From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1Jy2FH-0002al-Gn for qemu-devel@nongnu.org; Mon, 19 May 2008 06:05:31 -0400 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1Jy2FF-0002Z0-O7 for qemu-devel@nongnu.org; Mon, 19 May 2008 06:05:30 -0400 Received: from [199.232.76.173] (port=60426 helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1Jy2FF-0002YY-GB for qemu-devel@nongnu.org; Mon, 19 May 2008 06:05:29 -0400 Received: from www.seclab.tuwien.ac.at ([128.130.60.29]:3726 helo=mail.seclab.tuwien.ac.at) by monty-python.gnu.org with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.60) (envelope-from ) id 1Jy2FF-0003zz-57 for qemu-devel@nongnu.org; Mon, 19 May 2008 06:05:29 -0400 Received: from ckol.seclab.tuwien.ac.at (ckol.seclab.tuwien.ac.at [128.130.60.51]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.seclab.tuwien.ac.at (Postfix) with ESMTP id 7341B31967 for ; Mon, 19 May 2008 12:03:38 +0200 (CEST) From: Clemens Kolbitsch Date: Mon, 19 May 2008 12:05:27 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200805191205.27881.ck@iseclab.org> Subject: [Qemu-devel] x86 opcode length Reply-To: qemu-devel@nongnu.org List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Hi! I'm working on a project that needs to copy out the currently executing x86 opcode (I have disabled block chaining for this) under certain conditions... is there a way to figure out, exactly how long the original opcode of the TB was (i.e. including prefixes, parameters, etc.)? I know that the information is encoded implicitly in the disas_insn function... but maybe there is a function somewhere that does exactly this or someone of you has a handy table/documentation for this. Thx! Clemens