| // Copyright (c) 2010 Google Inc. |
| // All rights reserved. |
| // |
| // Redistribution and use in source and binary forms, with or without |
| // modification, are permitted provided that the following conditions are |
| // met: |
| // |
| // * Redistributions of source code must retain the above copyright |
| // notice, this list of conditions and the following disclaimer. |
| // * Redistributions in binary form must reproduce the above |
| // copyright notice, this list of conditions and the following disclaimer |
| // in the documentation and/or other materials provided with the |
| // distribution. |
| // * Neither the name of Google Inc. nor the names of its |
| // contributors may be used to endorse or promote products derived from |
| // this software without specific prior written permission. |
| // |
| // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| |
| // stackwalker_x86.cc: x86-specific stackwalker. |
| // |
| // See stackwalker_x86.h for documentation. |
| // |
| // Author: Mark Mentovai |
| |
| #include <assert.h> |
| #include <string> |
| |
| #include "common/scoped_ptr.h" |
| #include "google_breakpad/processor/call_stack.h" |
| #include "google_breakpad/processor/code_modules.h" |
| #include "google_breakpad/processor/memory_region.h" |
| #include "google_breakpad/processor/source_line_resolver_interface.h" |
| #include "google_breakpad/processor/stack_frame_cpu.h" |
| #include "processor/logging.h" |
| #include "processor/postfix_evaluator-inl.h" |
| #include "processor/stackwalker_x86.h" |
| #include "processor/windows_frame_info.h" |
| #include "processor/cfi_frame_info.h" |
| |
| namespace google_breakpad { |
| |
| // Max reasonable size for a single x86 frame is 128 KB. This value is used in |
| // a heuristic for recovering of the EBP chain after a scan for return address. |
| // This value is based on a stack frame size histogram built for a set of |
| // popular third party libraries which suggests that 99.5% of all frames are |
| // smaller than 128 KB. |
| static const uint32_t kMaxReasonableGapBetweenFrames = 128 * 1024; |
| |
| const StackwalkerX86::CFIWalker::RegisterSet |
| StackwalkerX86::cfi_register_map_[] = { |
| // It may seem like $eip and $esp are callee-saves, because (with Unix or |
| // cdecl calling conventions) the callee is responsible for having them |
| // restored upon return. But the callee_saves flags here really means |
| // that the walker should assume they're unchanged if the CFI doesn't |
| // mention them, which is clearly wrong for $eip and $esp. |
| { "$eip", ".ra", false, |
| StackFrameX86::CONTEXT_VALID_EIP, &MDRawContextX86::eip }, |
| { "$esp", ".cfa", false, |
| StackFrameX86::CONTEXT_VALID_ESP, &MDRawContextX86::esp }, |
| { "$ebp", NULL, true, |
| StackFrameX86::CONTEXT_VALID_EBP, &MDRawContextX86::ebp }, |
| { "$eax", NULL, false, |
| StackFrameX86::CONTEXT_VALID_EAX, &MDRawContextX86::eax }, |
| { "$ebx", NULL, true, |
| StackFrameX86::CONTEXT_VALID_EBX, &MDRawContextX86::ebx }, |
| { "$ecx", NULL, false, |
| StackFrameX86::CONTEXT_VALID_ECX, &MDRawContextX86::ecx }, |
| { "$edx", NULL, false, |
| StackFrameX86::CONTEXT_VALID_EDX, &MDRawContextX86::edx }, |
| { "$esi", NULL, true, |
| StackFrameX86::CONTEXT_VALID_ESI, &MDRawContextX86::esi }, |
| { "$edi", NULL, true, |
| StackFrameX86::CONTEXT_VALID_EDI, &MDRawContextX86::edi }, |
| }; |
| |
| StackwalkerX86::StackwalkerX86(const SystemInfo* system_info, |
| const MDRawContextX86* context, |
| MemoryRegion* memory, |
| const CodeModules* modules, |
| StackFrameSymbolizer* resolver_helper) |
| : Stackwalker(system_info, memory, modules, resolver_helper), |
| context_(context), |
| cfi_walker_(cfi_register_map_, |
| (sizeof(cfi_register_map_) / sizeof(cfi_register_map_[0]))) { |
| if (memory_ && memory_->GetBase() + memory_->GetSize() - 1 > 0xffffffff) { |
| // The x86 is a 32-bit CPU, the limits of the supplied stack are invalid. |
| // Mark memory_ = NULL, which will cause stackwalking to fail. |
| BPLOG(ERROR) << "Memory out of range for stackwalking: " << |
| HexString(memory_->GetBase()) << "+" << |
| HexString(memory_->GetSize()); |
| memory_ = NULL; |
| } |
| } |
| |
| StackFrameX86::~StackFrameX86() { |
| if (windows_frame_info) |
| delete windows_frame_info; |
| windows_frame_info = NULL; |
| if (cfi_frame_info) |
| delete cfi_frame_info; |
| cfi_frame_info = NULL; |
| } |
| |
| uint64_t StackFrameX86::ReturnAddress() const { |
| assert(context_validity & StackFrameX86::CONTEXT_VALID_EIP); |
| return context.eip; |
| } |
| |
| StackFrame* StackwalkerX86::GetContextFrame() { |
| if (!context_) { |
| BPLOG(ERROR) << "Can't get context frame without context"; |
| return NULL; |
| } |
| |
| StackFrameX86* frame = new StackFrameX86(); |
| |
| // The instruction pointer is stored directly in a register, so pull it |
| // straight out of the CPU context structure. |
| frame->context = *context_; |
| frame->context_validity = StackFrameX86::CONTEXT_VALID_ALL; |
| frame->trust = StackFrame::FRAME_TRUST_CONTEXT; |
| frame->instruction = frame->context.eip; |
| |
| return frame; |
| } |
| |
| StackFrameX86* StackwalkerX86::GetCallerByWindowsFrameInfo( |
| const vector<StackFrame*> &frames, |
| WindowsFrameInfo* last_frame_info, |
| bool stack_scan_allowed) { |
| StackFrame::FrameTrust trust = StackFrame::FRAME_TRUST_NONE; |
| |
| StackFrameX86* last_frame = static_cast<StackFrameX86*>(frames.back()); |
| |
| // Save the stack walking info we found, in case we need it later to |
| // find the callee of the frame we're constructing now. |
| last_frame->windows_frame_info = last_frame_info; |
| |
| // This function only covers the full STACK WIN case. If |
| // last_frame_info is VALID_PARAMETER_SIZE-only, then we should |
| // assume the traditional frame format or use some other strategy. |
| if (last_frame_info->valid != WindowsFrameInfo::VALID_ALL) |
| return NULL; |
| |
| // This stackwalker sets each frame's %esp to its value immediately prior |
| // to the CALL into the callee. This means that %esp points to the last |
| // callee argument pushed onto the stack, which may not be where %esp points |
| // after the callee returns. Specifically, the value is correct for the |
| // cdecl calling convention, but not other conventions. The cdecl |
| // convention requires a caller to pop its callee's arguments from the |
| // stack after the callee returns. This is usually accomplished by adding |
| // the known size of the arguments to %esp. Other calling conventions, |
| // including stdcall, thiscall, and fastcall, require the callee to pop any |
| // parameters stored on the stack before returning. This is usually |
| // accomplished by using the RET n instruction, which pops n bytes off |
| // the stack after popping the return address. |
| // |
| // Because each frame's %esp will point to a location on the stack after |
| // callee arguments have been PUSHed, when locating things in a stack frame |
| // relative to %esp, the size of the arguments to the callee need to be |
| // taken into account. This seems a little bit unclean, but it's better |
| // than the alternative, which would need to take these same things into |
| // account, but only for cdecl functions. With this implementation, we get |
| // to be agnostic about each function's calling convention. Furthermore, |
| // this is how Windows debugging tools work, so it means that the %esp |
| // values produced by this stackwalker directly correspond to the %esp |
| // values you'll see there. |
| // |
| // If the last frame has no callee (because it's the context frame), just |
| // set the callee parameter size to 0: the stack pointer can't point to |
| // callee arguments because there's no callee. This is correct as long |
| // as the context wasn't captured while arguments were being pushed for |
| // a function call. Note that there may be functions whose parameter sizes |
| // are unknown, 0 is also used in that case. When that happens, it should |
| // be possible to walk to the next frame without reference to %esp. |
| |
| uint32_t last_frame_callee_parameter_size = 0; |
| int frames_already_walked = frames.size(); |
| if (frames_already_walked >= 2) { |
| const StackFrameX86* last_frame_callee |
| = static_cast<StackFrameX86*>(frames[frames_already_walked - 2]); |
| WindowsFrameInfo* last_frame_callee_info |
| = last_frame_callee->windows_frame_info; |
| if (last_frame_callee_info && |
| (last_frame_callee_info->valid |
| & WindowsFrameInfo::VALID_PARAMETER_SIZE)) { |
| last_frame_callee_parameter_size = |
| last_frame_callee_info->parameter_size; |
| } |
| } |
| |
| // Set up the dictionary for the PostfixEvaluator. %ebp, %esp, and sometimes |
| // %ebx are used in program strings, and their previous values are known, so |
| // set them here. |
| PostfixEvaluator<uint32_t>::DictionaryType dictionary; |
| // Provide the current register values. |
| dictionary["$ebp"] = last_frame->context.ebp; |
| dictionary["$esp"] = last_frame->context.esp; |
| if (last_frame->context_validity & StackFrameX86::CONTEXT_VALID_EBX) |
| dictionary["$ebx"] = last_frame->context.ebx; |
| // Provide constants from the debug info for last_frame and its callee. |
| // .cbCalleeParams is a Breakpad extension that allows us to use the |
| // PostfixEvaluator engine when certain types of debugging information |
| // are present without having to write the constants into the program |
| // string as literals. |
| dictionary[".cbCalleeParams"] = last_frame_callee_parameter_size; |
| dictionary[".cbSavedRegs"] = last_frame_info->saved_register_size; |
| dictionary[".cbLocals"] = last_frame_info->local_size; |
| |
| uint32_t raSearchStart = last_frame->context.esp + |
| last_frame_callee_parameter_size + |
| last_frame_info->local_size + |
| last_frame_info->saved_register_size; |
| |
| uint32_t raSearchStartOld = raSearchStart; |
| uint32_t found = 0; // dummy value |
| // Scan up to three words above the calculated search value, in case |
| // the stack was aligned to a quadword boundary. |
| // |
| // TODO(ivan.penkov): Consider cleaning up the scan for return address that |
| // follows. The purpose of this scan is to adjust the .raSearchStart |
| // calculation (which is based on register %esp) in the cases where register |
| // %esp may have been aligned (up to a quadword). There are two problems |
| // with this approach: |
| // 1) In practice, 64 byte boundary alignment is seen which clearly can not |
| // be handled by a three word scan. |
| // 2) A search for a return address is "guesswork" by definition because |
| // the results will be different depending on what is left on the stack |
| // from previous executions. |
| // So, basically, the results from this scan should be ignored if other means |
| // for calculation of the value of .raSearchStart are available. |
| if (ScanForReturnAddress(raSearchStart, &raSearchStart, &found, 3) && |
| last_frame->trust == StackFrame::FRAME_TRUST_CONTEXT && |
| last_frame->windows_frame_info != NULL && |
| last_frame_info->type_ == WindowsFrameInfo::STACK_INFO_FPO && |
| raSearchStartOld == raSearchStart && |
| found == last_frame->context.eip) { |
| // The context frame represents an FPO-optimized Windows system call. |
| // On the top of the stack we have a pointer to the current instruction. |
| // This means that the callee has returned but the return address is still |
| // on the top of the stack which is very atypical situaltion. |
| // Skip one slot from the stack and do another scan in order to get the |
| // actual return address. |
| raSearchStart += 4; |
| ScanForReturnAddress(raSearchStart, &raSearchStart, &found, 3); |
| } |
| |
| dictionary[".cbParams"] = last_frame_info->parameter_size; |
| |
| // Decide what type of program string to use. The program string is in |
| // postfix notation and will be passed to PostfixEvaluator::Evaluate. |
| // Given the dictionary and the program string, it is possible to compute |
| // the return address and the values of other registers in the calling |
| // function. Because of bugs described below, the stack may need to be |
| // scanned for these values. The results of program string evaluation |
| // will be used to determine whether to scan for better values. |
| string program_string; |
| bool recover_ebp = true; |
| |
| trust = StackFrame::FRAME_TRUST_CFI; |
| if (!last_frame_info->program_string.empty()) { |
| // The FPO data has its own program string, which will tell us how to |
| // get to the caller frame, and may even fill in the values of |
| // nonvolatile registers and provide pointers to local variables and |
| // parameters. In some cases, particularly with program strings that use |
| // .raSearchStart, the stack may need to be scanned afterward. |
| program_string = last_frame_info->program_string; |
| } else if (last_frame_info->allocates_base_pointer) { |
| // The function corresponding to the last frame doesn't use the frame |
| // pointer for conventional purposes, but it does allocate a new |
| // frame pointer and use it for its own purposes. Its callee's |
| // information is still accessed relative to %esp, and the previous |
| // value of %ebp can be recovered from a location in its stack frame, |
| // within the saved-register area. |
| // |
| // Functions that fall into this category use the %ebp register for |
| // a purpose other than the frame pointer. They restore the caller's |
| // %ebp before returning. These functions create their stack frame |
| // after a CALL by decrementing the stack pointer in an amount |
| // sufficient to store local variables, and then PUSHing saved |
| // registers onto the stack. Arguments to a callee function, if any, |
| // are PUSHed after that. Walking up to the caller, therefore, |
| // can be done solely with calculations relative to the stack pointer |
| // (%esp). The return address is recovered from the memory location |
| // above the known sizes of the callee's parameters, saved registers, |
| // and locals. The caller's stack pointer (the value of %esp when |
| // the caller executed CALL) is the location immediately above the |
| // saved return address. The saved value of %ebp to be restored for |
| // the caller is at a known location in the saved-register area of |
| // the stack frame. |
| // |
| // For this type of frame, MSVC 14 (from Visual Studio 8/2005) in |
| // link-time code generation mode (/LTCG and /GL) can generate erroneous |
| // debugging data. The reported size of saved registers can be 0, |
| // which is clearly an error because these frames must, at the very |
| // least, save %ebp. For this reason, in addition to those given above |
| // about the use of .raSearchStart, the stack may need to be scanned |
| // for a better return address and a better frame pointer after the |
| // program string is evaluated. |
| // |
| // %eip_new = *(%esp_old + callee_params + saved_regs + locals) |
| // %ebp_new = *(%esp_old + callee_params + saved_regs - 8) |
| // %esp_new = %esp_old + callee_params + saved_regs + locals + 4 |
| program_string = "$eip .raSearchStart ^ = " |
| "$ebp $esp .cbCalleeParams + .cbSavedRegs + 8 - ^ = " |
| "$esp .raSearchStart 4 + ="; |
| } else { |
| // The function corresponding to the last frame doesn't use %ebp at |
| // all. The callee frame is located relative to %esp. |
| // |
| // The called procedure's instruction pointer and stack pointer are |
| // recovered in the same way as the case above, except that no |
| // frame pointer (%ebp) is used at all, so it is not saved anywhere |
| // in the callee's stack frame and does not need to be recovered. |
| // Because %ebp wasn't used in the callee, whatever value it has |
| // is the value that it had in the caller, so it can be carried |
| // straight through without bringing its validity into question. |
| // |
| // Because of the use of .raSearchStart, the stack will possibly be |
| // examined to locate a better return address after program string |
| // evaluation. The stack will not be examined to locate a saved |
| // %ebp value, because these frames do not save (or use) %ebp. |
| // |
| // We also propagate %ebx through, as it is commonly unmodifed after |
| // calling simple forwarding functions in ntdll (that are this non-EBP |
| // using type). It's not clear that this is always correct, but it is |
| // important for some functions to get a correct walk. |
| // |
| // %eip_new = *(%esp_old + callee_params + saved_regs + locals) |
| // %esp_new = %esp_old + callee_params + saved_regs + locals + 4 |
| // %ebp_new = %ebp_old |
| // %ebx_new = %ebx_old // If available. |
| program_string = "$eip .raSearchStart ^ = " |
| "$esp .raSearchStart 4 + ="; |
| if (last_frame->context_validity & StackFrameX86::CONTEXT_VALID_EBX) |
| program_string += " $ebx $ebx ="; |
| recover_ebp = false; |
| } |
| |
| // Check for alignment operators in the program string. If alignment |
| // operators are found, then current %ebp must be valid and it is the only |
| // reliable data point that can be used for getting to the previous frame. |
| // E.g. the .raSearchStart calculation (above) is based on %esp and since |
| // %esp was aligned in the current frame (which is a lossy operation) the |
| // calculated value of .raSearchStart cannot be correct and should not be |
| // used. Instead .raSearchStart must be calculated based on %ebp. |
| // The code that follows assumes that .raSearchStart is supposed to point |
| // at the saved return address (ebp + 4). |
| // For some more details on this topic, take a look at the following thread: |
| // https://groups.google.com/forum/#!topic/google-breakpad-dev/ZP1FA9B1JjM |
| if ((StackFrameX86::CONTEXT_VALID_EBP & last_frame->context_validity) != 0 && |
| program_string.find('@') != string::npos) { |
| raSearchStart = last_frame->context.ebp + 4; |
| } |
| |
| // The difference between raSearch and raSearchStart is unknown, |
| // but making them the same seems to work well in practice. |
| dictionary[".raSearchStart"] = raSearchStart; |
| dictionary[".raSearch"] = raSearchStart; |
| |
| // Now crank it out, making sure that the program string set at least the |
| // two required variables. |
| PostfixEvaluator<uint32_t> evaluator = |
| PostfixEvaluator<uint32_t>(&dictionary, memory_); |
| PostfixEvaluator<uint32_t>::DictionaryValidityType dictionary_validity; |
| if (!evaluator.Evaluate(program_string, &dictionary_validity) || |
| dictionary_validity.find("$eip") == dictionary_validity.end() || |
| dictionary_validity.find("$esp") == dictionary_validity.end()) { |
| // Program string evaluation failed. It may be that %eip is not somewhere |
| // with stack frame info, and %ebp is pointing to non-stack memory, so |
| // our evaluation couldn't succeed. We'll scan the stack for a return |
| // address. This can happen if the stack is in a module for which |
| // we don't have symbols, and that module is compiled without a |
| // frame pointer. |
| uint32_t location_start = last_frame->context.esp; |
| uint32_t location, eip; |
| if (!stack_scan_allowed |
| || !ScanForReturnAddress(location_start, &location, &eip, |
| frames.size() == 1 /* is_context_frame */)) { |
| // if we can't find an instruction pointer even with stack scanning, |
| // give up. |
| return NULL; |
| } |
| |
| // This seems like a reasonable return address. Since program string |
| // evaluation failed, use it and set %esp to the location above the |
| // one where the return address was found. |
| dictionary["$eip"] = eip; |
| dictionary["$esp"] = location + 4; |
| trust = StackFrame::FRAME_TRUST_SCAN; |
| } |
| |
| // Since this stack frame did not use %ebp in a traditional way, |
| // locating the return address isn't entirely deterministic. In that |
| // case, the stack can be scanned to locate the return address. |
| // |
| // However, if program string evaluation resulted in both %eip and |
| // %ebp values of 0, trust that the end of the stack has been |
| // reached and don't scan for anything else. |
| if (dictionary["$eip"] != 0 || dictionary["$ebp"] != 0) { |
| int offset = 0; |
| |
| // This scan can only be done if a CodeModules object is available, to |
| // check that candidate return addresses are in fact inside a module. |
| // |
| // TODO(mmentovai): This ignores dynamically-generated code. One possible |
| // solution is to check the minidump's memory map to see if the candidate |
| // %eip value comes from a mapped executable page, although this would |
| // require dumps that contain MINIDUMP_MEMORY_INFO, which the Breakpad |
| // client doesn't currently write (it would need to call MiniDumpWriteDump |
| // with the MiniDumpWithFullMemoryInfo type bit set). Even given this |
| // ability, older OSes (pre-XP SP2) and CPUs (pre-P4) don't enforce |
| // an independent execute privilege on memory pages. |
| |
| uint32_t eip = dictionary["$eip"]; |
| if (modules_ && !modules_->GetModuleForAddress(eip)) { |
| // The instruction pointer at .raSearchStart was invalid, so start |
| // looking one 32-bit word above that location. |
| uint32_t location_start = dictionary[".raSearchStart"] + 4; |
| uint32_t location; |
| if (stack_scan_allowed |
| && ScanForReturnAddress(location_start, &location, &eip, |
| frames.size() == 1 /* is_context_frame */)) { |
| // This is a better return address that what program string |
| // evaluation found. Use it, and set %esp to the location above the |
| // one where the return address was found. |
| dictionary["$eip"] = eip; |
| dictionary["$esp"] = location + 4; |
| offset = location - location_start; |
| trust = StackFrame::FRAME_TRUST_CFI_SCAN; |
| } |
| } |
| |
| if (recover_ebp) { |
| // When trying to recover the previous value of the frame pointer (%ebp), |
| // start looking at the lowest possible address in the saved-register |
| // area, and look at the entire saved register area, increased by the |
| // size of |offset| to account for additional data that may be on the |
| // stack. The scan is performed from the highest possible address to |
| // the lowest, because the expectation is that the function's prolog |
| // would have saved %ebp early. |
| uint32_t ebp = dictionary["$ebp"]; |
| |
| // When a scan for return address is used, it is possible to skip one or |
| // more frames (when return address is not in a known module). One |
| // indication for skipped frames is when the value of %ebp is lower than |
| // the location of the return address on the stack |
| bool has_skipped_frames = |
| (trust != StackFrame::FRAME_TRUST_CFI && ebp <= raSearchStart + offset); |
| |
| uint32_t value; // throwaway variable to check pointer validity |
| if (has_skipped_frames || !memory_->GetMemoryAtAddress(ebp, &value)) { |
| int fp_search_bytes = last_frame_info->saved_register_size + offset; |
| uint32_t location_end = last_frame->context.esp + |
| last_frame_callee_parameter_size; |
| |
| for (uint32_t location = location_end + fp_search_bytes; |
| location >= location_end; |
| location -= 4) { |
| if (!memory_->GetMemoryAtAddress(location, &ebp)) |
| break; |
| |
| if (memory_->GetMemoryAtAddress(ebp, &value)) { |
| // The candidate value is a pointer to the same memory region |
| // (the stack). Prefer it as a recovered %ebp result. |
| dictionary["$ebp"] = ebp; |
| break; |
| } |
| } |
| } |
| } |
| } |
| |
| // Create a new stack frame (ownership will be transferred to the caller) |
| // and fill it in. |
| StackFrameX86* frame = new StackFrameX86(); |
| |
| frame->trust = trust; |
| frame->context = last_frame->context; |
| frame->context.eip = dictionary["$eip"]; |
| frame->context.esp = dictionary["$esp"]; |
| frame->context.ebp = dictionary["$ebp"]; |
| frame->context_validity = StackFrameX86::CONTEXT_VALID_EIP | |
| StackFrameX86::CONTEXT_VALID_ESP | |
| StackFrameX86::CONTEXT_VALID_EBP; |
| |
| // These are nonvolatile (callee-save) registers, and the program string |
| // may have filled them in. |
| if (dictionary_validity.find("$ebx") != dictionary_validity.end()) { |
| frame->context.ebx = dictionary["$ebx"]; |
| frame->context_validity |= StackFrameX86::CONTEXT_VALID_EBX; |
| } |
| if (dictionary_validity.find("$esi") != dictionary_validity.end()) { |
| frame->context.esi = dictionary["$esi"]; |
| frame->context_validity |= StackFrameX86::CONTEXT_VALID_ESI; |
| } |
| if (dictionary_validity.find("$edi") != dictionary_validity.end()) { |
| frame->context.edi = dictionary["$edi"]; |
| frame->context_validity |= StackFrameX86::CONTEXT_VALID_EDI; |
| } |
| |
| return frame; |
| } |
| |
| StackFrameX86* StackwalkerX86::GetCallerByCFIFrameInfo( |
| const vector<StackFrame*> &frames, |
| CFIFrameInfo* cfi_frame_info) { |
| StackFrameX86* last_frame = static_cast<StackFrameX86*>(frames.back()); |
| last_frame->cfi_frame_info = cfi_frame_info; |
| |
| scoped_ptr<StackFrameX86> frame(new StackFrameX86()); |
| if (!cfi_walker_ |
| .FindCallerRegisters(*memory_, *cfi_frame_info, |
| last_frame->context, last_frame->context_validity, |
| &frame->context, &frame->context_validity)) |
| return NULL; |
| |
| // Make sure we recovered all the essentials. |
| static const int essentials = (StackFrameX86::CONTEXT_VALID_EIP |
| | StackFrameX86::CONTEXT_VALID_ESP |
| | StackFrameX86::CONTEXT_VALID_EBP); |
| if ((frame->context_validity & essentials) != essentials) |
| return NULL; |
| |
| frame->trust = StackFrame::FRAME_TRUST_CFI; |
| |
| return frame.release(); |
| } |
| |
| StackFrameX86* StackwalkerX86::GetCallerByEBPAtBase( |
| const vector<StackFrame*> &frames, |
| bool stack_scan_allowed) { |
| StackFrame::FrameTrust trust; |
| StackFrameX86* last_frame = static_cast<StackFrameX86*>(frames.back()); |
| uint32_t last_esp = last_frame->context.esp; |
| uint32_t last_ebp = last_frame->context.ebp; |
| |
| // Assume that the standard %ebp-using x86 calling convention is in |
| // use. |
| // |
| // The typical x86 calling convention, when frame pointers are present, |
| // is for the calling procedure to use CALL, which pushes the return |
| // address onto the stack and sets the instruction pointer (%eip) to |
| // the entry point of the called routine. The called routine then |
| // PUSHes the calling routine's frame pointer (%ebp) onto the stack |
| // before copying the stack pointer (%esp) to the frame pointer (%ebp). |
| // Therefore, the calling procedure's frame pointer is always available |
| // by dereferencing the called procedure's frame pointer, and the return |
| // address is always available at the memory location immediately above |
| // the address pointed to by the called procedure's frame pointer. The |
| // calling procedure's stack pointer (%esp) is 8 higher than the value |
| // of the called procedure's frame pointer at the time the calling |
| // procedure made the CALL: 4 bytes for the return address pushed by the |
| // CALL itself, and 4 bytes for the callee's PUSH of the caller's frame |
| // pointer. |
| // |
| // %eip_new = *(%ebp_old + 4) |
| // %esp_new = %ebp_old + 8 |
| // %ebp_new = *(%ebp_old) |
| |
| uint32_t caller_eip, caller_esp, caller_ebp; |
| |
| if (memory_->GetMemoryAtAddress(last_ebp + 4, &caller_eip) && |
| memory_->GetMemoryAtAddress(last_ebp, &caller_ebp)) { |
| caller_esp = last_ebp + 8; |
| trust = StackFrame::FRAME_TRUST_FP; |
| } else { |
| // We couldn't read the memory %ebp refers to. It may be that %ebp |
| // is pointing to non-stack memory. We'll scan the stack for a |
| // return address. This can happen if last_frame is executing code |
| // for a module for which we don't have symbols, and that module |
| // is compiled without a frame pointer. |
| if (!stack_scan_allowed |
| || !ScanForReturnAddress(last_esp, &caller_esp, &caller_eip, |
| frames.size() == 1 /* is_context_frame */)) { |
| // if we can't find an instruction pointer even with stack scanning, |
| // give up. |
| return NULL; |
| } |
| |
| // ScanForReturnAddress found a reasonable return address. Advance %esp to |
| // the location immediately above the one where the return address was |
| // found. |
| caller_esp += 4; |
| // Try to restore the %ebp chain. The caller %ebp should be stored at a |
| // location immediately below the one where the return address was found. |
| // A valid caller %ebp must be greater than the address where it is stored |
| // and the gap between the two adjacent frames should be reasonable. |
| uint32_t restored_ebp_chain = caller_esp - 8; |
| if (!memory_->GetMemoryAtAddress(restored_ebp_chain, &caller_ebp) || |
| caller_ebp <= restored_ebp_chain || |
| caller_ebp - restored_ebp_chain > kMaxReasonableGapBetweenFrames) { |
| // The restored %ebp chain doesn't appear to be valid. |
| // Assume that %ebp is unchanged. |
| caller_ebp = last_ebp; |
| } |
| |
| trust = StackFrame::FRAME_TRUST_SCAN; |
| } |
| |
| // Create a new stack frame (ownership will be transferred to the caller) |
| // and fill it in. |
| StackFrameX86* frame = new StackFrameX86(); |
| |
| frame->trust = trust; |
| frame->context = last_frame->context; |
| frame->context.eip = caller_eip; |
| frame->context.esp = caller_esp; |
| frame->context.ebp = caller_ebp; |
| frame->context_validity = StackFrameX86::CONTEXT_VALID_EIP | |
| StackFrameX86::CONTEXT_VALID_ESP | |
| StackFrameX86::CONTEXT_VALID_EBP; |
| |
| return frame; |
| } |
| |
| StackFrame* StackwalkerX86::GetCallerFrame(const CallStack* stack, |
| bool stack_scan_allowed) { |
| if (!memory_ || !stack) { |
| BPLOG(ERROR) << "Can't get caller frame without memory or stack"; |
| return NULL; |
| } |
| |
| const vector<StackFrame*> &frames = *stack->frames(); |
| StackFrameX86* last_frame = static_cast<StackFrameX86*>(frames.back()); |
| scoped_ptr<StackFrameX86> new_frame; |
| |
| // If the resolver has Windows stack walking information, use that. |
| WindowsFrameInfo* windows_frame_info |
| = frame_symbolizer_->FindWindowsFrameInfo(last_frame); |
| if (windows_frame_info) |
| new_frame.reset(GetCallerByWindowsFrameInfo(frames, windows_frame_info, |
| stack_scan_allowed)); |
| |
| // If the resolver has DWARF CFI information, use that. |
| if (!new_frame.get()) { |
| CFIFrameInfo* cfi_frame_info = |
| frame_symbolizer_->FindCFIFrameInfo(last_frame); |
| if (cfi_frame_info) |
| new_frame.reset(GetCallerByCFIFrameInfo(frames, cfi_frame_info)); |
| } |
| |
| // Otherwise, hope that the program was using a traditional frame structure. |
| if (!new_frame.get()) |
| new_frame.reset(GetCallerByEBPAtBase(frames, stack_scan_allowed)); |
| |
| // If nothing worked, tell the caller. |
| if (!new_frame.get()) |
| return NULL; |
| |
| // Should we terminate the stack walk? (end-of-stack or broken invariant) |
| if (TerminateWalk(new_frame->context.eip, |
| new_frame->context.esp, |
| last_frame->context.esp, |
| frames.size() == 1)) { |
| return NULL; |
| } |
| |
| // new_frame->context.eip is the return address, which is the instruction |
| // after the CALL that caused us to arrive at the callee. Set |
| // new_frame->instruction to one less than that, so it points within the |
| // CALL instruction. See StackFrame::instruction for details, and |
| // StackFrameAMD64::ReturnAddress. |
| new_frame->instruction = new_frame->context.eip - 1; |
| |
| return new_frame.release(); |
| } |
| |
| } // namespace google_breakpad |