Index: src/processor/stackwalker_amd64_unittest.cc |
diff --git a/src/processor/stackwalker_amd64_unittest.cc b/src/processor/stackwalker_amd64_unittest.cc |
index a54198bfd0af560b264a9c007dbba62cd2c7f93e..23f38f70b4a0e2289d9eabc8ae0691efa6641ade 100644 |
--- a/src/processor/stackwalker_amd64_unittest.cc |
+++ b/src/processor/stackwalker_amd64_unittest.cc |
@@ -370,6 +370,138 @@ TEST_F(GetCallerFrame, ScanWithFunctionSymbols) { |
EXPECT_EQ(0x50000000b0000100ULL, frame1->function_base); |
} |
+// StackwalkerAMD64::GetCallerByFramePointerRecovery should never return an |
+// instruction pointer of 0 because IP of 0 is an end of stack marker and the |
+// stack walk may be terminated prematurely. Instead it should return NULL |
+// so that the stack walking code can proceed to stack scanning. |
+TEST_F(GetCallerFrame, GetCallerByFramePointerRecovery) { |
+ MockCodeModule user32_dll(0x00007ff9cb8a0000ULL, 0x14E000, "user32.dll", |
+ "version1"); |
+ SetModuleSymbols(&user32_dll, // user32.dll |
+ "PUBLIC fa60 0 DispatchMessageWorker\n" |
+ "PUBLIC fee0 0 UserCallWinProcCheckWow\n" |
+ "PUBLIC 1cdb0 0 _fnHkINLPMSG\n" |
+ "STACK CFI INIT fa60 340 .cfa: $rsp .ra: .cfa 8 - ^\n" |
+ "STACK CFI fa60 .cfa: $rsp 128 +\n" |
+ "STACK CFI INIT fee0 49f .cfa: $rsp .ra: .cfa 8 - ^\n" |
+ "STACK CFI fee0 .cfa: $rsp 240 +\n" |
+ "STACK CFI INIT 1cdb0 9f .cfa: $rsp .ra: .cfa 8 - ^\n" |
+ "STACK CFI 1cdb0 .cfa: $rsp 80 +\n"); |
+ |
+ // Create some modules with some stock debugging information. |
+ MockCodeModules local_modules; |
+ local_modules.Add(&user32_dll); |
+ |
+ Label frame0_rsp; |
+ Label frame0_rbp; |
+ Label frame1_rsp; |
+ Label frame2_rsp; |
+ |
+ stack_section.start() = 0x00000099abf0f238ULL; |
+ stack_section |
+ .Mark(&frame0_rsp) |
+ .D64(0x00007ff9cb8b00dcULL) |
+ .Mark(&frame1_rsp) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000001ULL) |
+ .D64(0x00000099abf0f308ULL) |
+ .D64(0x00007ff9cb8bce3aULL) // Stack residue from execution of |
+ // user32!_fnHkINLPMSG+0x8a |
+ .D64(0x000000000000c2e0ULL) |
+ .D64(0x00000099abf0f328ULL) |
+ .D64(0x0000000100000001ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x00007ff9ccad53e4ULL) |
+ .D64(0x0000000000000048ULL) |
+ .D64(0x0000000000000001ULL) |
+ .D64(0x00000099abf0f5e0ULL) |
+ .D64(0x00000099b61f7388ULL) |
+ .D64(0x0000000000000030ULL) |
+ .D64(0xffffff66540f0a1fULL) |
+ .D64(0xffffff6649e08c77ULL) |
+ .D64(0x00007ff9cb8affb4ULL) // Return address in |
+ // user32!UserCallWinProcCheckWow+0xd4 |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x00000099abf0f368ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x0000000000000000ULL) |
+ .D64(0x00000099a8150fd8ULL) |
+ .D64(0x00000099abf0f3e8ULL) |
+ .D64(0x00007ff9cb8afc07ULL) // Return address in |
+ // user32!DispatchMessageWorker+0x1a7 |
+ .Mark(&frame2_rsp) |
+ .Append(256, 0) |
+ .Mark(&frame0_rbp) // The following are expected by |
+ // GetCallerByFramePointerRecovery. |
+ .D64(0xfffffffffffffffeULL) // %caller_rbp = *(%callee_rbp) |
+ .D64(0x0000000000000000ULL) // %caller_rip = *(%callee_rbp + 8) |
+ .D64(0x00000099a3e31040ULL) // %caller_rsp = *(%callee_rbp + 16) |
+ .Append(256, 0); |
+ |
+ RegionFromSection(); |
+ raw_context.rip = 0x00000099a8150fd8ULL; // IP in context frame is guarbage |
+ raw_context.rsp = frame0_rsp.Value(); |
+ raw_context.rbp = frame0_rbp.Value(); |
+ |
+ StackFrameSymbolizer frame_symbolizer(&supplier, &resolver); |
+ StackwalkerAMD64 walker(&system_info, &raw_context, &stack_region, |
+ &local_modules, &frame_symbolizer); |
+ vector<const CodeModule*> modules_without_symbols; |
+ vector<const CodeModule*> modules_with_corrupt_symbols; |
+ ASSERT_TRUE(walker.Walk(&call_stack, &modules_without_symbols, |
+ &modules_with_corrupt_symbols)); |
+ ASSERT_EQ(0U, modules_without_symbols.size()); |
+ ASSERT_EQ(0U, modules_with_corrupt_symbols.size()); |
+ frames = call_stack.frames(); |
+ |
+ ASSERT_EQ(3U, frames->size()); |
+ |
+ { // To avoid reusing locals by mistake |
+ StackFrameAMD64 *frame = static_cast<StackFrameAMD64 *>(frames->at(0)); |
+ EXPECT_EQ(StackFrame::FRAME_TRUST_CONTEXT, frame->trust); |
+ ASSERT_EQ(StackFrameAMD64::CONTEXT_VALID_ALL, frame->context_validity); |
+ EXPECT_EQ("", frame->function_name); |
+ EXPECT_EQ(0x00000099a8150fd8ULL, frame->instruction); |
+ EXPECT_EQ(0x00000099a8150fd8ULL, frame->context.rip); |
+ EXPECT_EQ(frame0_rsp.Value(), frame->context.rsp); |
+ EXPECT_EQ(frame0_rbp.Value(), frame->context.rbp); |
+ } |
+ |
+ { // To avoid reusing locals by mistake |
+ StackFrameAMD64 *frame = static_cast<StackFrameAMD64 *>(frames->at(1)); |
+ EXPECT_EQ(StackFrame::FRAME_TRUST_SCAN, frame->trust); |
+ ASSERT_EQ((StackFrameAMD64::CONTEXT_VALID_RIP | |
+ StackFrameAMD64::CONTEXT_VALID_RSP | |
+ StackFrameAMD64::CONTEXT_VALID_RBP), |
+ frame->context_validity); |
+ EXPECT_EQ("UserCallWinProcCheckWow", frame->function_name); |
+ EXPECT_EQ(140710838468828ULL, frame->instruction + 1); |
+ EXPECT_EQ(140710838468828ULL, frame->context.rip); |
+ EXPECT_EQ(frame1_rsp.Value(), frame->context.rsp); |
+ EXPECT_EQ(&user32_dll, frame->module); |
+ } |
+ |
+ { // To avoid reusing locals by mistake |
+ StackFrameAMD64 *frame = static_cast<StackFrameAMD64 *>(frames->at(2)); |
+ EXPECT_EQ(StackFrame::FRAME_TRUST_CFI, frame->trust); |
+ ASSERT_EQ((StackFrameAMD64::CONTEXT_VALID_RIP | |
+ StackFrameAMD64::CONTEXT_VALID_RSP | |
+ StackFrameAMD64::CONTEXT_VALID_RBP), |
+ frame->context_validity); |
+ EXPECT_EQ("DispatchMessageWorker", frame->function_name); |
+ EXPECT_EQ(140710838467591ULL, frame->instruction + 1); |
+ EXPECT_EQ(140710838467591ULL, frame->context.rip); |
+ EXPECT_EQ(frame2_rsp.Value(), frame->context.rsp); |
+ EXPECT_EQ(&user32_dll, frame->module); |
+ } |
+} |
+ |
// Test that set_max_frames_scanned prevents using stack scanning |
// to find caller frames. |
TEST_F(GetCallerFrame, ScanningNotAllowed) { |