=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-122- R_386_TLS_GD_PUSH = 25, /* Tag for pushl in GD TLS code */ edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h:123: R_386_TLS_GD_CALL = 26, /* Relocation for call to __tls_get_addr() */ edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-124- R_386_TLS_GD_POP = 27, /* Tag for popl in GD TLS code */ ############################################## edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-126- R_386_TLS_LDM_PUSH = 29, /* Tag for pushl in LDM TLS code */ edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h:127: R_386_TLS_LDM_CALL = 30, /* Relocation for call to __tls_get_addr() in LDM code */ edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-128- R_386_TLS_LDM_POP = 31, /* Tag for popl in LDM TLS code */ ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-742- auto &bytes = parts[1]; edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:743: auto &disasm = parts[2]; edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-744- addr = addr.trimmed().toUpper(); ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-748- bytes = bytes.trimmed().toUpper(); edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:749: disasm = disasm.trimmed().replace(QRegExp(" +"), " "); edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-750- ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-758- for (unsigned i = 3; i < parts.size(); ++i) edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:759: disasm += " " + parts[i]; edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-760-#endif ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-861- auto &bytes = parts[1]; edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:862: auto &disasm = parts[2]; edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-863- ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-948- auto bytes = expectedFormat.cap(3).trimmed(); edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:949: const auto disasm = expectedFormat.cap(1).trimmed().replace(QRegExp(" +"), " "); edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-950- const auto result = addr + " " + bytes + " " + disasm; ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-990- EV_CURRENT, edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:991: Elf32_Addr(address.toUint()), // entry point edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-992- offsetof(FileData, programHeader), // program header table offset ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1003- edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1004: const edb::value32 insnAddr(address); edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1005- ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1015- 0, // start of file is beginning of segment edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1016: Elf32_Addr(fileAddr.toUint()), // vaddr of the segment edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1017- 0, // paddr of the segment, irrelevant ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1027- SHF_ALLOC | SHF_EXECINSTR, edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1028: Elf32_Addr(address.toUint()), edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1029- insnAddr - fileAddr, // section offset in file edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1030: Elf32_Addr(bytes.size()), edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1031- SHN_UNDEF, // sh_link ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1070- EV_CURRENT, edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1071: Elf64_Addr(address.toUint()), // entry point edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1072- offsetof(FileData, programHeader), // program header table offset ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1083- edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1084: const edb::value64 insnAddr(address); edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1085- // aligned on page boundary and one page before ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1095- 0, // start of file is beginning of segment edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1096: Elf64_Addr(fileAddr.toUint()), // vaddr of the segment edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1097- 0, // paddr of the segment, irrelevant ############################################## edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1106- SHF_ALLOC | SHF_EXECINSTR, edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1107: Elf64_Addr(address.toUint()), edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1108- insnAddr - fileAddr, // section offset in file ############################################## edb-debugger-1.2.0/plugins/ODbgRegisterView/arch/x86-generic/x86Groups.cpp-125- char fenv[28]; edb-debugger-1.2.0/plugins/ODbgRegisterView/arch/x86-generic/x86Groups.cpp:126: asm volatile("fldz\n" edb-debugger-1.2.0/plugins/ODbgRegisterView/arch/x86-generic/x86Groups.cpp-127- "fstp %%st(0)\n" ############################################## edb-debugger-1.2.0/plugins/FasLoader/.gitignore-46-*.orig edb-debugger-1.2.0/plugins/FasLoader/.gitignore:47:# temporary files to analyze changes in asm files edb-debugger-1.2.0/plugins/FasLoader/.gitignore-48- ############################################## edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-221- */ edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:222:void seek_addr(QFile &file, edb::address_t address) { edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-223- if (address <= UINT64_MAX / 2) { ############################################## edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-294- if (readOnlyMemFile_) { edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:295: seek_addr(*readOnlyMemFile_, address); edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-296- read = readOnlyMemFile_->read(ptr, 1); ############################################## edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-312- if (readOnlyMemFile_) { edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:313: seek_addr(*readOnlyMemFile_, address); edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-314- read = readOnlyMemFile_->read(ptr, len); ############################################## edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-404- if (readWriteMemFile_) { edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:405: seek_addr(*readWriteMemFile_, address); edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-406- written = readWriteMemFile_->write(reinterpret_cast<const char *>(buf), len); ############################################## edb-debugger-1.2.0/plugins/HeapAnalyzer/DialogHeap.cpp-487- edb-debugger-1.2.0/plugins/HeapAnalyzer/DialogHeap.cpp:488: edb::address_t test_addr(0); edb-debugger-1.2.0/plugins/HeapAnalyzer/DialogHeap.cpp-489- if (IProcess *process = edb::v1::debugger_core->process()) { ############################################## edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-3- <assembler name="yasm" arch="x86"> edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml:4: <executable command_line="/usr/bin/yasm -f bin %IN% -o %OUT%" extension="asm" /> edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-5- <template> ############################################## edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-24- <assembler name="nasm" arch="x86"> edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml:25: <executable command_line="/usr/bin/nasm -f bin %IN% -o %OUT%" extension="asm" /> edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-26- <template> ############################################## edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-45- <assembler name="fasm" arch="x86"> edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml:46: <executable command_line="fasm %IN% %OUT%" extension="asm" /> edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-47- <template> ############################################## edb-debugger-1.2.0/plugins/Assembler/DialogAssembler.cpp-234- edb-debugger-1.2.0/plugins/Assembler/DialogAssembler.cpp:235: qDebug() << "RUNNING ASM TOOL: " << program << arguments; edb-debugger-1.2.0/plugins/Assembler/DialogAssembler.cpp-236- ############################################## edb-debugger-1.2.0/src/FloatX.cpp-36-// NOTE(eteran): this thin wrapper function make look pointless... and it REALLY does. edb-debugger-1.2.0/src/FloatX.cpp:37:// However, I could not get plugins to be able to see the functions defined in .asm files edb-debugger-1.2.0/src/FloatX.cpp-38-// unless I wrapped them in a concrete function like this. It's dumb, but it works ############################################## edb-debugger-1.2.0/CHANGELOG-1182- edb-debugger-1.2.0/CHANGELOG:1183:* Added some regression tests to edisassm. Unfortunately nasm and edisassm edb-debugger-1.2.0/CHANGELOG-1184- disagree on some syntax points and likes to re-order expressions sometimes, ############################################## edb-debugger-1.2.0/CHANGELOG-1766- edb-debugger-1.2.0/CHANGELOG:1767:* Fixed crashable bug in QDisassembly view, involving libdisasm, libdisasm will edb-debugger-1.2.0/CHANGELOG-1768- do a double free if "x86_oplist_free" is called on invalid opcodes, this is ############################################## edb-debugger-1.2.0/CHANGELOG-2014- edb-debugger-1.2.0/CHANGELOG:2015:* Isolated libdisasm calls to a single part of the code, this allowed edb-debugger-1.2.0/CHANGELOG-2016- consolidation of common functions as well as creating a central point to edb-debugger-1.2.0/CHANGELOG:2017: replace the code as I feel that libdisasm will likely be dropped in a later edb-debugger-1.2.0/CHANGELOG-2018- version. ############################################## edb-debugger-1.2.0/CHANGELOG-2049- edb-debugger-1.2.0/CHANGELOG:2050:* Corrected bug in libdisasm which caused the instruction 8e e8 to disassemble edb-debugger-1.2.0/CHANGELOG-2051- incorrectly as "mov ds, ax" instead of the correct "mov gs, ax". ############################################## edb-debugger-1.2.0/CHANGELOG-2159- edb-debugger-1.2.0/CHANGELOG:2160:* Removed parts of libdisasm which aren't needed for libdisasm.a to build edb-debugger-1.2.0/CHANGELOG-2161- this cuts the download size by 75%! ############################################## edb-debugger-1.2.0/CHANGELOG-2165- edb-debugger-1.2.0/CHANGELOG:2166:* Removed parts of libdisasm from source tree that aren't related to the build edb-debugger-1.2.0/CHANGELOG-2167- which cut the tarball down to a quarter of the size :)