reven2.trace.Transition(object) class documentationreven2.trace
          
          (View In Hierarchy)
        
      Entry point object for data related to a transition.
A transition is anything that changes the state of the virtual machine, from `context_before` to `context_after`. Most of the time, that would be an instruction executed by the CPU. Sometimes, it will be an exception (CPU fault or IRQ) instead. In that case, an instruction might still be related to the exception, if for instance it is the source of the fault. In that case, the instruction has not been fully executed by the CPU.
This object is not meant to be constructed directly. Use Trace.transition
  instead.
Spawning: >>> # From a trace >>> tr = reven_server.trace.transition(id) >>> >>> # From a context >>> tr = context.transition_before(transition_id) >>> >>> # From a transition >>> tr = reven_server.trace.transition(id) >>> next_tr = tr + 1 >>> prev_tr = tr - 1 >>> other_tr = tr + 10000
Usage: >>> print(tr) >>> if tr.type == TransitionType.Instruction: >>> print(tr.instruction)
| Method | __init__ | Undocumented | 
| Method | id | Property: Unique ID of this transition. | 
| Method | type | Property: The transition's type. | 
| Method | instruction | Property: The associated Instruction if one 
exists. | 
  
| Method | exception | Property: The associated CPUException if one 
exists. | 
  
| Method | context_before | Get the Context object before this transition was executed | 
| Method | context_after | Get the Context object after this transition was executed | 
| Method | memory_accesses | Get a generator over the reven2.memhist.MemoryAccesses
at this transition. | 
  
| Method | find_inverse | This method is a helper to get the transition that performs the 
inverse operation to this transition. | 
  
| Method | __str__ | Undocumented | 
| Method | __repr__ | Undocumented | 
| Method | __eq__ | Undocumented | 
| Method | __ne__ | Undocumented | 
| Method | __lt__ | Undocumented | 
| Method | __le__ | Undocumented | 
| Method | __gt__ | Undocumented | 
| Method | __ge__ | Undocumented | 
| Method | __add__ | Undocumented | 
| Method | __sub__ | Undocumented | 
| Class Method | _unique_id | Undocumented | 
| Method | _trace | Undocumented | 
| Method | _data | Undocumented | 
| Method | _repr_html_ | Representation used by Jupyter Notebook when an instance of the Transition class is displayed in a cell. | 
Property: Unique ID of this transition.
Can be used to spawn the object from the corresponding `Trace` object.
| Returns | An integer. | |
Property: The transition's type.
The type of a transition can be one of the following:
| Returns | A TransitionType 
instance. | |
Property: The associated Instruction if one 
exists.
If this transition is not of type Instruction of TransitionType, 
None will be returned.
| Returns | An Instruction, or
None. | |
Property: The associated CPUException if one 
exists.
If this transition is not of type Exception of TransitionType, 
None will be returned.
| Returns | An CPUException, 
or None. | |
Get the Context object before this transition was executed
>>> Context before -> This transition
| Returns | A Context. | |
Get the Context object after this transition was executed
>>> This transition -> Context after
| Returns | A Context. | |
Get a generator over the reven2.memhist.MemoryAccesses
at this transition.
>>> # Getting all accesses as a list at transition 42 (can be long if there are a lots of accesses): >>> list(trace.transition(42).memory_accesses()) [MemoryAccess(transition=Transition(id=42), physical_address=PhysicalAddress(offset=0x7fc03eb8), size=8, operation=MemoryAccessesOperation.Write, virtual_address=LinearAddress(offset=0xffff88007fc03eb8))]
>>> # Getting the first memory access at transition 14 >>> next(trace.transition(14).memory_accesses()) MemoryAccess(transition=Transition(id=14), physical_address=PhysicalAddress(offset=0x1f270a2), size=1, operation=MemoryAccessesOperation.Read, virtual_address=LinearAddress(offset=0xffffffff81f270a2))
>>> # Getting all addresses that are read at transition 0. >>> addresses = set() >>> for access in trace.transition(0).memory_accesses(operation=reven2.memhist.MemoryAccessesOperation.Read): >>> physical_offset = access.physical_address.offset >>> for address in range(physical_offset, physical_offset + access.size) >>> addresses.add(address) >>> for address in addresses: >>> print reven2.address.PhysicalAddress(address) phy:0x36f05080 phy:0x36f05081 phy:0x36f05082 phy:0x36f05083 phy:0x36f05084 phy:0x36f05085 phy:0x36f05086 phy:0x36f05087
| Parameters | operation | Only return accesses whose operation equals the specified reven2.memhist.MemoryAccessOperation.
If None, return all accesses. | 
| Returns | a generator of reven2.memhist.MemoryAccess. | |
| Raises | RuntimeError | if the memory history resource has not been generated | 
This method is a helper to get the transition that performs the 
inverse operation to this transition.
The transition switches between user and kernel land. Examples:
syscall transition => the related 
      sysret transition
    sysret transition => the related 
      syscall transition
    iretq 
      transition
    iretq transition => the related exception 
      transition
    The transition does memory accesses:
ret 
      transition on an indirect call transition e.g. call [rax + 
      10].
    If the selected access is a write then the next read access on the same memory range is searched for.
If the selected access is a read then the previous write access on the same memory range is searched for.
Example find_inverse
  on:
call transition => the related ret 
      transition.
    ret transition => the related call 
      transition.
    push transition => the related pop or 
      mov transition.
    pop transition => the related push 
      transition.
    store transition => the related load 
      transition.
    load transition => the related store 
      transition.
    Due to the fact that find_inverse
  matches with memory accesses to find the inverse instruction, in some 
  special cases, such as ROP chain, the inverse of e.g. a ret 
  will not be a call instruction, but could be a 
  mov to the memory, for example.
This method requires that the REVEN2 server have the Memory history enabled.
It can be combined with other features like backtrace to obtain interesting results.
For example, to jump to the end of the current function:
>>> import reven2 >>> reven_server = reven2.RevenServer('localhost', 13370) >>> current_transition = reven_server.trace.transition(10000000) >>> ret_transition = current_transition.find_inverse()
| Returns | reven2.trace.Transition
or None if no inverse found. | |
Representation used by Jupyter Notebook when an instance of the Transition class is displayed in a cell.
The transition is returned as a clickable link containing the transition
id, that publishes the transition to all tracked reven2.session.Sessions.