From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 106900 invoked by alias); 4 Aug 2019 16:14:46 -0000 Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org Received: (qmail 106892 invoked by uid 89); 4 Aug 2019 16:14:45 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=4.4 required=5.0 tests=AWL,BAYES_05,FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=ham version=3.3.1 spammy=took, facing, challenge, disassembling X-HELO: mail-ot1-f44.google.com Received: from mail-ot1-f44.google.com (HELO mail-ot1-f44.google.com) (209.85.210.44) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Sun, 04 Aug 2019 16:14:44 +0000 Received: by mail-ot1-f44.google.com with SMTP id s20so17460413otp.4 for ; Sun, 04 Aug 2019 09:14:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=3FxRDMje5DcLnPN5wrdqYi8SiWdJBQ0czWzpvVp+EN0=; b=NTYTvqXl3wxm4irNr/K7MePLmjavW/v0qQOFGL/CNJx8oBUfYpp4XChOlXd9X4UH5W 7X09k/KyIKag52FCfbkJkjX6YCZx756KMnuzYfoEAY0QKq6fM8v/c6iK5cilxq6C+zwT bEAD6UJXXneXjI+mnvkxbvn7oDKu2IBSBVMcioqEMX9EKwjyyRmJV79jvmC4XGGCmH9p ovsMUreRmdeuQS3Y65s9BiKh7AJXY1/hRbbZsmrRpOOURtuJj0vAdphoX6D+gEKkGyVM FxlBhS4pHC46XlX5A4SXZmRB9aPTFseyJTFLR/4JIP8c9E9tsQ9COICyGh8bVZdK557g lFkw== MIME-Version: 1.0 From: krishnan gosakan Date: Sun, 04 Aug 2019 16:14:00 -0000 Message-ID: Subject: Facing challenge in making some changes in GDB for my personal project To: gdb@sourceware.org Content-Type: text/plain; charset="UTF-8" X-IsSubscribed: yes X-SW-Source: 2019-08/txt/msg00000.txt.bz2 Hi, This is my first message in this mailing group. I am pretty new to gdb code base. I am thinking of implementing something similar to findcrypt in IDA pro in GDB. I first tried to script it in python but it took so long that it is impractical. So, I decided to get the GDB source and make a few modifications such that I can add a new command(like run,step etc..) which does the same. This command has two parts: It should do a single step execution. After each step, I should disassemble the current instruction and find if any crypto constants are used. I am facing difficulty in disassembling the instructions. As far as I analysed the source code, there is no option for returning the disassembled information as some kind of object to caller. All that is available is functions which can print the disassembled instruction. So, I would like to know how I could get the disassembled instruction as some kind of object, which I can use for future analysis. Thank you in advance for any help. Regards, G.Krishnan.