2021-03-23 16:22:26 +00:00
|
|
|
"""
|
|
|
|
|
Test python scripted process in lldb
|
|
|
|
|
"""
|
|
|
|
|
|
2022-02-08 14:44:43 -08:00
|
|
|
import os
|
2021-03-23 16:22:26 +00:00
|
|
|
|
|
|
|
|
import lldb
|
|
|
|
|
from lldbsuite.test.decorators import *
|
|
|
|
|
from lldbsuite.test.lldbtest import *
|
|
|
|
|
from lldbsuite.test import lldbutil
|
|
|
|
|
from lldbsuite.test import lldbtest
|
|
|
|
|
|
2021-07-20 13:00:54 +00:00
|
|
|
class ScriptedProcesTestCase(TestBase):
|
2021-03-23 16:22:26 +00:00
|
|
|
|
2022-02-08 14:44:43 -08:00
|
|
|
NO_DEBUG_INFO_TESTCASE = True
|
|
|
|
|
|
2021-03-23 16:22:26 +00:00
|
|
|
mydir = TestBase.compute_mydir(__file__)
|
|
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
|
TestBase.setUp(self)
|
|
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
|
TestBase.tearDown(self)
|
|
|
|
|
|
|
|
|
|
def test_python_plugin_package(self):
|
|
|
|
|
"""Test that the lldb python module has a `plugins.scripted_process`
|
|
|
|
|
package."""
|
|
|
|
|
self.expect('script import lldb.plugins',
|
|
|
|
|
substrs=["ModuleNotFoundError"], matching=False)
|
|
|
|
|
|
|
|
|
|
self.expect('script dir(lldb.plugins)',
|
|
|
|
|
substrs=["scripted_process"])
|
|
|
|
|
|
|
|
|
|
self.expect('script import lldb.plugins.scripted_process',
|
|
|
|
|
substrs=["ModuleNotFoundError"], matching=False)
|
|
|
|
|
|
|
|
|
|
self.expect('script dir(lldb.plugins.scripted_process)',
|
|
|
|
|
substrs=["ScriptedProcess"])
|
|
|
|
|
|
|
|
|
|
self.expect('script from lldb.plugins.scripted_process import ScriptedProcess',
|
|
|
|
|
substrs=["ImportError"], matching=False)
|
|
|
|
|
|
|
|
|
|
self.expect('script dir(ScriptedProcess)',
|
|
|
|
|
substrs=["launch"])
|
|
|
|
|
|
2022-01-24 21:45:00 +01:00
|
|
|
@skipUnlessDarwin
|
2021-12-01 18:56:29 -08:00
|
|
|
def test_invalid_scripted_register_context(self):
|
|
|
|
|
"""Test that we can launch an lldb scripted process with an invalid
|
|
|
|
|
Scripted Thread, with invalid register context."""
|
|
|
|
|
self.build()
|
|
|
|
|
target = self.dbg.CreateTarget(self.getBuildArtifact("a.out"))
|
|
|
|
|
self.assertTrue(target, VALID_TARGET)
|
2021-12-06 17:55:19 -08:00
|
|
|
log_file = self.getBuildArtifact('thread.log')
|
|
|
|
|
self.runCmd("log enable lldb thread -f " + log_file)
|
|
|
|
|
self.assertTrue(os.path.isfile(log_file))
|
2021-12-01 18:56:29 -08:00
|
|
|
|
|
|
|
|
os.environ['SKIP_SCRIPTED_PROCESS_LAUNCH'] = '1'
|
2022-01-27 01:04:38 +01:00
|
|
|
def cleanup():
|
|
|
|
|
del os.environ["SKIP_SCRIPTED_PROCESS_LAUNCH"]
|
|
|
|
|
self.addTearDownHook(cleanup)
|
|
|
|
|
|
2021-12-01 18:56:29 -08:00
|
|
|
scripted_process_example_relpath = 'invalid_scripted_process.py'
|
|
|
|
|
self.runCmd("command script import " + os.path.join(self.getSourceDir(),
|
|
|
|
|
scripted_process_example_relpath))
|
|
|
|
|
|
|
|
|
|
launch_info = lldb.SBLaunchInfo(None)
|
|
|
|
|
launch_info.SetProcessPluginName("ScriptedProcess")
|
|
|
|
|
launch_info.SetScriptedProcessClassName("invalid_scripted_process.InvalidScriptedProcess")
|
|
|
|
|
error = lldb.SBError()
|
|
|
|
|
|
2021-12-06 17:55:19 -08:00
|
|
|
process = target.Launch(launch_info, error)
|
2021-12-01 18:56:29 -08:00
|
|
|
|
2022-02-11 21:23:16 -08:00
|
|
|
self.assertSuccess(error)
|
2021-12-06 17:55:19 -08:00
|
|
|
self.assertTrue(process, PROCESS_IS_VALID)
|
|
|
|
|
self.assertEqual(process.GetProcessID(), 666)
|
|
|
|
|
self.assertEqual(process.GetNumThreads(), 0)
|
|
|
|
|
|
|
|
|
|
with open(log_file, 'r') as f:
|
|
|
|
|
log = f.read()
|
|
|
|
|
|
|
|
|
|
self.assertIn("Failed to get scripted thread registers data.", log)
|
2021-12-01 18:56:29 -08:00
|
|
|
|
2022-03-04 14:21:56 -08:00
|
|
|
@skipUnlessDarwin
|
[lldb/Plugins] Add memory region support in ScriptedProcess
This patch adds support for memory regions in Scripted Processes.
This is necessary to read the stack memory region in order to
reconstruct each stackframe of the program.
In order to do so, this patch makes some changes to the SBAPI, namely:
- Add a new constructor for `SBMemoryRegionInfo` that takes arguments
such as the memory region name, address range, permissions ...
This is used when reading memory at some address to compute the offset
in the binary blob provided by the user.
- Add a `GetMemoryRegionContainingAddress` method to `SBMemoryRegionInfoList`
to simplify the access to a specific memory region.
With these changes, lldb is now able to unwind the stack and reconstruct
each frame. On top of that, reloading the target module at offset 0 allows
lldb to symbolicate the `ScriptedProcess` using debug info, similarly to an
ordinary Process.
To test this, I wrote a simple program with multiple function calls, ran it in
lldb, stopped at a leaf function and read the registers values and copied
the stack memory into a binary file. These are then used in the python script.
Differential Revision: https://reviews.llvm.org/D108953
Signed-off-by: Med Ismail Bennani <medismail.bennani@gmail.com>
2021-10-08 12:25:04 +00:00
|
|
|
def test_scripted_process_and_scripted_thread(self):
|
2021-07-20 13:00:54 +00:00
|
|
|
"""Test that we can launch an lldb scripted process using the SBAPI,
|
[lldb/Plugins] Add memory region support in ScriptedProcess
This patch adds support for memory regions in Scripted Processes.
This is necessary to read the stack memory region in order to
reconstruct each stackframe of the program.
In order to do so, this patch makes some changes to the SBAPI, namely:
- Add a new constructor for `SBMemoryRegionInfo` that takes arguments
such as the memory region name, address range, permissions ...
This is used when reading memory at some address to compute the offset
in the binary blob provided by the user.
- Add a `GetMemoryRegionContainingAddress` method to `SBMemoryRegionInfoList`
to simplify the access to a specific memory region.
With these changes, lldb is now able to unwind the stack and reconstruct
each frame. On top of that, reloading the target module at offset 0 allows
lldb to symbolicate the `ScriptedProcess` using debug info, similarly to an
ordinary Process.
To test this, I wrote a simple program with multiple function calls, ran it in
lldb, stopped at a leaf function and read the registers values and copied
the stack memory into a binary file. These are then used in the python script.
Differential Revision: https://reviews.llvm.org/D108953
Signed-off-by: Med Ismail Bennani <medismail.bennani@gmail.com>
2021-10-08 12:25:04 +00:00
|
|
|
check its process ID, read string from memory, check scripted thread
|
|
|
|
|
id, name stop reason and register context.
|
|
|
|
|
"""
|
2021-07-20 13:00:54 +00:00
|
|
|
self.build()
|
|
|
|
|
target = self.dbg.CreateTarget(self.getBuildArtifact("a.out"))
|
|
|
|
|
self.assertTrue(target, VALID_TARGET)
|
|
|
|
|
|
|
|
|
|
os.environ['SKIP_SCRIPTED_PROCESS_LAUNCH'] = '1'
|
2022-01-27 01:04:38 +01:00
|
|
|
def cleanup():
|
|
|
|
|
del os.environ["SKIP_SCRIPTED_PROCESS_LAUNCH"]
|
|
|
|
|
self.addTearDownHook(cleanup)
|
|
|
|
|
|
2021-11-10 19:12:32 +00:00
|
|
|
scripted_process_example_relpath = 'dummy_scripted_process.py'
|
2021-07-20 13:00:54 +00:00
|
|
|
self.runCmd("command script import " + os.path.join(self.getSourceDir(),
|
[lldb/Plugins] Add memory region support in ScriptedProcess
This patch adds support for memory regions in Scripted Processes.
This is necessary to read the stack memory region in order to
reconstruct each stackframe of the program.
In order to do so, this patch makes some changes to the SBAPI, namely:
- Add a new constructor for `SBMemoryRegionInfo` that takes arguments
such as the memory region name, address range, permissions ...
This is used when reading memory at some address to compute the offset
in the binary blob provided by the user.
- Add a `GetMemoryRegionContainingAddress` method to `SBMemoryRegionInfoList`
to simplify the access to a specific memory region.
With these changes, lldb is now able to unwind the stack and reconstruct
each frame. On top of that, reloading the target module at offset 0 allows
lldb to symbolicate the `ScriptedProcess` using debug info, similarly to an
ordinary Process.
To test this, I wrote a simple program with multiple function calls, ran it in
lldb, stopped at a leaf function and read the registers values and copied
the stack memory into a binary file. These are then used in the python script.
Differential Revision: https://reviews.llvm.org/D108953
Signed-off-by: Med Ismail Bennani <medismail.bennani@gmail.com>
2021-10-08 12:25:04 +00:00
|
|
|
scripted_process_example_relpath))
|
2021-07-20 13:00:54 +00:00
|
|
|
|
|
|
|
|
launch_info = lldb.SBLaunchInfo(None)
|
|
|
|
|
launch_info.SetProcessPluginName("ScriptedProcess")
|
[lldb/Plugins] Add memory region support in ScriptedProcess
This patch adds support for memory regions in Scripted Processes.
This is necessary to read the stack memory region in order to
reconstruct each stackframe of the program.
In order to do so, this patch makes some changes to the SBAPI, namely:
- Add a new constructor for `SBMemoryRegionInfo` that takes arguments
such as the memory region name, address range, permissions ...
This is used when reading memory at some address to compute the offset
in the binary blob provided by the user.
- Add a `GetMemoryRegionContainingAddress` method to `SBMemoryRegionInfoList`
to simplify the access to a specific memory region.
With these changes, lldb is now able to unwind the stack and reconstruct
each frame. On top of that, reloading the target module at offset 0 allows
lldb to symbolicate the `ScriptedProcess` using debug info, similarly to an
ordinary Process.
To test this, I wrote a simple program with multiple function calls, ran it in
lldb, stopped at a leaf function and read the registers values and copied
the stack memory into a binary file. These are then used in the python script.
Differential Revision: https://reviews.llvm.org/D108953
Signed-off-by: Med Ismail Bennani <medismail.bennani@gmail.com>
2021-10-08 12:25:04 +00:00
|
|
|
launch_info.SetScriptedProcessClassName("dummy_scripted_process.DummyScriptedProcess")
|
2021-07-20 13:00:54 +00:00
|
|
|
|
|
|
|
|
error = lldb.SBError()
|
|
|
|
|
process = target.Launch(launch_info, error)
|
|
|
|
|
self.assertTrue(process and process.IsValid(), PROCESS_IS_VALID)
|
|
|
|
|
self.assertEqual(process.GetProcessID(), 42)
|
|
|
|
|
|
2021-10-06 00:09:20 +00:00
|
|
|
self.assertEqual(process.GetNumThreads(), 1)
|
|
|
|
|
|
|
|
|
|
thread = process.GetSelectedThread()
|
|
|
|
|
self.assertTrue(thread, "Invalid thread.")
|
|
|
|
|
self.assertEqual(thread.GetThreadID(), 0x19)
|
[lldb/Plugins] Add memory region support in ScriptedProcess
This patch adds support for memory regions in Scripted Processes.
This is necessary to read the stack memory region in order to
reconstruct each stackframe of the program.
In order to do so, this patch makes some changes to the SBAPI, namely:
- Add a new constructor for `SBMemoryRegionInfo` that takes arguments
such as the memory region name, address range, permissions ...
This is used when reading memory at some address to compute the offset
in the binary blob provided by the user.
- Add a `GetMemoryRegionContainingAddress` method to `SBMemoryRegionInfoList`
to simplify the access to a specific memory region.
With these changes, lldb is now able to unwind the stack and reconstruct
each frame. On top of that, reloading the target module at offset 0 allows
lldb to symbolicate the `ScriptedProcess` using debug info, similarly to an
ordinary Process.
To test this, I wrote a simple program with multiple function calls, ran it in
lldb, stopped at a leaf function and read the registers values and copied
the stack memory into a binary file. These are then used in the python script.
Differential Revision: https://reviews.llvm.org/D108953
Signed-off-by: Med Ismail Bennani <medismail.bennani@gmail.com>
2021-10-08 12:25:04 +00:00
|
|
|
self.assertEqual(thread.GetName(), "DummyScriptedThread.thread-1")
|
2021-10-06 00:09:20 +00:00
|
|
|
self.assertEqual(thread.GetStopReason(), lldb.eStopReasonSignal)
|
|
|
|
|
|
|
|
|
|
self.assertGreater(thread.GetNumFrames(), 0)
|
|
|
|
|
|
|
|
|
|
frame = thread.GetFrameAtIndex(0)
|
2021-11-10 16:11:22 +00:00
|
|
|
GPRs = None
|
2021-10-06 00:09:20 +00:00
|
|
|
register_set = frame.registers # Returns an SBValueList.
|
|
|
|
|
for regs in register_set:
|
2021-11-10 16:11:22 +00:00
|
|
|
if 'general purpose' in regs.name.lower():
|
|
|
|
|
GPRs = regs
|
2021-10-06 00:09:20 +00:00
|
|
|
break
|
|
|
|
|
|
2021-11-10 16:11:22 +00:00
|
|
|
self.assertTrue(GPRs, "Invalid General Purpose Registers Set")
|
2022-01-24 21:45:00 +01:00
|
|
|
self.assertGreater(GPRs.GetNumChildren(), 0)
|
2021-11-10 16:11:22 +00:00
|
|
|
for idx, reg in enumerate(GPRs, start=1):
|
2022-01-24 21:45:00 +01:00
|
|
|
if idx > 21:
|
|
|
|
|
break
|
2021-10-06 00:09:20 +00:00
|
|
|
self.assertEqual(idx, int(reg.value, 16))
|
|
|
|
|
|
2022-02-09 19:04:21 -08:00
|
|
|
self.assertTrue(frame.IsArtificial(), "Frame is not artificial")
|
|
|
|
|
pc = frame.GetPCAddress().GetLoadAddress(target)
|
|
|
|
|
self.assertEqual(pc, 0x0100001b00)
|