This patch re-lands #105449 and fixes the various test failures. --------- Signed-off-by: Med Ismail Bennani <ismail@bennani.ma>
132 lines
3.7 KiB
Python
132 lines
3.7 KiB
Python
import os, struct, signal
|
|
|
|
from typing import Any, Dict
|
|
|
|
import lldb
|
|
from lldb.plugins.scripted_process import ScriptedProcess
|
|
from lldb.plugins.scripted_process import ScriptedThread
|
|
|
|
|
|
class DummyStopHook:
|
|
def __init__(self, target, args):
|
|
self.target = target
|
|
self.args = args
|
|
|
|
def handle_stop(self, exe_ctx, stream):
|
|
print("My DummyStopHook triggered. Printing args: \n%s" % self.args)
|
|
sp = exe_ctx.process.GetScriptedImplementation()
|
|
sp.handled_stop = True
|
|
|
|
class DummyScriptedProcess(ScriptedProcess):
|
|
memory = None
|
|
|
|
def __init__(self, exe_ctx: lldb.SBExecutionContext, args: lldb.SBStructuredData):
|
|
super().__init__(exe_ctx, args)
|
|
self.threads[0] = DummyScriptedThread(self, None)
|
|
self.memory = {}
|
|
addr = 0x500000000
|
|
debugger = self.target.GetDebugger()
|
|
index = debugger.GetIndexOfTarget(self.target)
|
|
self.memory[addr] = "Hello, target " + str(index)
|
|
self.handled_stop = False
|
|
|
|
def read_memory_at_address(
|
|
self, addr: int, size: int, error: lldb.SBError
|
|
) -> lldb.SBData:
|
|
data = lldb.SBData().CreateDataFromCString(
|
|
self.target.GetByteOrder(), self.target.GetCodeByteSize(), self.memory[addr]
|
|
)
|
|
|
|
return data
|
|
|
|
def write_memory_at_address(self, addr, data, error):
|
|
self.memory[addr] = data.GetString(error, 0)
|
|
return len(self.memory[addr]) + 1
|
|
|
|
def get_loaded_images(self):
|
|
return self.loaded_images
|
|
|
|
def get_process_id(self) -> int:
|
|
return 42
|
|
|
|
def should_stop(self) -> bool:
|
|
return True
|
|
|
|
def is_alive(self) -> bool:
|
|
return True
|
|
|
|
def get_scripted_thread_plugin(self):
|
|
return DummyScriptedThread.__module__ + "." + DummyScriptedThread.__name__
|
|
|
|
def my_super_secret_method(self):
|
|
if hasattr(self, "my_super_secret_member"):
|
|
return self.my_super_secret_member
|
|
else:
|
|
return None
|
|
|
|
|
|
class DummyScriptedThread(ScriptedThread):
|
|
def __init__(self, process, args):
|
|
super().__init__(process, args)
|
|
self.frames.append({"pc": 0x0100001B00})
|
|
|
|
def get_thread_id(self) -> int:
|
|
return 0x19
|
|
|
|
def get_name(self) -> str:
|
|
return DummyScriptedThread.__name__ + ".thread-1"
|
|
|
|
def get_state(self) -> int:
|
|
return lldb.eStateStopped
|
|
|
|
def get_stop_reason(self) -> Dict[str, Any]:
|
|
return {"type": lldb.eStopReasonTrace, "data": {}}
|
|
|
|
def get_register_context(self) -> str:
|
|
return struct.pack(
|
|
"21Q",
|
|
1,
|
|
2,
|
|
3,
|
|
4,
|
|
5,
|
|
6,
|
|
7,
|
|
8,
|
|
9,
|
|
10,
|
|
11,
|
|
12,
|
|
13,
|
|
14,
|
|
15,
|
|
16,
|
|
17,
|
|
18,
|
|
19,
|
|
20,
|
|
21,
|
|
)
|
|
|
|
|
|
def __lldb_init_module(debugger, dict):
|
|
# This is used when loading the script in an interactive debug session to
|
|
# automatically, register the stop-hook and launch the scripted process.
|
|
if not "SKIP_SCRIPTED_PROCESS_LAUNCH" in os.environ:
|
|
debugger.HandleCommand(
|
|
"target stop-hook add -k first -v 1 -k second -v 2 -P %s.%s"
|
|
% (__name__, DummyStopHook.__name__)
|
|
)
|
|
debugger.HandleCommand(
|
|
"process launch -C %s.%s" % (__name__, DummyScriptedProcess.__name__)
|
|
)
|
|
else:
|
|
print(
|
|
"Name of the class that will manage the scripted process: '%s.%s'"
|
|
% (__name__, DummyScriptedProcess.__name__)
|
|
)
|
|
print(
|
|
"Name of the class that will manage the stop-hook: '%s.%s'"
|
|
% (__name__, DummyStopHook.__name__)
|
|
)
|