================ @@ -0,0 +1,137 @@ +import os, struct, signal + +from typing import Any, Dict + +import lldb +from lldb.plugins.scripted_process import ScriptedProcess +from lldb.plugins.scripted_process import ScriptedThread + + +class DummyStopHook: + def __init__(self, target, args): + self.target = target + self.args = args + + def handle_stop(self, exe_ctx, stream): + print("My DummyStopHook triggered. Printing args: \n%s" % self.args) + sp = exe_ctx.process.GetScriptedImplementation() + sp.handled_stop = True + + +class DummyScriptedProcess(ScriptedProcess): + memory = None + + def __init__(self, exe_ctx: lldb.SBExecutionContext, args: lldb.SBStructuredData): + super().__init__(exe_ctx, args) + self.threads[0] = DummyScriptedThread(self, None) + self.memory = {} + addr = 0x500000000 + debugger = self.target.GetDebugger() + index = debugger.GetIndexOfTarget(self.target) + self.memory[addr] = "Hello, target " + str(index) + self.handled_stop = False + + def read_memory_at_address( + self, addr: int, size: int, error: lldb.SBError + ) -> lldb.SBData: + data = lldb.SBData().CreateDataFromCString( + self.target.GetByteOrder(), self.target.GetCodeByteSize(), self.memory[addr] + ) + + return data + + def get_memory_region_containing_address( + self, addr: int + ) -> lldb.SBMemoryRegionInfo: + return lldb.SBMemoryRegionInfo() + + def write_memory_at_address(self, addr, data, error): + self.memory[addr] = data.GetString(error, 0) + return len(self.memory[addr]) + 1 + + def get_loaded_images(self): + return self.loaded_images + + def get_process_id(self) -> int: + return 42 + + def should_stop(self) -> bool: + return True + + def is_alive(self) -> bool: + return True + + def get_scripted_thread_plugin(self): + return DummyScriptedThread.__module__ + "." + DummyScriptedThread.__name__ + + def my_super_secret_method(self): + if hasattr(self, "my_super_secret_member"): + return self.my_super_secret_member + else: + return None + + +class DummyScriptedThread(ScriptedThread): + def __init__(self, process, args): + super().__init__(process, args) + self.frames.append({"pc": 0x0100001B00}) + + def get_thread_id(self) -> int: + return 0x19 + + def get_name(self) -> str: + return DummyScriptedThread.__name__ + ".thread-1" + + def get_state(self) -> int: + return lldb.eStateStopped + + def get_stop_reason(self) -> Dict[str, Any]: + return {"type": lldb.eStopReasonTrace, "data": {}} + + def get_register_context(self) -> str: + return struct.pack( + "21Q", + 1, + 2, + 3, + 4, + 5, + 6, + 7, + 8, + 9, + 10, + 11, + 12, + 13, + 14, + 15, + 16, + 17, + 18, + 19, + 20, + 21, + ) + + +def __lldb_init_module(debugger, dict): + # This is used when loading the script in an interactive debug session to + # automatically, register the stop-hook and launch the scripted process. + if not "SKIP_SCRIPTED_PROCESS_LAUNCH" in os.environ: + debugger.HandleCommand( + "target stop-hook add -k first -v 1 -k second -v 2 -P %s.%s" + % (__name__, DummyStopHook.__name__) + ) + debugger.HandleCommand( + "process launch -C %s.%s" % (__name__, DummyScriptedProcess.__name__) + ) + else: + print( + "Name of the class that will manage the scripted process: '%s.%s'" + % (__name__, DummyScriptedProcess.__name__) + ) + print( + "Name of the class that will manage the stop-hook: '%s.%s'" + % (__name__, DummyStopHook.__name__) + ) ---------------- medismailben wrote:
Or this https://github.com/llvm/llvm-project/pull/115963 _______________________________________________ lldb-commits mailing list lldb-commits@lists.llvm.org https://lists.llvm.org/cgi-bin/mailman/listinfo/lldb-commits