This class is the main part of tracing and parsing part. It provides every parts very specific to an architecture, an OS, ...

Hierarchy

Implements

Constructors

Properties

_do_ft: any = null
_tids: number[] = []
coverage?: CoverageAgent
debug: DebugOptions = ...
emulator: boolean
filter_name: string[] = []
filter_num: string[] = []
followFork: boolean = false
followThread: boolean = false
hook: InterruptorHooks = ...
hvc_hk: any = {}
irq_hk: any = {}
loadCtr: number = 0
modules: Module[] = []
onStart: any = ...

To use with startOnLoad() A callback function executed when the modules specified in "startOnLoad" are loaded

Field

output: OutputOpts = ...
pid: number = -1

PID of process to stalk, when followFork is enabled or on attach

Field

ranges: any = ...
scope: ScopeMap
smc_hk: any = {}
svc_hk: any = {}
tid: number = -1
types: any = {}
uid: number = 0
FLAVOR_DXC: string = "dxc"
FLAVOR_STRACE: string = "strace"

Methods

  • To retrieve litteral ErrorCode from the numeric value inside a list of error code.

    Parameters

    • pErrRet: number

      Error code

    • pErrEnum: any[]

      The list of error codes

    Returns any

  • To parse memory according to the structure defined by pFormat

    Parameters

    • pContext: any
    • pFormats: TypedData[]
    • pPointer: NativePointer
    • pSeparator: string = "\n"
    • pAlign: boolean = false

    Returns string

  • To setup "trace" hook is the current instruction is an interruption or follow immediately one.

    This function is called by Stalker's event listener for each instruction

    Parameters

    • pStalkerInterator: StalkerX86Iterator | StalkerArmIterator | StalkerThumbIterator | StalkerArm64Iterator

      The stalker iterator

    • pInstruction: any

      The current instruction

    • pExtra: any

      Some extra options

    Returns number

    Method

  • Method executed before the syscall interruption if the syscall is not excluded.

    This method is responsible of argument parsing, and work as described below :

      1. read syscall number from a register according to @link{ SyscallCallingConvention }
      1. find description of corresponding syscall
      1. save the type of return value from description into hook context

    Parameters

    • pContext: any

      CPU context

    • pHookCfg: any = null

      Addition hook configuration

    Returns void

    Method

  • Method executed AFTER the syscall interruption if the syscall is not excluded

    This method does several operations :

    • print the syscall trace
    • parse return value
    • process return value and correlating

    Parameters

    • pContext: any
    • pHookCfg: any = null

    Returns void

    Method

Generated using TypeDoc