1
0
mirror of https://github.com/bitdefender/bddisasm.git synced 2024-12-28 17:08:08 +00:00
bddisasm/bddisasm_test/cet
Andrei Vlad LUTAS 9ff2543660 Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions.
Moved the CET test cases in dedicated folders.
Improved shadow-stack operand reporting - a distinction can be made between push/pop shadow stack accesses, and other shadow stack accesses.
A new field is now present in the memory information - the shadow stack access type, which indicates: explicit access, implicit via SSP, implicit push/pop via SSP or implicit via IA32_PL0_SSP.
2020-07-21 22:29:59 +03:00
..
cet_32 Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions. 2020-07-21 22:29:59 +03:00
cet_32.asm Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions. 2020-07-21 22:29:59 +03:00
cet_32.result Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions. 2020-07-21 22:29:59 +03:00
cet_64 Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions. 2020-07-21 22:29:59 +03:00
cet_64.asm Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions. 2020-07-21 22:29:59 +03:00
cet_64.result Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions. 2020-07-21 22:29:59 +03:00