mirror of
https://github.com/chromium/crashpad.git
synced 2024-12-27 15:32:10 +08:00
c86c9f0f73
This is particularly a problem when the neighboring mapping is a special mapping not readable from another process. For example: 7fff96aeb000-7fff96b0c000 rw-p 00000000 00:00 0 [stack] 7fff96b0c000-7fff96b0e000 r--p 00000000 00:00 0 [vvar] [vvar] is a special mapping which makes some kernel data available for virtual system calls. Attempting to read this region via the /proc/<pid>/maps file returns an IO error which causes Crashpad to abort capturing any of the thread's stack. Neighboring mappings with empty names are eligible to be merged since they result from changing permissions on existing named mappings. Change-Id: I587bd2ec6f9759d284f1f9b1d93f2a44ddf61e92 Reviewed-on: https://chromium-review.googlesource.com/1072803 Reviewed-by: Scott Graham <scottmg@chromium.org> Commit-Queue: Joshua Peraza <jperaza@chromium.org>
409 lines
12 KiB
C++
409 lines
12 KiB
C++
// Copyright 2017 The Crashpad Authors. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "snapshot/linux/process_reader_linux.h"
|
|
|
|
#include <elf.h>
|
|
#include <errno.h>
|
|
#include <sched.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/resource.h>
|
|
#include <unistd.h>
|
|
|
|
#include <algorithm>
|
|
|
|
#include "base/logging.h"
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "build/build_config.h"
|
|
#include "snapshot/linux/debug_rendezvous.h"
|
|
#include "util/file/directory_reader.h"
|
|
#include "util/linux/auxiliary_vector.h"
|
|
#include "util/linux/proc_stat_reader.h"
|
|
#include "util/misc/as_underlying_type.h"
|
|
|
|
namespace crashpad {
|
|
|
|
namespace {
|
|
|
|
bool ShouldMergeStackMappings(const MemoryMap::Mapping& stack_mapping,
|
|
const MemoryMap::Mapping& adj_mapping) {
|
|
DCHECK(stack_mapping.readable);
|
|
return adj_mapping.readable && stack_mapping.device == adj_mapping.device &&
|
|
stack_mapping.inode == adj_mapping.inode &&
|
|
(stack_mapping.name == adj_mapping.name ||
|
|
stack_mapping.name.empty() || adj_mapping.name.empty());
|
|
}
|
|
|
|
} // namespace
|
|
|
|
ProcessReaderLinux::Thread::Thread()
|
|
: thread_info(),
|
|
stack_region_address(0),
|
|
stack_region_size(0),
|
|
tid(-1),
|
|
static_priority(-1),
|
|
nice_value(-1) {}
|
|
|
|
ProcessReaderLinux::Thread::~Thread() {}
|
|
|
|
bool ProcessReaderLinux::Thread::InitializePtrace(
|
|
PtraceConnection* connection) {
|
|
if (!connection->GetThreadInfo(tid, &thread_info)) {
|
|
return false;
|
|
}
|
|
|
|
// TODO(jperaza): Starting with Linux 3.14, scheduling policy, static
|
|
// priority, and nice value can be collected all in one call with
|
|
// sched_getattr().
|
|
int res = sched_getscheduler(tid);
|
|
if (res < 0) {
|
|
PLOG(ERROR) << "sched_getscheduler";
|
|
return false;
|
|
}
|
|
sched_policy = res;
|
|
|
|
sched_param param;
|
|
if (sched_getparam(tid, ¶m) != 0) {
|
|
PLOG(ERROR) << "sched_getparam";
|
|
return false;
|
|
}
|
|
static_priority = param.sched_priority;
|
|
|
|
errno = 0;
|
|
res = getpriority(PRIO_PROCESS, tid);
|
|
if (res == -1 && errno) {
|
|
PLOG(ERROR) << "getpriority";
|
|
return false;
|
|
}
|
|
nice_value = res;
|
|
|
|
return true;
|
|
}
|
|
|
|
void ProcessReaderLinux::Thread::InitializeStack(ProcessReaderLinux* reader) {
|
|
LinuxVMAddress stack_pointer;
|
|
#if defined(ARCH_CPU_X86_FAMILY)
|
|
stack_pointer = reader->Is64Bit() ? thread_info.thread_context.t64.rsp
|
|
: thread_info.thread_context.t32.esp;
|
|
#elif defined(ARCH_CPU_ARM_FAMILY)
|
|
stack_pointer = reader->Is64Bit() ? thread_info.thread_context.t64.sp
|
|
: thread_info.thread_context.t32.sp;
|
|
#else
|
|
#error Port.
|
|
#endif
|
|
InitializeStackFromSP(reader, stack_pointer);
|
|
}
|
|
|
|
void ProcessReaderLinux::Thread::InitializeStackFromSP(
|
|
ProcessReaderLinux* reader,
|
|
LinuxVMAddress stack_pointer) {
|
|
const MemoryMap* memory_map = reader->GetMemoryMap();
|
|
|
|
// If we can't find the mapping, it's probably a bad stack pointer
|
|
const MemoryMap::Mapping* mapping = memory_map->FindMapping(stack_pointer);
|
|
if (!mapping) {
|
|
LOG(WARNING) << "no stack mapping";
|
|
return;
|
|
}
|
|
LinuxVMAddress stack_region_start = stack_pointer;
|
|
|
|
// We've hit what looks like a guard page; skip to the end and check for a
|
|
// mapped stack region.
|
|
if (!mapping->readable) {
|
|
stack_region_start = mapping->range.End();
|
|
mapping = memory_map->FindMapping(stack_region_start);
|
|
if (!mapping) {
|
|
LOG(WARNING) << "no stack mapping";
|
|
return;
|
|
}
|
|
} else {
|
|
#if defined(ARCH_CPU_X86_FAMILY)
|
|
// Adjust start address to include the red zone
|
|
if (reader->Is64Bit()) {
|
|
constexpr LinuxVMSize kRedZoneSize = 128;
|
|
LinuxVMAddress red_zone_base =
|
|
stack_region_start - std::min(kRedZoneSize, stack_region_start);
|
|
|
|
// Only include the red zone if it is part of a valid mapping
|
|
if (red_zone_base >= mapping->range.Base()) {
|
|
stack_region_start = red_zone_base;
|
|
} else {
|
|
const MemoryMap::Mapping* rz_mapping =
|
|
memory_map->FindMapping(red_zone_base);
|
|
if (rz_mapping && ShouldMergeStackMappings(*mapping, *rz_mapping)) {
|
|
stack_region_start = red_zone_base;
|
|
} else {
|
|
stack_region_start = mapping->range.Base();
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
stack_region_address = stack_region_start;
|
|
|
|
// If there are more mappings at the end of this one, they may be a
|
|
// continuation of the stack.
|
|
LinuxVMAddress stack_end = mapping->range.End();
|
|
const MemoryMap::Mapping* next_mapping;
|
|
while ((next_mapping = memory_map->FindMapping(stack_end)) &&
|
|
ShouldMergeStackMappings(*mapping, *next_mapping)) {
|
|
stack_end = next_mapping->range.End();
|
|
}
|
|
|
|
// The main thread should have an entry in the maps file just for its stack,
|
|
// so we'll assume the base of the stack is at the end of the region. Other
|
|
// threads' stacks may not have their own entries in the maps file if they
|
|
// were user-allocated within a larger mapping, but pthreads places the TLS
|
|
// at the high-address end of the stack so we can try using that to shrink
|
|
// the stack region.
|
|
stack_region_size = stack_end - stack_region_address;
|
|
if (tid != reader->ProcessID() &&
|
|
thread_info.thread_specific_data_address > stack_region_address &&
|
|
thread_info.thread_specific_data_address < stack_end) {
|
|
stack_region_size =
|
|
thread_info.thread_specific_data_address - stack_region_address;
|
|
}
|
|
}
|
|
|
|
ProcessReaderLinux::Module::Module()
|
|
: name(), elf_reader(nullptr), type(ModuleSnapshot::kModuleTypeUnknown) {}
|
|
|
|
ProcessReaderLinux::Module::~Module() = default;
|
|
|
|
ProcessReaderLinux::ProcessReaderLinux()
|
|
: connection_(),
|
|
process_info_(),
|
|
memory_map_(),
|
|
threads_(),
|
|
modules_(),
|
|
elf_readers_(),
|
|
is_64_bit_(false),
|
|
initialized_threads_(false),
|
|
initialized_modules_(false),
|
|
initialized_() {}
|
|
|
|
ProcessReaderLinux::~ProcessReaderLinux() {}
|
|
|
|
bool ProcessReaderLinux::Initialize(PtraceConnection* connection) {
|
|
INITIALIZATION_STATE_SET_INITIALIZING(initialized_);
|
|
DCHECK(connection);
|
|
connection_ = connection;
|
|
|
|
if (!process_info_.InitializeWithPtrace(connection_)) {
|
|
return false;
|
|
}
|
|
|
|
if (!memory_map_.Initialize(connection_)) {
|
|
return false;
|
|
}
|
|
|
|
is_64_bit_ = process_info_.Is64Bit();
|
|
|
|
INITIALIZATION_STATE_SET_VALID(initialized_);
|
|
return true;
|
|
}
|
|
|
|
bool ProcessReaderLinux::StartTime(timeval* start_time) const {
|
|
INITIALIZATION_STATE_DCHECK_VALID(initialized_);
|
|
return process_info_.StartTime(start_time);
|
|
}
|
|
|
|
bool ProcessReaderLinux::CPUTimes(timeval* user_time,
|
|
timeval* system_time) const {
|
|
INITIALIZATION_STATE_DCHECK_VALID(initialized_);
|
|
timerclear(user_time);
|
|
timerclear(system_time);
|
|
|
|
timeval local_user_time;
|
|
timerclear(&local_user_time);
|
|
timeval local_system_time;
|
|
timerclear(&local_system_time);
|
|
|
|
for (const Thread& thread : threads_) {
|
|
ProcStatReader stat;
|
|
if (!stat.Initialize(thread.tid)) {
|
|
return false;
|
|
}
|
|
|
|
timeval thread_user_time;
|
|
if (!stat.UserCPUTime(&thread_user_time)) {
|
|
return false;
|
|
}
|
|
|
|
timeval thread_system_time;
|
|
if (!stat.SystemCPUTime(&thread_system_time)) {
|
|
return false;
|
|
}
|
|
|
|
timeradd(&local_user_time, &thread_user_time, &local_user_time);
|
|
timeradd(&local_system_time, &thread_system_time, &local_system_time);
|
|
}
|
|
|
|
*user_time = local_user_time;
|
|
*system_time = local_system_time;
|
|
return true;
|
|
}
|
|
|
|
const std::vector<ProcessReaderLinux::Thread>& ProcessReaderLinux::Threads() {
|
|
INITIALIZATION_STATE_DCHECK_VALID(initialized_);
|
|
if (!initialized_threads_) {
|
|
InitializeThreads();
|
|
}
|
|
return threads_;
|
|
}
|
|
|
|
const std::vector<ProcessReaderLinux::Module>& ProcessReaderLinux::Modules() {
|
|
INITIALIZATION_STATE_DCHECK_VALID(initialized_);
|
|
if (!initialized_modules_) {
|
|
InitializeModules();
|
|
}
|
|
return modules_;
|
|
}
|
|
|
|
void ProcessReaderLinux::InitializeThreads() {
|
|
DCHECK(threads_.empty());
|
|
initialized_threads_ = true;
|
|
|
|
pid_t pid = ProcessID();
|
|
if (pid == getpid()) {
|
|
// TODO(jperaza): ptrace can't be used on threads in the same thread group.
|
|
// Using clone to create a new thread in it's own thread group doesn't work
|
|
// because glibc doesn't support threads it didn't create via pthreads.
|
|
// Fork a new process to snapshot us and copy the data back?
|
|
LOG(ERROR) << "not implemented";
|
|
return;
|
|
}
|
|
|
|
Thread main_thread;
|
|
main_thread.tid = pid;
|
|
if (main_thread.InitializePtrace(connection_)) {
|
|
main_thread.InitializeStack(this);
|
|
threads_.push_back(main_thread);
|
|
} else {
|
|
LOG(WARNING) << "Couldn't initialize main thread.";
|
|
}
|
|
|
|
char path[32];
|
|
snprintf(path, arraysize(path), "/proc/%d/task", pid);
|
|
bool main_thread_found = false;
|
|
DirectoryReader reader;
|
|
if (!reader.Open(base::FilePath(path))) {
|
|
return;
|
|
}
|
|
base::FilePath tid_str;
|
|
DirectoryReader::Result result;
|
|
while ((result = reader.NextFile(&tid_str)) ==
|
|
DirectoryReader::Result::kSuccess) {
|
|
pid_t tid;
|
|
if (!base::StringToInt(tid_str.value(), &tid)) {
|
|
LOG(ERROR) << "format error";
|
|
continue;
|
|
}
|
|
|
|
if (tid == pid) {
|
|
DCHECK(!main_thread_found);
|
|
main_thread_found = true;
|
|
continue;
|
|
}
|
|
|
|
Thread thread;
|
|
thread.tid = tid;
|
|
if (connection_->Attach(tid) && thread.InitializePtrace(connection_)) {
|
|
thread.InitializeStack(this);
|
|
threads_.push_back(thread);
|
|
}
|
|
}
|
|
DCHECK_EQ(AsUnderlyingType(result),
|
|
AsUnderlyingType(DirectoryReader::Result::kNoMoreFiles));
|
|
DCHECK(main_thread_found);
|
|
}
|
|
|
|
void ProcessReaderLinux::InitializeModules() {
|
|
INITIALIZATION_STATE_DCHECK_VALID(initialized_);
|
|
initialized_modules_ = true;
|
|
|
|
AuxiliaryVector aux;
|
|
if (!aux.Initialize(connection_)) {
|
|
return;
|
|
}
|
|
|
|
LinuxVMAddress phdrs;
|
|
if (!aux.GetValue(AT_PHDR, &phdrs)) {
|
|
return;
|
|
}
|
|
|
|
const MemoryMap::Mapping* exe_mapping;
|
|
if (!(exe_mapping = GetMemoryMap()->FindMapping(phdrs)) ||
|
|
!(exe_mapping = GetMemoryMap()->FindFileMmapStart(*exe_mapping))) {
|
|
return;
|
|
}
|
|
|
|
ProcessMemoryRange range;
|
|
if (!range.Initialize(Memory(), is_64_bit_)) {
|
|
return;
|
|
}
|
|
|
|
auto exe_reader = std::make_unique<ElfImageReader>();
|
|
if (!exe_reader->Initialize(range, exe_mapping->range.Base())) {
|
|
return;
|
|
}
|
|
|
|
LinuxVMAddress debug_address;
|
|
if (!exe_reader->GetDebugAddress(&debug_address)) {
|
|
return;
|
|
}
|
|
|
|
DebugRendezvous debug;
|
|
if (!debug.Initialize(range, debug_address)) {
|
|
return;
|
|
}
|
|
|
|
Module exe = {};
|
|
exe.name = !debug.Executable()->name.empty() ? debug.Executable()->name
|
|
: exe_mapping->name;
|
|
exe.elf_reader = exe_reader.get();
|
|
exe.type = ModuleSnapshot::ModuleType::kModuleTypeExecutable;
|
|
|
|
modules_.push_back(exe);
|
|
elf_readers_.push_back(std::move(exe_reader));
|
|
|
|
LinuxVMAddress loader_base = 0;
|
|
aux.GetValue(AT_BASE, &loader_base);
|
|
|
|
for (const DebugRendezvous::LinkEntry& entry : debug.Modules()) {
|
|
const MemoryMap::Mapping* mapping;
|
|
if (!(mapping = memory_map_.FindMapping(entry.dynamic_array)) ||
|
|
!(mapping = memory_map_.FindFileMmapStart(*mapping))) {
|
|
continue;
|
|
}
|
|
|
|
auto elf_reader = std::make_unique<ElfImageReader>();
|
|
if (!elf_reader->Initialize(range, mapping->range.Base())) {
|
|
continue;
|
|
}
|
|
|
|
Module module = {};
|
|
module.name = !entry.name.empty() ? entry.name : mapping->name;
|
|
module.elf_reader = elf_reader.get();
|
|
module.type = loader_base && elf_reader->Address() == loader_base
|
|
? ModuleSnapshot::kModuleTypeDynamicLoader
|
|
: ModuleSnapshot::kModuleTypeSharedLibrary;
|
|
modules_.push_back(module);
|
|
elf_readers_.push_back(std::move(elf_reader));
|
|
}
|
|
}
|
|
|
|
} // namespace crashpad
|