We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ARM64 authenticated branches are missing register usages:
./cstool -d arm64 '5F 08 1F D6' 0 5f 08 1f d6 braaz x2 ID: 54 (braaz) op_count: 1 operands[0].type: REG = x2 // missing: operands[0].access: READ Groups: jump pointer authentication $ ./cstool -d arm64 '11 0A 1F D7' 0 11 0a 1f d7 braa x16, x17 ID: 53 (braa) op_count: 2 operands[0].type: REG = x16 // same operands[1].type: REG = x17 // same Groups: jump pointer authentication
Similarly, the regs_access() / regs_read API don't report any registers:
regs_access() / regs_read
>>> from capstone import * >>> cs=Cs(CS_ARCH_ARM64, CS_MODE_LITTLE_ENDIAN); cs.detail=True >>> inst=next(cs.disasm(bytes.fromhex( '5F 08 1F D6'), 0)) >>> inst.regs_access() ([], []) >>> inst.regs_read []
Tested on the next branch.
next
The text was updated successfully, but these errors were encountered:
Fix for missing register usages on ARM64 authenticated branches (issue …
80a52b3
…capstone-engine#1975)
No branches or pull requests
ARM64 authenticated branches are missing register usages:
Similarly, the
regs_access() / regs_read
API don't report any registers:Tested on the
next
branch.The text was updated successfully, but these errors were encountered: