei Vlad LUTAS
d622f56211
Added SERIAL flag to the SERIALIZE instruction.
...
CLWB memory operand is subject to load access checks, while CLDEMOTE does not access memory at all (similar to PREFETCH).
2020-07-25 20:32:06 +03:00
Andrei Vlad LUTAS
4b2f2aee66
Added dedicated Prefetch operand access type.
...
Internally, store the access type sepparately than the flags.
Dump conditional operand accesses with exi option too.
2020-07-25 17:16:35 +03:00
Andrei Vlad LUTAS
d11fe85599
Improved linear address computation in bdshemu.
2020-07-24 23:11:36 +03:00
Andrei Vlad LUTAS
6c248cc4c1
Handle Ignore ER bit in instruction attributes.
2020-07-23 18:05:19 +03:00
Andrei Vlad LUTAS
7ddf7e448a
Apply address size override to gla computation.
2020-07-23 16:19:08 +03:00
Ionel-Cristinel ANICHITEI
087ffbcf95
disasmtool_lix: Add missing instructions to ins_class_to_str
2020-07-23 15:54:05 +03:00
Andrei Vlad LUTAS
cfb0f97897
Truncate the output of a relative addressing if 0x67 prefix is used.
2020-07-23 15:31:05 +03:00
Andrei Vlad LUTAS
752bc626c4
Fixed RET with immediate - the immediate is not sign-extended.
...
Fixed VEX decoding in 32 bit mode - vex.vvvv bit 3 is simply ignored.
Fixed several FMA instructions decoding (L/W flag should be ignored).
Print the 64 bit immediate value in disassembly, instead of the raw immediate (note that the operand always contains the sign-extended, full immediate).
XBEGIN always uses 32/64 bit RIP size (0x66 does not affect its size).
Decode WBINVD even if it's preceded by 0x66/0xF2 prefixes.
Several mnemonic fixes (FXSAVE64, FXRSTOR64, PUSHA/PUSHAD...).
Properly decode VPERMIL2* instructions.
Fixed SSE register decoding when it is encoded in immediate.
Decode SCATTER instructions even though they use the VSIB index as source.
Some disp8 fixes (t1s -> t1s8/t1s16).
SYSCALL/SYSRET are decoded and executed in 32 bit compat modem, even though SDM states they are invalid.
RDPID uses 32/64 bit reg size, never 16.
Various other minor tweaks & fixes.
Re-generated the test files, and added some more, new tests.
2020-07-23 14:08:01 +03:00
Andrei Vlad LUTAS
52ed638c13
Fixed some typos.
...
Added SECURITY.md file.
2020-07-22 21:47:25 +03:00
Anichitei Ionel-Cristinel
08f4b31b7d
Merge pull request #2 from andreaswimmer/patch-1
...
Fix typo "Lighetweight" in README.md
2020-07-22 19:25:59 +03:00
andreaswimmer
0b7c9a84fe
Fix typo "Lighetweight" in README.md
2020-07-22 18:10:28 +02:00
Andrei Vlad LUTAS
960e9eaeee
disasmtool_lix dumper fix - dump cet_ss and cet_ibt.
2020-07-22 09:32:18 +03:00
Andrei Vlad LUTAS
94d7894fa5
Added the Shadow Stack Pointer operand to the SYSRET and SYSENTER instructions.
...
Regenrated CET test files, as the CPUID feature flag was split as per the last documentation into CET_SS and CET_IBT.
2020-07-22 09:15:29 +03:00
vlutas
3f385cc531
Merge pull request #1 from valkheim/fix-no-color
...
Fix disasmtool_lix no_color option
2020-07-22 08:55:10 +03:00
Andrei Vlad LUTAS
8392c97f97
Use the documented byte granularity for cache-line accesses.
...
Fixed CET CPUID feature flag - split into CET_SS and CET_IBT.
2020-07-22 00:47:46 +03:00
Charles Paulet
f936d0c020
Fix disasmtool_lix no_color option
2020-07-21 22:13:05 +02:00
Andrei Vlad LUTAS
9ff2543660
Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions.
...
Moved the CET test cases in dedicated folders.
Improved shadow-stack operand reporting - a distinction can be made between push/pop shadow stack accesses, and other shadow stack accesses.
A new field is now present in the memory information - the shadow stack access type, which indicates: explicit access, implicit via SSP, implicit push/pop via SSP or implicit via IA32_PL0_SSP.
2020-07-21 22:29:59 +03:00
Andrei Vlad LUTAS
811c3d0f7c
Fixed several issues with CET instructions specification - shadow stack and shadow stack pointer implicit operands were missing from SETSSBSY instruction, and flags access was missing from them.
2020-07-21 17:36:19 +03:00
Andrei Vlad LUTAS
efe359b506
Typo fixes in the instruction tables.
...
Added a reference to the git repo in the documentation.
2020-07-21 16:38:09 +03:00