mirror of
https://github.com/capstone-engine/capstone.git
synced 2024-11-26 23:10:32 +00:00
3a2cd3c331
* Fix CID 508418 - Uninitialized struct * Fix CID 509089 - Fix OOB read and write * Fix CID 509088 - OOB. Also adds tests and to ensure no OOB access. * Fix CID 509085 - Resource leak. * Fix CID 508414 and companions - Using undefined values. * Fix CID 508405 - Use of uninitialized value * Remove unnecessary and badly implemented dev fuzz code. * Fix CID 508396 - Uninitialzied variable. * Fix CID 508393, 508365 -- OOB read. * Fix CID 432207 - OVerlapping memory access. * Remove unused functions * Fix CID 432170 - Overlapping memory access. * Fix CID 166022 - Check for negative index * Let strncat not depend n src operand. * Fix 509083 and 509084 - NULL dereference * Remove duplicated code. * Initialize sysop * Fix resource leak * Remove unreachable code. * Remove duplicate code. * Add assert to check return value of cmoack * Fixed: d should be a signed value, since it is checked against < 0 * Add missing break. * Add NULL check * Fix signs of binary search comparisons. * Add explicit cast of or result * Fix correct scope of case. * Handle invalid integer type. * Return UINT_MAX instead of implicitly casted -1 * Remove dead code * Fix type of im * Fix type of d * Remove duplicated code. * Add returns after CS_ASSERTS * Check for len == 0 case. * Ensure shift operates on uint64 * Replace strcpy with strncpy. * Handle edge cases for 32bit rotate * Fix some out of enum warnings * Replace a strcpy with strncpy. * Fix increment of address * Skip some linting * Fix: set instruction id * Remove unused enum * Replace the last usages of strcpy with SStream functions. * Increase number of allowed AArch64 operands. * Check safety of incrementing t the next operand. * Fix naming of operand * Update python constants * Fix option setup of CS_OPT_DETAIL_REAL * Document DETAIL_REAL has to be used with CS_OPT_ON. * Run Coverity scan every Monday. * Remove dead code * Fix OOB read * Rename macro to reflect it is only used with sstreams * Fix rebase issues |
||
---|---|---|
.. | ||
cstool_aarch64.c | ||
cstool_alpha.c | ||
cstool_arm.c | ||
cstool_bpf.c | ||
cstool_evm.c | ||
cstool_hppa.c | ||
cstool_loongarch.c | ||
cstool_m68k.c | ||
cstool_m680x.c | ||
cstool_mips.c | ||
cstool_mos65xx.c | ||
cstool_powerpc.c | ||
cstool_riscv.c | ||
cstool_sh.c | ||
cstool_sparc.c | ||
cstool_systemz.c | ||
cstool_tms320c64x.c | ||
cstool_tricore.c | ||
cstool_wasm.c | ||
cstool_x86.c | ||
cstool_xcore.c | ||
cstool.c | ||
cstool.h | ||
getopt.c | ||
getopt.h | ||
Makefile | ||
README |
This directory contains cstool of Capstone Engine. Cstool is a command-line tool to disassemble assembly hex-string. For example, to decode a hexcode string for Intel 32bit, run: $ cstool x32 "90 91" 0 90 nop 1 91 xchg eax, ecx Cstool disassembles the input and prints out the assembly instructions. On each line, the first column is the instruction offset, the second column is opcodes, and the rest is the instruction itself. Cstool is flexible enough to accept all kind of hexcode format. The following inputs have the same output with the example above. $ cstool x32 "0x90 0x91" $ cstool x32 "\x90\x91" $ cstool x32 "90,91" $ cstool x32 "90;91" $ cstool x32 "90+91" $ cstool x32 "90:91" To print out instruction details, run Cstool with -d option, like below. $ cstool -d x32 "01 d8" 0 01d8 add eax, ebx Prefix:0x00 0x00 0x00 0x00 Opcode:0x01 0x00 0x00 0x00 rex: 0x0 addr_size: 4 modrm: 0xd8 disp: 0x0 sib: 0x0 op_count: 2 operands[0].type: REG = eax operands[0].size: 4 operands[0].access: READ | WRITE operands[1].type: REG = ebx operands[1].size: 4 operands[1].access: READ Registers read: eax ebx Registers modified: eflags eax EFLAGS: MOD_AF MOD_CF MOD_SF MOD_ZF MOD_PF MOD_OF To see all the supported options, run ./cstool