mirror of
https://github.com/yuzu-emu/breakpad.git
synced 2024-11-28 06:04:24 +01:00
Issue in StackwalkerAMD64::GetCallerByFramePointerRecovery.
There is an issue in StackwalkerAMD64::GetCallerByFramePointerRecovery. Occasionally it produces invalid frames (instruction pointer == 0) which prevents the AMD64 stack walker from proceeding to do stack scanning and instead leads to premature termination of the stack walking process. For more details: http://crbug/537444 BUG= R=mark@chromium.org Review URL: https://codereview.chromium.org/1408973002 .
This commit is contained in:
parent
ef7575d35a
commit
b458f36762
@ -147,6 +147,23 @@ StackFrameAMD64* StackwalkerAMD64::GetCallerByCFIFrameInfo(
|
|||||||
return frame.release();
|
return frame.release();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool StackwalkerAMD64::IsEndOfStack(uint64_t caller_rip, uint64_t caller_rsp,
|
||||||
|
uint64_t callee_rsp) {
|
||||||
|
// Treat an instruction address of 0 as end-of-stack.
|
||||||
|
if (caller_rip == 0) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// If the new stack pointer is at a lower address than the old, then
|
||||||
|
// that's clearly incorrect. Treat this as end-of-stack to enforce
|
||||||
|
// progress and avoid infinite loops.
|
||||||
|
if (caller_rsp < callee_rsp) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
StackFrameAMD64* StackwalkerAMD64::GetCallerByFramePointerRecovery(
|
StackFrameAMD64* StackwalkerAMD64::GetCallerByFramePointerRecovery(
|
||||||
const vector<StackFrame*>& frames) {
|
const vector<StackFrame*>& frames) {
|
||||||
StackFrameAMD64* last_frame = static_cast<StackFrameAMD64*>(frames.back());
|
StackFrameAMD64* last_frame = static_cast<StackFrameAMD64*>(frames.back());
|
||||||
@ -175,8 +192,11 @@ StackFrameAMD64* StackwalkerAMD64::GetCallerByFramePointerRecovery(
|
|||||||
uint64_t caller_rsp = last_rbp + 16;
|
uint64_t caller_rsp = last_rbp + 16;
|
||||||
|
|
||||||
// Simple sanity check that the stack is growing downwards as expected.
|
// Simple sanity check that the stack is growing downwards as expected.
|
||||||
if (caller_rbp < last_rbp || caller_rsp < last_rsp)
|
if (IsEndOfStack(caller_rip, caller_rsp, last_rsp) ||
|
||||||
|
caller_rbp < last_rbp) {
|
||||||
|
// Reached end-of-stack or stack is not growing downwards.
|
||||||
return NULL;
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
StackFrameAMD64* frame = new StackFrameAMD64();
|
StackFrameAMD64* frame = new StackFrameAMD64();
|
||||||
frame->trust = StackFrame::FRAME_TRUST_FP;
|
frame->trust = StackFrame::FRAME_TRUST_FP;
|
||||||
@ -284,15 +304,11 @@ StackFrame* StackwalkerAMD64::GetCallerFrame(const CallStack* stack,
|
|||||||
new_frame->context.rbp = static_cast<uint32_t>(new_frame->context.rbp);
|
new_frame->context.rbp = static_cast<uint32_t>(new_frame->context.rbp);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Treat an instruction address of 0 as end-of-stack.
|
if (IsEndOfStack(new_frame->context.rip, new_frame->context.rsp,
|
||||||
if (new_frame->context.rip == 0)
|
last_frame->context.rsp)) {
|
||||||
return NULL;
|
// Reached end-of-stack.
|
||||||
|
|
||||||
// If the new stack pointer is at a lower address than the old, then
|
|
||||||
// that's clearly incorrect. Treat this as end-of-stack to enforce
|
|
||||||
// progress and avoid infinite loops.
|
|
||||||
if (new_frame->context.rsp <= last_frame->context.rsp)
|
|
||||||
return NULL;
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
// new_frame->context.rip is the return address, which is the instruction
|
// new_frame->context.rip is the return address, which is the instruction
|
||||||
// after the CALL that caused us to arrive at the callee. Set
|
// after the CALL that caused us to arrive at the callee. Set
|
||||||
|
@ -78,6 +78,14 @@ class StackwalkerAMD64 : public Stackwalker {
|
|||||||
StackFrameAMD64* GetCallerByCFIFrameInfo(const vector<StackFrame*> &frames,
|
StackFrameAMD64* GetCallerByCFIFrameInfo(const vector<StackFrame*> &frames,
|
||||||
CFIFrameInfo* cfi_frame_info);
|
CFIFrameInfo* cfi_frame_info);
|
||||||
|
|
||||||
|
// Checks whether end-of-stack is reached. An instruction address of 0 is an
|
||||||
|
// end-of-stack marker. If the stack pointer of the caller is at a lower
|
||||||
|
// address than the stack pointer of the callee, then that's clearly incorrect
|
||||||
|
// and it is treated as end-of-stack to enforce progress and avoid infinite
|
||||||
|
// loops.
|
||||||
|
bool IsEndOfStack(uint64_t caller_rip, uint64_t caller_rsp,
|
||||||
|
uint64_t callee_rsp);
|
||||||
|
|
||||||
// Assumes a traditional frame layout where the frame pointer has not been
|
// Assumes a traditional frame layout where the frame pointer has not been
|
||||||
// omitted. The expectation is that caller's %rbp is pushed to the stack
|
// omitted. The expectation is that caller's %rbp is pushed to the stack
|
||||||
// after the return address of the callee, and that the callee's %rsp can
|
// after the return address of the callee, and that the callee's %rsp can
|
||||||
|
@ -370,6 +370,138 @@ TEST_F(GetCallerFrame, ScanWithFunctionSymbols) {
|
|||||||
EXPECT_EQ(0x50000000b0000100ULL, frame1->function_base);
|
EXPECT_EQ(0x50000000b0000100ULL, frame1->function_base);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// StackwalkerAMD64::GetCallerByFramePointerRecovery should never return an
|
||||||
|
// instruction pointer of 0 because IP of 0 is an end of stack marker and the
|
||||||
|
// stack walk may be terminated prematurely. Instead it should return NULL
|
||||||
|
// so that the stack walking code can proceed to stack scanning.
|
||||||
|
TEST_F(GetCallerFrame, GetCallerByFramePointerRecovery) {
|
||||||
|
MockCodeModule user32_dll(0x00007ff9cb8a0000ULL, 0x14E000, "user32.dll",
|
||||||
|
"version1");
|
||||||
|
SetModuleSymbols(&user32_dll, // user32.dll
|
||||||
|
"PUBLIC fa60 0 DispatchMessageWorker\n"
|
||||||
|
"PUBLIC fee0 0 UserCallWinProcCheckWow\n"
|
||||||
|
"PUBLIC 1cdb0 0 _fnHkINLPMSG\n"
|
||||||
|
"STACK CFI INIT fa60 340 .cfa: $rsp .ra: .cfa 8 - ^\n"
|
||||||
|
"STACK CFI fa60 .cfa: $rsp 128 +\n"
|
||||||
|
"STACK CFI INIT fee0 49f .cfa: $rsp .ra: .cfa 8 - ^\n"
|
||||||
|
"STACK CFI fee0 .cfa: $rsp 240 +\n"
|
||||||
|
"STACK CFI INIT 1cdb0 9f .cfa: $rsp .ra: .cfa 8 - ^\n"
|
||||||
|
"STACK CFI 1cdb0 .cfa: $rsp 80 +\n");
|
||||||
|
|
||||||
|
// Create some modules with some stock debugging information.
|
||||||
|
MockCodeModules local_modules;
|
||||||
|
local_modules.Add(&user32_dll);
|
||||||
|
|
||||||
|
Label frame0_rsp;
|
||||||
|
Label frame0_rbp;
|
||||||
|
Label frame1_rsp;
|
||||||
|
Label frame2_rsp;
|
||||||
|
|
||||||
|
stack_section.start() = 0x00000099abf0f238ULL;
|
||||||
|
stack_section
|
||||||
|
.Mark(&frame0_rsp)
|
||||||
|
.D64(0x00007ff9cb8b00dcULL)
|
||||||
|
.Mark(&frame1_rsp)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000001ULL)
|
||||||
|
.D64(0x00000099abf0f308ULL)
|
||||||
|
.D64(0x00007ff9cb8bce3aULL) // Stack residue from execution of
|
||||||
|
// user32!_fnHkINLPMSG+0x8a
|
||||||
|
.D64(0x000000000000c2e0ULL)
|
||||||
|
.D64(0x00000099abf0f328ULL)
|
||||||
|
.D64(0x0000000100000001ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x00007ff9ccad53e4ULL)
|
||||||
|
.D64(0x0000000000000048ULL)
|
||||||
|
.D64(0x0000000000000001ULL)
|
||||||
|
.D64(0x00000099abf0f5e0ULL)
|
||||||
|
.D64(0x00000099b61f7388ULL)
|
||||||
|
.D64(0x0000000000000030ULL)
|
||||||
|
.D64(0xffffff66540f0a1fULL)
|
||||||
|
.D64(0xffffff6649e08c77ULL)
|
||||||
|
.D64(0x00007ff9cb8affb4ULL) // Return address in
|
||||||
|
// user32!UserCallWinProcCheckWow+0xd4
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x00000099abf0f368ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x0000000000000000ULL)
|
||||||
|
.D64(0x00000099a8150fd8ULL)
|
||||||
|
.D64(0x00000099abf0f3e8ULL)
|
||||||
|
.D64(0x00007ff9cb8afc07ULL) // Return address in
|
||||||
|
// user32!DispatchMessageWorker+0x1a7
|
||||||
|
.Mark(&frame2_rsp)
|
||||||
|
.Append(256, 0)
|
||||||
|
.Mark(&frame0_rbp) // The following are expected by
|
||||||
|
// GetCallerByFramePointerRecovery.
|
||||||
|
.D64(0xfffffffffffffffeULL) // %caller_rbp = *(%callee_rbp)
|
||||||
|
.D64(0x0000000000000000ULL) // %caller_rip = *(%callee_rbp + 8)
|
||||||
|
.D64(0x00000099a3e31040ULL) // %caller_rsp = *(%callee_rbp + 16)
|
||||||
|
.Append(256, 0);
|
||||||
|
|
||||||
|
RegionFromSection();
|
||||||
|
raw_context.rip = 0x00000099a8150fd8ULL; // IP in context frame is guarbage
|
||||||
|
raw_context.rsp = frame0_rsp.Value();
|
||||||
|
raw_context.rbp = frame0_rbp.Value();
|
||||||
|
|
||||||
|
StackFrameSymbolizer frame_symbolizer(&supplier, &resolver);
|
||||||
|
StackwalkerAMD64 walker(&system_info, &raw_context, &stack_region,
|
||||||
|
&local_modules, &frame_symbolizer);
|
||||||
|
vector<const CodeModule*> modules_without_symbols;
|
||||||
|
vector<const CodeModule*> modules_with_corrupt_symbols;
|
||||||
|
ASSERT_TRUE(walker.Walk(&call_stack, &modules_without_symbols,
|
||||||
|
&modules_with_corrupt_symbols));
|
||||||
|
ASSERT_EQ(0U, modules_without_symbols.size());
|
||||||
|
ASSERT_EQ(0U, modules_with_corrupt_symbols.size());
|
||||||
|
frames = call_stack.frames();
|
||||||
|
|
||||||
|
ASSERT_EQ(3U, frames->size());
|
||||||
|
|
||||||
|
{ // To avoid reusing locals by mistake
|
||||||
|
StackFrameAMD64 *frame = static_cast<StackFrameAMD64 *>(frames->at(0));
|
||||||
|
EXPECT_EQ(StackFrame::FRAME_TRUST_CONTEXT, frame->trust);
|
||||||
|
ASSERT_EQ(StackFrameAMD64::CONTEXT_VALID_ALL, frame->context_validity);
|
||||||
|
EXPECT_EQ("", frame->function_name);
|
||||||
|
EXPECT_EQ(0x00000099a8150fd8ULL, frame->instruction);
|
||||||
|
EXPECT_EQ(0x00000099a8150fd8ULL, frame->context.rip);
|
||||||
|
EXPECT_EQ(frame0_rsp.Value(), frame->context.rsp);
|
||||||
|
EXPECT_EQ(frame0_rbp.Value(), frame->context.rbp);
|
||||||
|
}
|
||||||
|
|
||||||
|
{ // To avoid reusing locals by mistake
|
||||||
|
StackFrameAMD64 *frame = static_cast<StackFrameAMD64 *>(frames->at(1));
|
||||||
|
EXPECT_EQ(StackFrame::FRAME_TRUST_SCAN, frame->trust);
|
||||||
|
ASSERT_EQ((StackFrameAMD64::CONTEXT_VALID_RIP |
|
||||||
|
StackFrameAMD64::CONTEXT_VALID_RSP |
|
||||||
|
StackFrameAMD64::CONTEXT_VALID_RBP),
|
||||||
|
frame->context_validity);
|
||||||
|
EXPECT_EQ("UserCallWinProcCheckWow", frame->function_name);
|
||||||
|
EXPECT_EQ(140710838468828ULL, frame->instruction + 1);
|
||||||
|
EXPECT_EQ(140710838468828ULL, frame->context.rip);
|
||||||
|
EXPECT_EQ(frame1_rsp.Value(), frame->context.rsp);
|
||||||
|
EXPECT_EQ(&user32_dll, frame->module);
|
||||||
|
}
|
||||||
|
|
||||||
|
{ // To avoid reusing locals by mistake
|
||||||
|
StackFrameAMD64 *frame = static_cast<StackFrameAMD64 *>(frames->at(2));
|
||||||
|
EXPECT_EQ(StackFrame::FRAME_TRUST_CFI, frame->trust);
|
||||||
|
ASSERT_EQ((StackFrameAMD64::CONTEXT_VALID_RIP |
|
||||||
|
StackFrameAMD64::CONTEXT_VALID_RSP |
|
||||||
|
StackFrameAMD64::CONTEXT_VALID_RBP),
|
||||||
|
frame->context_validity);
|
||||||
|
EXPECT_EQ("DispatchMessageWorker", frame->function_name);
|
||||||
|
EXPECT_EQ(140710838467591ULL, frame->instruction + 1);
|
||||||
|
EXPECT_EQ(140710838467591ULL, frame->context.rip);
|
||||||
|
EXPECT_EQ(frame2_rsp.Value(), frame->context.rsp);
|
||||||
|
EXPECT_EQ(&user32_dll, frame->module);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Test that set_max_frames_scanned prevents using stack scanning
|
// Test that set_max_frames_scanned prevents using stack scanning
|
||||||
// to find caller frames.
|
// to find caller frames.
|
||||||
TEST_F(GetCallerFrame, ScanningNotAllowed) {
|
TEST_F(GetCallerFrame, ScanningNotAllowed) {
|
||||||
|
Loading…
Reference in New Issue
Block a user