利用mprotect+backtrace定位故障
利用mprotect保護(hù)椙迮空間:
在操作系統(tǒng)中,進(jìn)程的椬馇模空間(X86_64)默認(rèn)大小:8192KB恩袱。發(fā)生棧溢出時(shí)泣棋,會(huì)產(chǎn)色段錯(cuò)誤。但在協(xié)程中時(shí)畔塔,由于是用戶態(tài)潭辈,保證數(shù)據(jù)安全鸯屿,需要手動(dòng)的對(duì)棧尾進(jìn)行保護(hù)。
利用mprotect保護(hù)棧的Bottom的 page把敢,不允許讀和寫(xiě)
安裝SIGSEGV的信號(hào)處理函數(shù)寄摆,發(fā)生stack overflow時(shí)記錄更多的信息
SIGSEGV handler中需要記錄發(fā)生的:addr 及 backtrace
Boost中分配具有mprotect的棧
// use mmap/mprotect to allocate 512k coroutine stacks
auto make_stack_allocator() {
return boost::context::protected_fixedsize_stack{512*1024};
}
- 安裝信號(hào)處理函數(shù)
注意此處利用本地棧空間修赞,多線程環(huán)境下婶恼,每個(gè)線程需要獨(dú)立的分配棧空間柏副,重裝信號(hào)處理函數(shù)勾邦。
stack_t segv_stack;
segv_stack.ss_sp = valloc(SEGV_STACK_SIZE);
segv_stack.ss_flags = 0;
segv_stack.ss_size = SEGV_STACK_SIZE;
sigaltstack(&segv_stack, NULL);
struct sigaction action;
bzero(&action, sizeof(action));
action.sa_flags = SA_SIGINFO|SA_STACK;
action.sa_sigaction = &sigsegv_handler;
sigaction(SIGSEGV, &action, NULL);
- 信號(hào)處理函數(shù)
static void sigsegv_handler(int signum, siginfo_t *info, void *data) {
std::cout<<" Segment Fault"<<std::endl;
void *addr = info->si_addr;
char buff[256];
int fd = open("./sigsegv.bt",O_CREAT|O_RDWR|O_APPEND);
int len = snprintf(buff,256,"Addr: %p\n",addr);
write(fd,buff,len);
void* array[30];
size_t size = backtrace(array,30);
backtrace_symbols_fd(array,size,fd);
close(fd);
}
測(cè)試?yán)胢protect backtrace定位core dump
原理:
- 對(duì)可能產(chǎn)生內(nèi)存越界或者內(nèi)存無(wú)效訪問(wèn)的區(qū)域做mprotect保護(hù)
- 重新定義SIGSEGV信號(hào)的處理函數(shù),對(duì)此保護(hù)區(qū)域的內(nèi)存讀寫(xiě)都會(huì)產(chǎn)生SIGSEGV信號(hào)割择,在此信號(hào)處理函數(shù)中記錄調(diào)用棧
- mprotect需要頁(yè)對(duì)齊眷篇,valloc分配的是也對(duì)齊的地址,對(duì)于椣峭疲空間可以使用:
char* buffer = (char*)(((int64_t)p) & ~(ps-1)) //ps是pagesize
此處buffer是最靠近地址p的頁(yè)對(duì)齊的地址
- mprotect保護(hù)的區(qū)域铅歼,釋放時(shí)需要恢復(fù)
// SA_RESETHAND: 表示在信號(hào)處理函數(shù)入口處恢復(fù)信號(hào)的默認(rèn)處理句柄,否則SIGSEGV信號(hào)會(huì)無(wú)現(xiàn)產(chǎn)生下去 //或者修復(fù)導(dǎo)致SIGSEGV信號(hào)的問(wèn)題换可,可以繼續(xù)運(yùn)行
struct sigaction action;
bzero(&action, sizeof(action));
action.sa_flags = SA_SIGINFO|SA_RESETHAND;
action.sa_sigaction = &sigsegv_handler;
sigaction(SIGSEGV, &action, NULL);
信號(hào)處理函數(shù),利用backtrace跟蹤程序的調(diào)用棧:
static void sigsegv_handler(int signum, siginfo_t *info, void *data) {
std::cout<<" Segment Fault"<<std::endl;
void *addr = info->si_addr;
char buff[256];
int fd = open("./sigsegv.bt",O_CREAT|O_RDWR|O_APPEND);
int len = snprintf(buff,256,"Addr: %p\n",addr);
write(fd,buff,len);
void* array[30];
size_t size = backtrace(array,30);
backtrace_symbols_fd(array,size,fd);
close(fd);
}
測(cè)試代碼:
#include <cstdlib>
#include <cstdio>
#include <unistd.h>
#include <sys/mman.h>
#include <execinfo.h>
#include <cstring>
#include <fcntl.h>
#include <signal.h>
#include <iostream>
static void sigsegv_handler(int signum, siginfo_t *info, void *data) {
std::cout<<" Segment Fault"<<std::endl;
void *addr = info->si_addr;
char buff[256];
int fd = open("./sigsegv.bt",O_CREAT|O_RDWR|O_APPEND);
int len = snprintf(buff,256,"Addr: %p\n",addr);
write(fd,buff,len);
void* array[30];
size_t size = backtrace(array,30);
backtrace_symbols_fd(array,size,fd);
close(fd);
}
void register_signal(int signum){
struct sigaction action;
bzero(&action, sizeof(action));
sigemptyset(&action.sa_mask);
action.sa_flags = SA_SIGINFO | SA_RESETHAND;
action.sa_sigaction = &sigsegv_handler;
sigaction(signum, &action, NULL);
}
void* core_func(long stack_size){
void *stack = valloc(stack_size);
mprotect(stack, getpagesize(), PROT_NONE);
return stack;
}
void destroy(void* stack){
mprotect(stack, getpagesize(), PROT_READ|PROT_WRITE);
free(stack);
}
int main(int argc,char* argv[]){
register_signal(SIGSEGV);
void* stack = core_func(1024);
std::cout<<"Write"<<std::endl;
*(char *)(stack+10) = 'a';
std::cout<<"Write Done"<<std::endl;
destroy(stack);
}
運(yùn)行結(jié)果:
# ./mp
Write
Segment Fault
段錯(cuò)誤
# cat sigsegv.bt
Addr: 0x97e00a
./mp[0x400c4e]
/lib64/libc.so.6(+0x36400)[0x7f4f1f84f400]
./mp[0x400da4]
/lib64/libc.so.6(__libc_start_main+0xf5)[0x7f4f1f83b555]
./mp[0x400ae9]
利用addr2line定位:
# addr2line -afiCe mp 0x400d3a
0x0000000000400d3a
main
/home/working/cpp/test_mp.cc:48
利用valgrind定位:
# valgrind --leak-check=full ./mp
==9359== Memcheck, a memory error detector
==9359== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==9359== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info
==9359== Command: ./mp
==9359==
Write
Segment Fault
==9359==
==9359== Process terminating with default action of signal 11 (SIGSEGV)
==9359== Bad permissions for mapped region at address 0x5AB400A
==9359== at 0x400DA4: main (test_mp.cc:49)
==9359==
==9359== HEAP SUMMARY:
==9359== in use at exit: 1,024 bytes in 1 blocks
==9359== total heap usage: 3 allocs, 2 frees, 73,784 bytes allocated
==9359==
==9359== 1,024 bytes in 1 blocks are definitely lost in loss record 1 of 1
==9359== at 0x4C2C375: memalign (vg_replace_malloc.c:908)
==9359== by 0x4C2C40A: valloc (vg_replace_malloc.c:956)
==9359== by 0x400CFB: core_func(long) (test_mp.cc:34)
==9359== by 0x400D7B: main (test_mp.cc:47)
==9359==
==9359== LEAK SUMMARY:
==9359== definitely lost: 1,024 bytes in 1 blocks
==9359== indirectly lost: 0 bytes in 0 blocks
==9359== possibly lost: 0 bytes in 0 blocks
==9359== still reachable: 0 bytes in 0 blocks
==9359== suppressed: 0 bytes in 0 blocks
==9359==
==9359== For lists of detected and suppressed errors, rerun with: -s
==9359== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
段錯(cuò)誤
利用gcc asan內(nèi)存檢測(cè):
asan可以檢測(cè):
- 檢查地址相關(guān)問(wèn)題厦幅,包括釋放后使用沾鳄、重復(fù)釋放、堆溢出确憨、棧溢出等等問(wèn)題
- 檢查內(nèi)存泄漏問(wèn)題
- 檢查線程數(shù)據(jù)競(jìng)爭(zhēng)和死鎖問(wèn)題
# g++ --std=c++11 -g -o mp test_mp.cc -fsanitize=address
# ./mp
Write
ASAN:DEADLYSIGNAL
=================================================================
==10792==ERROR: AddressSanitizer: SEGV on unknown address 0x62500000100a (pc 0x00000040160b bp 0x7ffc4c685c60 sp 0x7ffc4c685c40 T0)
==10792==The signal is caused by a WRITE memory access.
#0 0x40160a in main /home/working/cpp/test_mp.cc:49
#1 0x7f1570d02554 in __libc_start_main (/lib64/libc.so.6+0x22554)
#2 0x401038 (/home/working/cpp/mp+0x401038)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/working/cpp/test_mp.cc:49 in main
==10792==ABORTING
addr2line
可以定位出現(xiàn)core dump的代碼位置译荞。用例如下:
示例代碼,overflow休弃,段錯(cuò)誤吞歼。
int main(void) {
char *str;
/* Stored in read only part of data segment */
str = "over flow";
/* Problem: trying to modify read only memory */
*(str + 1) = 'n';
return 0;
}
產(chǎn)生
編譯:
g++ -ggdb -o test test_mprotect
dmesg -C #清空緩存日志
./test # 產(chǎn)生core dump`
查看dmesg信息:
# dmesg
[3381707.691606] test[19966]: segfault at 4005a5 ip 000000000040050b sp 00007ffd68b27aa0 error 7 in test[400000+1000]
可見(jiàn)出現(xiàn)core dump的位置位于: 000000000040050b
利用addr2line定位代碼位置:
addr2line -afiCe test 000000000040050b
0x000000000040050b
main
/home/working/cpp/test_mprotect.cc:8