miasm
Reverse engineering framework
trace Namespace Reference

Classes

class  ESETrackMemory
 

Functions

def instr_hook (jitter)
 

Variables

int instr_count = 0
 
 parser = Sandbox_Linux_arml.parser(description="Tracer")
 
 help
 
 options = parser.parse_args()
 
 SymbExecClass
 
 jitter
 
 loc_db = LocationDB()
 
 sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals())
 
 jit_maxline
 
 max_exec_per_call
 
 exec_cb
 
 start_time = time.time()
 
 stop_time = time.time()
 

Detailed Description

This example demonstrates two instrumentation possibility:
 - instrumentation executed at each instruction
 - instrumentation on jitter behavior (here, memory tracking)

Note: for better performance, one can also extend Codegen to produce
instrumentation at the C / LLVM level

Function Documentation

◆ instr_hook()

def trace.instr_hook (   jitter)

Variable Documentation

◆ exec_cb

trace.exec_cb

◆ help

trace.help

◆ instr_count

int trace.instr_count = 0

◆ jit_maxline

trace.jit_maxline

◆ jitter

trace.jitter

◆ loc_db

trace.loc_db = LocationDB()

◆ max_exec_per_call

trace.max_exec_per_call

◆ options

trace.options = parser.parse_args()

◆ parser

trace.parser = Sandbox_Linux_arml.parser(description="Tracer")

◆ sb

trace.sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals())

◆ start_time

trace.start_time = time.time()

◆ stop_time

trace.stop_time = time.time()

◆ SymbExecClass

trace.SymbExecClass