Skip to content

Latest commit

 

History

History
34 lines (23 loc) · 1.22 KB

File metadata and controls

34 lines (23 loc) · 1.22 KB

Plugin: tainted_instr

Summary

The tainted_instr plugin provides data about what instructions in a replay handle tainted data.

Arguments

  • summary: boolean. Determines whether full or summary information will be produced. In summary mode, tainted_instr just produces information about what instructions were tainted in each address space seen. In full mode, a log entry is written every time an instruction handling tainted data is executed, along with the callstack at that point. The logs for full mode can get rather large.

Dependencies

tainted_instr uses taint2 to track taint, and callstack_instr to provide callstack information whenever tainted branches are encountered.

APIs and Callbacks

None.

Example

To taint data from a file named foo.dat on Linux and then find out what instructions handle tainted data from that file, placing output into the pandalog foo.plog:

$PANDA_PATH/x86_64-softmmu/qemu-system-x86_64 -replay foo -panda osi \
    -panda osi_linux:kconf_group=debian-3.2.63-i686 \
    -panda syscalls2:profile=linux_x86 \
    -panda file_taint:filename=foo.dat \
    -panda tainted_instr \
    -pandalog foo.plog