Skip to content

Commit ce4618a

Browse files
authored
[ASan][windows] Recognize movzx r11d, BYTE PTR [rdx] in interception_win (#111638)
The instruction is present in some library in the 24H2 update for Windows 11: ==8508==interception_win: unhandled instruction at 0x7ff83e193a40: 44 0f b6 1a 4c 8b d2 48 This could be generalized, but getting all the ModR/M byte combinations right is tricky. Many other classes of instructions handled in this file could use some generalization too.
1 parent 3a30955 commit ce4618a

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

compiler-rt/lib/interception/interception_win.cpp

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -768,6 +768,7 @@ static size_t GetInstructionSize(uptr address, size_t* rel_offset = nullptr) {
768768
}
769769

770770
switch (*(u32*)(address)) {
771+
case 0x1ab60f44: // 44 0f b6 1a : movzx r11d, BYTE PTR [rdx]
771772
case 0x24448b48: // 48 8b 44 24 XX : mov rax, QWORD ptr [rsp + XX]
772773
case 0x246c8948: // 48 89 6C 24 XX : mov QWORD ptr [rsp + XX], rbp
773774
case 0x245c8948: // 48 89 5c 24 XX : mov QWORD PTR [rsp + XX], rbx

0 commit comments

Comments
 (0)