1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294
|
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef BASE_DEBUG_STACK_TRACE_H_
#define BASE_DEBUG_STACK_TRACE_H_
#include <stddef.h>
#include <array>
#include <iosfwd>
#include <string>
#include "base/base_export.h"
#include "base/containers/span.h"
#include "base/debug/debugging_buildflags.h"
#include "base/memory/raw_ptr.h"
#include "base/strings/cstring_view.h"
#include "build/build_config.h"
#if BUILDFLAG(IS_POSIX)
#if !BUILDFLAG(IS_NACL)
#include <signal.h>
#endif
#include <unistd.h>
#endif
#if BUILDFLAG(IS_WIN)
struct _EXCEPTION_POINTERS;
struct _CONTEXT;
#endif
namespace base::debug {
// Enables stack dump to console output on exception and signals.
// When enabled, the process will quit immediately. This is meant to be used in
// unit_tests only! This is not thread-safe: only call from main thread.
// In sandboxed processes, this has to be called before the sandbox is turned
// on.
// Calling this function on Linux opens /proc/self/maps and caches its
// contents. In non-official builds, this function also opens the object files
// that are loaded in memory and caches their file descriptors (this cannot be
// done in official builds because it has security implications).
BASE_EXPORT bool EnableInProcessStackDumping();
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_NACL)
// Sets a first-chance callback for the stack dump signal handler. This callback
// is called at the beginning of the signal handler to handle special kinds of
// signals, like out-of-bounds memory accesses in WebAssembly (WebAssembly Trap
// Handler).
// {SetStackDumpFirstChanceCallback} returns {true} if the callback
// has been set correctly. It returns {false} if the stack dump signal handler
// has not been registered with the OS, e.g. because of ASAN.
BASE_EXPORT bool SetStackDumpFirstChanceCallback(bool (*handler)(int,
siginfo_t*,
void*));
#endif
// Returns end of the stack, or 0 if we couldn't get it.
#if BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS)
BASE_EXPORT uintptr_t GetStackEnd();
#endif
// A stacktrace can be helpful in debugging. For example, you can include a
// stacktrace member in a object (probably around #ifndef NDEBUG) so that you
// can later see where the given object was created from.
class BASE_EXPORT StackTrace {
public:
// LINT.IfChange(max_stack_frames)
#if BUILDFLAG(IS_ANDROID)
// TODO(crbug.com/41437515): Testing indicates that Android has issues
// with a larger value here, so leave Android at 62.
static constexpr size_t kMaxTraces = 62;
#else
// For other platforms, use 250. This seems reasonable without
// being huge.
static constexpr size_t kMaxTraces = 250;
#endif
// LINT.ThenChange(dwarf_line_no.cc:max_stack_frames)
// Creates a stacktrace from the current location.
StackTrace();
// Creates a stacktrace from the current location, of up to |count| entries.
// |count| will be limited to at most |kMaxTraces|.
explicit StackTrace(size_t count);
// Creates a stacktrace from an existing array of instruction pointers (such
// as returned by Addresses()). Only the first `kMaxTraces` of the span will
// be used.
explicit StackTrace(span<const void* const> trace);
#if BUILDFLAG(IS_WIN)
// Creates a stacktrace for an exception.
// Note: this function will throw an import not found (StackWalk64) exception
// on system without dbghelp 5.1.
StackTrace(_EXCEPTION_POINTERS* exception_pointers);
StackTrace(const _CONTEXT* context);
#endif
// Returns true if this current test environment is expected to have
// symbolized frames when printing a stack trace.
static bool WillSymbolizeToStreamForTesting();
// Copying and assignment are allowed with the default functions.
// Gets an array of instruction pointer values. |*count| will be set to the
// number of elements in the returned array. Addresses()[0] will contain an
// address from the leaf function, and Addresses()[count-1] will contain an
// address from the root function (i.e.; the thread's entry point).
span<const void* const> addresses() const {
return span(trace_).first(count_);
}
// Prints the stack trace to stderr.
void Print() const;
// Prints the stack trace to stderr, prepending the given string before
// each output line.
void PrintWithPrefix(cstring_view prefix_string) const;
#if !defined(__UCLIBC__) && !defined(_AIX)
// Resolves backtrace to symbols and write to stream.
void OutputToStream(std::ostream* os) const;
// Resolves backtrace to symbols and write to stream, with the provided
// prefix string prepended to each line.
void OutputToStreamWithPrefix(std::ostream* os,
cstring_view prefix_string) const;
#endif
// Resolves backtrace to symbols and returns as string.
std::string ToString() const;
// Resolves backtrace to symbols and returns as string, prepending the
// provided prefix string to each line.
std::string ToStringWithPrefix(cstring_view prefix_string) const;
// Sets a message to be emitted in place of symbolized stack traces. When
// such a message is provided, collection and symbolization of stack traces
// is suppressed. Suppression is cancelled if `message` is empty.
static void SuppressStackTracesWithMessageForTesting(std::string message);
private:
// Prints `message` with an optional prefix.
static void PrintMessageWithPrefix(cstring_view prefix_string,
cstring_view message);
void PrintWithPrefixImpl(cstring_view prefix_string) const;
#if !defined(__UCLIBC__) && !defined(_AIX)
void OutputToStreamWithPrefixImpl(std::ostream* os,
cstring_view prefix_string) const;
#endif
// Returns true if generation of symbolized stack traces is to be suppressed.
static bool ShouldSuppressOutput();
#if BUILDFLAG(IS_WIN)
void InitTrace(const _CONTEXT* context_record);
#endif
std::array<const void*, kMaxTraces> trace_;
// The number of valid frames in |trace_|, or 0 if collection was suppressed.
size_t count_ = 0;
};
// Forwards to StackTrace::OutputToStream().
BASE_EXPORT std::ostream& operator<<(std::ostream& os, const StackTrace& s);
// Record a stack trace with up to |count| frames into |trace|. Returns the
// number of frames read.
BASE_EXPORT size_t CollectStackTrace(span<const void*> trace);
// A helper for tests that must either override the default suppression of
// symbolized stack traces in death tests, or the default generation of them in
// normal tests.
class BASE_EXPORT OverrideStackTraceOutputForTesting {
public:
enum class Mode {
kUnset,
kForceOutput,
kSuppressOutput,
};
explicit OverrideStackTraceOutputForTesting(Mode mode);
OverrideStackTraceOutputForTesting(
const OverrideStackTraceOutputForTesting&) = delete;
OverrideStackTraceOutputForTesting& operator=(
const OverrideStackTraceOutputForTesting&) = delete;
~OverrideStackTraceOutputForTesting();
};
#if BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS)
// For stack scanning to be efficient it's very important for the thread to
// be started by Chrome. In that case we naturally terminate unwinding once
// we reach the origin of the stack (i.e. GetStackEnd()). If the thread is
// not started by Chrome (e.g. Android's main thread), then we end up always
// scanning area at the origin of the stack, wasting time and not finding any
// frames (since Android libraries don't have frame pointers). Scanning is not
// enabled on other posix platforms due to legacy reasons.
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
constexpr bool kEnableScanningByDefault = true;
#else
constexpr bool kEnableScanningByDefault = false;
#endif
// Traces the stack by using frame pointers. This function is faster but less
// reliable than StackTrace. It should work for debug and profiling builds,
// but not for release builds (although there are some exceptions).
//
// Writes at most |max_depth| frames (instruction pointers) into |out_trace|
// after skipping |skip_initial| frames. Note that the function itself is not
// added to the trace so |skip_initial| should be 0 in most cases.
// Returns number of frames written. |enable_scanning| enables scanning on
// platforms that do not enable scanning by default.
BASE_EXPORT size_t
TraceStackFramePointers(span<const void*> out_trace,
size_t skip_initial,
bool enable_scanning = kEnableScanningByDefault);
// Links stack frame |fp| to |parent_fp|, so that during stack unwinding
// TraceStackFramePointers() visits |parent_fp| after visiting |fp|.
// Both frame pointers must come from __builtin_frame_address().
// Destructor restores original linkage of |fp| to avoid corrupting caller's
// frame register on return.
//
// This class can be used to repair broken stack frame chain in cases
// when execution flow goes into code built without frame pointers:
//
// void DoWork() {
// Call_SomeLibrary();
// }
// static __thread void* g_saved_fp;
// void Call_SomeLibrary() {
// g_saved_fp = __builtin_frame_address(0);
// some_library_call(...); // indirectly calls SomeLibrary_Callback()
// }
// void SomeLibrary_Callback() {
// ScopedStackFrameLinker linker(__builtin_frame_address(0), g_saved_fp);
// ...
// TraceStackFramePointers(...);
// }
//
// This produces the following trace:
//
// #0 SomeLibrary_Callback()
// #1 <address of the code inside SomeLibrary that called #0>
// #2 DoWork()
// ...rest of the trace...
//
// SomeLibrary doesn't use frame pointers, so when SomeLibrary_Callback()
// is called, stack frame register contains bogus value that becomes callback'
// parent frame address. Without ScopedStackFrameLinker unwinding would've
// stopped at that bogus frame address yielding just two first frames (#0, #1).
// ScopedStackFrameLinker overwrites callback's parent frame address with
// Call_SomeLibrary's frame, so unwinder produces full trace without even
// noticing that stack frame chain was broken.
class BASE_EXPORT ScopedStackFrameLinker {
public:
ScopedStackFrameLinker(void* fp, void* parent_fp);
ScopedStackFrameLinker(const ScopedStackFrameLinker&) = delete;
ScopedStackFrameLinker& operator=(const ScopedStackFrameLinker&) = delete;
~ScopedStackFrameLinker();
private:
raw_ptr<void> fp_;
raw_ptr<void> parent_fp_;
raw_ptr<void> original_parent_fp_;
};
#endif // BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS)
namespace internal {
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID)
// POSIX doesn't define any async-signal safe function for converting
// an integer to ASCII. We'll have to define our own version.
// itoa_r() converts a (signed) integer to ASCII. It returns "buf", if the
// conversion was successful or NULL otherwise. It never writes more than "sz"
// bytes. Output will be truncated as needed, and a NUL character is always
// appended.
BASE_EXPORT void itoa_r(intptr_t i,
int base,
size_t padding,
base::span<char> buf);
#endif // BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID)
} // namespace internal
} // namespace base::debug
#endif // BASE_DEBUG_STACK_TRACE_H_
|