-
Notifications
You must be signed in to change notification settings - Fork 958
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simple assembly code involving syscalls does not get decompiled correctly #24
Comments
Thank you for your report. After we finish work related to open-sourcing, we will focus on improving the decompilation quality. I will definitely look into this pretty soon. |
Dissasembly |
Yah... Same Here.. Wrong Output.... Using Windows 7 32 bit |
When retdec does manage to decompile though, I find it better than hex-ray's. |
Output from the current // Address range: 0x8049000 - 0x8049030
int32_t _start(void) {
int32_t fd = open("/tmp/myfile", 66); // 0x8049014
write(fd, (int32_t *)"malicious payload here\n", 24);
exit(fd);
return 1;
} Regression tests added in avast/retdec-regression-tests@69a2f3f. |
Code
Build and run
Retdec output
I'm not experienced in low level programming, but it seems like, that the C code does not reflect what is going on...
Maybe it is confused by storing data in .text section?
The text was updated successfully, but these errors were encountered: