This patch adds support for memory regions in Scripted Processes. This is necessary to read the stack memory region in order to reconstruct each stackframe of the program. In order to do so, this patch makes some changes to the SBAPI, namely: - Add a new constructor for `SBMemoryRegionInfo` that takes arguments such as the memory region name, address range, permissions ... This is used when reading memory at some address to compute the offset in the binary blob provided by the user. - Add a `GetMemoryRegionContainingAddress` method to `SBMemoryRegionInfoList` to simplify the access to a specific memory region. With these changes, lldb is now able to unwind the stack and reconstruct each frame. On top of that, reloading the target module at offset 0 allows lldb to symbolicate the `ScriptedProcess` using debug info, similarly to an ordinary Process. To test this, I wrote a simple program with multiple function calls, ran it in lldb, stopped at a leaf function and read the registers values and copied the stack memory into a binary file. These are then used in the python script. Differential Revision: https://reviews.llvm.org/D108953 Signed-off-by: Med Ismail Bennani <medismail.bennani@gmail.com>
90 lines
2.7 KiB
Python
90 lines
2.7 KiB
Python
import os,struct, signal
|
|
|
|
from typing import Any, Dict
|
|
|
|
import lldb
|
|
from lldb.plugins.scripted_process import ScriptedProcess
|
|
from lldb.plugins.scripted_process import ScriptedThread
|
|
|
|
class DummyScriptedProcess(ScriptedProcess):
|
|
def __init__(self, target: lldb.SBTarget, args : lldb.SBStructuredData):
|
|
super().__init__(target, args)
|
|
|
|
def get_memory_region_containing_address(self, addr: int) -> lldb.SBMemoryRegionInfo:
|
|
return None
|
|
|
|
def get_thread_with_id(self, tid: int):
|
|
return {}
|
|
|
|
def get_registers_for_thread(self, tid: int):
|
|
return {}
|
|
|
|
def read_memory_at_address(self, addr: int, size: int) -> lldb.SBData:
|
|
data = lldb.SBData().CreateDataFromCString(
|
|
self.target.GetByteOrder(),
|
|
self.target.GetCodeByteSize(),
|
|
"Hello, world!")
|
|
return data
|
|
|
|
def get_loaded_images(self):
|
|
return self.loaded_images
|
|
|
|
def get_process_id(self) -> int:
|
|
return 42
|
|
|
|
def should_stop(self) -> bool:
|
|
return True
|
|
|
|
def is_alive(self) -> bool:
|
|
return True
|
|
|
|
def get_scripted_thread_plugin(self):
|
|
return DummyScriptedThread.__module__ + "." + DummyScriptedThread.__name__
|
|
|
|
|
|
class DummyScriptedThread(ScriptedThread):
|
|
def __init__(self, target):
|
|
super().__init__(target)
|
|
|
|
def get_thread_id(self) -> int:
|
|
return 0x19
|
|
|
|
def get_name(self) -> str:
|
|
return DummyScriptedThread.__name__ + ".thread-1"
|
|
|
|
def get_state(self) -> int:
|
|
return lldb.eStateStopped
|
|
|
|
def get_stop_reason(self) -> Dict[str, Any]:
|
|
return { "type": lldb.eStopReasonSignal, "data": {
|
|
"signal": signal.SIGINT
|
|
} }
|
|
|
|
def get_stackframes(self):
|
|
class ScriptedStackFrame:
|
|
def __init__(idx, cfa, pc, symbol_ctx):
|
|
self.idx = idx
|
|
self.cfa = cfa
|
|
self.pc = pc
|
|
self.symbol_ctx = symbol_ctx
|
|
|
|
|
|
symbol_ctx = lldb.SBSymbolContext()
|
|
frame_zero = ScriptedStackFrame(0, 0x42424242, 0x5000000, symbol_ctx)
|
|
self.frames.append(frame_zero)
|
|
|
|
return self.frame_zero[0:0]
|
|
|
|
def get_register_context(self) -> str:
|
|
return struct.pack(
|
|
'21Q', 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
|
|
|
|
|
|
def __lldb_init_module(debugger, dict):
|
|
if not 'SKIP_SCRIPTED_PROCESS_LAUNCH' in os.environ:
|
|
debugger.HandleCommand(
|
|
"process launch -C %s.%s" % (__name__,
|
|
DummyScriptedProcess.__name__))
|
|
else:
|
|
print("Name of the class that will manage the scripted process: '%s.%s'"
|
|
% (__name__, DummyScriptedProcess.__name__)) |