cea-sec / miasm

Reverse engineering framework in Python
https://miasm.re/
GNU General Public License v2.0
3.5k stars 474 forks source link

Cannot Disasm STLR instruction #1349

Open kennethblite opened 3 years ago

kennethblite commented 3 years ago

[WARNING ]: cannot disasm (guess) at 43C4 [WARNING ]: cannot disasm at 43C4

0x43C4: STLR WZR, W9, [X8] arm aarch64 binary. I opened a similar ticket for LDAR. But wasn't able to test the STLR component until now. My apologies.

kennethblite commented 3 years ago

Link to previous ticket. https://github.com/cea-sec/miasm/issues/1344#issue-781460545

serpilliere commented 3 years ago

Hi @kennethblite Have you got the bytes for the stlr instruction to test it ?

kennethblite commented 3 years ago

sure thing. 09 FD 9F 88 : STLR WZR, W9, [X8] 28 FD 9F 88 : STLR WZR, W8, [X9] 00 FD 9F 88 : STLR WZR, W0, [X8] 0E FD 9F 88 : STLR WZR, W14, [X8] Hope that helps!