miasm
Reverse engineering framework
testqemu64 Namespace Reference

Functions

def parse_fmt (s)
 
def xxx___printf_chk (jitter)
 
def xxx_puts (jitter)
 

Variables

 stdout = stdout.buffer
 
int nb_tests = 1
 
 parser = Sandbox_Linux_x86_64.parser(description="ELF sandboxer")
 
 help
 
 options = parser.parse_args()
 
 expected = open(options.expected)
 
 loc_db = LocationDB()
 
 sb = Sandbox_Linux_x86_64(loc_db, options.filename, options, globals())
 
 addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value
 
 FS
 

Function Documentation

◆ parse_fmt()

def testqemu64.parse_fmt (   s)
Here is the caller graph for this function:

◆ xxx___printf_chk()

def testqemu64.xxx___printf_chk (   jitter)
Tiny implementation of printf_chk
Here is the call graph for this function:

◆ xxx_puts()

def testqemu64.xxx_puts (   jitter)
#include <stdio.h>
int puts(const char *s);

writes the string s and a trailing newline to stdout.

Variable Documentation

◆ addr

testqemu64.addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value

◆ expected

testqemu64.expected = open(options.expected)

◆ FS

testqemu64.FS

◆ help

testqemu64.help

◆ loc_db

testqemu64.loc_db = LocationDB()

◆ nb_tests

int testqemu64.nb_tests = 1

◆ options

testqemu64.options = parser.parse_args()

◆ parser

testqemu64.parser = Sandbox_Linux_x86_64.parser(description="ELF sandboxer")

◆ sb

testqemu64.sb = Sandbox_Linux_x86_64(loc_db, options.filename, options, globals())

◆ stdout

testqemu64.stdout = stdout.buffer