| import os, struct, signal |
| |
| from typing import Any, Dict |
| |
| import lldb |
| from lldb.plugins.scripted_process import ScriptedProcess |
| from lldb.plugins.scripted_process import ScriptedThread |
| |
| |
| class DummyStopHook: |
| def __init__(self, target, args): |
| self.target = target |
| self.args = args |
| |
| def handle_stop(self, exe_ctx, stream): |
| print("My DummyStopHook triggered. Printing args: \n%s" % self.args) |
| sp = exe_ctx.process.GetScriptedImplementation() |
| sp.handled_stop = True |
| |
| class DummyScriptedProcess(ScriptedProcess): |
| memory = None |
| |
| def __init__(self, exe_ctx: lldb.SBExecutionContext, args: lldb.SBStructuredData): |
| super().__init__(exe_ctx, args) |
| self.threads[0] = DummyScriptedThread(self, None) |
| self.memory = {} |
| addr = 0x500000000 |
| debugger = self.target.GetDebugger() |
| index = debugger.GetIndexOfTarget(self.target) |
| self.memory[addr] = "Hello, target " + str(index) |
| self.handled_stop = False |
| |
| def read_memory_at_address( |
| self, addr: int, size: int, error: lldb.SBError |
| ) -> lldb.SBData: |
| data = lldb.SBData().CreateDataFromCString( |
| self.target.GetByteOrder(), self.target.GetCodeByteSize(), self.memory[addr] |
| ) |
| |
| return data |
| |
| def write_memory_at_address(self, addr, data, error): |
| self.memory[addr] = data.GetString(error, 0) |
| return len(self.memory[addr]) + 1 |
| |
| def get_loaded_images(self): |
| return self.loaded_images |
| |
| def get_process_id(self) -> int: |
| return 42 |
| |
| def should_stop(self) -> bool: |
| return True |
| |
| def is_alive(self) -> bool: |
| return True |
| |
| def get_scripted_thread_plugin(self): |
| return DummyScriptedThread.__module__ + "." + DummyScriptedThread.__name__ |
| |
| def my_super_secret_method(self): |
| if hasattr(self, "my_super_secret_member"): |
| return self.my_super_secret_member |
| else: |
| return None |
| |
| |
| class DummyScriptedThread(ScriptedThread): |
| def __init__(self, process, args): |
| super().__init__(process, args) |
| self.frames.append({"pc": 0x0100001B00}) |
| |
| def get_thread_id(self) -> int: |
| return 0x19 |
| |
| def get_name(self) -> str: |
| return DummyScriptedThread.__name__ + ".thread-1" |
| |
| def get_state(self) -> int: |
| return lldb.eStateStopped |
| |
| def get_stop_reason(self) -> Dict[str, Any]: |
| return {"type": lldb.eStopReasonTrace, "data": {}} |
| |
| def get_register_context(self) -> str: |
| return struct.pack( |
| "21Q", |
| 1, |
| 2, |
| 3, |
| 4, |
| 5, |
| 6, |
| 7, |
| 8, |
| 9, |
| 10, |
| 11, |
| 12, |
| 13, |
| 14, |
| 15, |
| 16, |
| 17, |
| 18, |
| 19, |
| 20, |
| 21, |
| ) |
| |
| |
| def __lldb_init_module(debugger, dict): |
| # This is used when loading the script in an interactive debug session to |
| # automatically, register the stop-hook and launch the scripted process. |
| if not "SKIP_SCRIPTED_PROCESS_LAUNCH" in os.environ: |
| debugger.HandleCommand( |
| "target stop-hook add -k first -v 1 -k second -v 2 -P %s.%s" |
| % (__name__, DummyStopHook.__name__) |
| ) |
| debugger.HandleCommand( |
| "process launch -C %s.%s" % (__name__, DummyScriptedProcess.__name__) |
| ) |
| else: |
| print( |
| "Name of the class that will manage the scripted process: '%s.%s'" |
| % (__name__, DummyScriptedProcess.__name__) |
| ) |
| print( |
| "Name of the class that will manage the stop-hook: '%s.%s'" |
| % (__name__, DummyStopHook.__name__) |
| ) |