1
0
mirror of https://github.com/bitdefender/bddisasm.git synced 2025-01-03 11:50:55 +00:00
bddisasm/inc
Andrei Vlad LUTAS 9ff2543660 Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions.
Moved the CET test cases in dedicated folders.
Improved shadow-stack operand reporting - a distinction can be made between push/pop shadow stack accesses, and other shadow stack accesses.
A new field is now present in the memory information - the shadow stack access type, which indicates: explicit access, implicit via SSP, implicit push/pop via SSP or implicit via IA32_PL0_SSP.
2020-07-21 22:29:59 +03:00
..
bdshemu Initial commit. 2020-07-21 11:19:18 +03:00
bddisasm.h Added the Shadow Stack Pointer operand to the SYSCALL and SYSEXIT instructions. 2020-07-21 22:29:59 +03:00
constants.h Initial commit. 2020-07-21 11:19:18 +03:00
cpuidflags.h Initial commit. 2020-07-21 11:19:18 +03:00
disasmstatus.h Initial commit. 2020-07-21 11:19:18 +03:00
disasmtypes.h Initial commit. 2020-07-21 11:19:18 +03:00
registers.h Initial commit. 2020-07-21 11:19:18 +03:00
version.h Fixed several issues with CET instructions specification - shadow stack and shadow stack pointer implicit operands were missing from SETSSBSY instruction, and flags access was missing from them. 2020-07-21 17:36:19 +03:00