mirror of
https://github.com/bitdefender/bddisasm.git
synced 2025-02-17 00:42:00 +00:00
![]() Moved the CET test cases in dedicated folders. Improved shadow-stack operand reporting - a distinction can be made between push/pop shadow stack accesses, and other shadow stack accesses. A new field is now present in the memory information - the shadow stack access type, which indicates: explicit access, implicit via SSP, implicit push/pop via SSP or implicit via IA32_PL0_SSP. |
||
---|---|---|
.. | ||
cpuid.dat | ||
flags.dat | ||
modes.dat | ||
prefixes.dat | ||
table_0F_3A.dat | ||
table_0F_38.dat | ||
table_0F.dat | ||
table_3dnow.dat | ||
table_base.dat | ||
table_evex1.dat | ||
table_evex2.dat | ||
table_evex3.dat | ||
table_fpu.dat | ||
table_vex1.dat | ||
table_vex2.dat | ||
table_vex3.dat | ||
table_xop.dat |