我是为Android编写的(仅限ARM),但我相信通用Linux的原理也是如此。
我试图从信号处理程序中捕获堆栈跟踪,以便我可以在应用程序崩溃时记录它。这就是我使用<unwind.h>
提出的建议
初始化:
struct sigaction signalhandlerDescriptor;
memset(&signalhandlerDescriptor, 0, sizeof(signalhandlerDescriptor));
signalhandlerDescriptor.sa_flags = SA_SIGINFO;
signalhandlerDescriptor._u._sa_sigaction = signalHandler;
sigaction(SIGSEGV, &signalhandlerDescriptor, 0);
代码本身:
struct BacktraceState
{
void** current;
void** end;
void* pc;
};
inline _Unwind_Reason_Code unwindCallback(struct _Unwind_Context* context, void* arg)
{
BacktraceState* state = static_cast<BacktraceState*>(arg);
state->pc = (void*)_Unwind_GetIP(context);
if (state->pc)
{
if (state->current == state->end)
return _URC_END_OF_STACK;
else
*state->current++ = reinterpret_cast<void*>(state->pc);
}
return _URC_NO_REASON;
}
inline size_t captureBacktrace(void** addrs, size_t max, unsigned long pc)
{
BacktraceState state = {addrs, addrs + max, (void*)pc};
_Unwind_Backtrace(unwindCallback, &state);
personality_routine();
return state.current - addrs;
}
inline void dumpBacktrace(std::ostream& os, void** addrs, size_t count)
{
for (size_t idx = 0; idx < count; ++idx) {
const void* addr = addrs[idx];
const char* symbol = "";
Dl_info info;
if (dladdr(addr, &info) && info.dli_sname) {
symbol = info.dli_sname;
}
int status = -3;
char * demangledName = abi::__cxa_demangle(symbol, 0, 0, &status);
os << "#" << idx << ": " << addr << " " << (status == 0 ? demangledName : symbol) << "\n";
free(demangledName);
}
}
void signalHandler(int sig, siginfo_t *siginfo, void *uctx)
{
ucontext * context = (ucontext*)uctx;
unsigned long PC = context->uc_mcontext.arm_pc;
unsigned long SP = context->uc_mcontext.arm_sp;
Logger() << __PRETTY_FUNCTION__ << "Fatal signal:" << sig;
const size_t maxNumAddresses = 50;
void* addresses[maxNumAddresses];
std::ostringstream oss;
const size_t actualNumAddresses = captureBacktrace(addresses, maxNumAddresses, PC);
dumpBacktrace(oss, addresses, actualNumAddresses);
Logger() << oss.str();
exit(EXIT_FAILURE);
}
问题:如果我通过调用_Unwind_GetIP(context)
中的unwindCallback
来获取PC寄存器,我将获得信号处理程序堆栈的完整跟踪 。这是一个单独的堆栈,这显然不是我想要的。所以我尝试从信号处理程序中的ucontext
提供PC,得到一个奇怪的结果:我得到一个堆栈条目,它是正确的条目 - 首先导致信号的函数。但它记录了两次(即使地址是相同的,所以它不是一个符号名称查找bug)。显然,这还不够好 - 我需要整个堆栈。而且我想知道这个结果是否只是偶然的(也就是说,它不应该起作用。
现在,我读到我还需要提供堆栈指针,我显然可以从ucontext
获得,与PC相同。但我不知道如何处理它。我是否必须手动展开而不是使用_Unwind_Backtrace
?如果是这样,你能给我样例代码吗?我一直在寻找一天中的大部分时间,但仍然找不到任何我可以复制并粘贴到我的项目中的内容。
对于它的价值,这里的libunwind来源包含_Unwind_Backtrace
定义。如果我看到它的来源,我觉得我可以想出一些东西,但它比我预期的要复杂得多。
答案 0 :(得分:1)
首先,您需要阅读“异步信号安全”功能部分:
http://man7.org/linux/man-pages/man7/signal.7.html
这是在信号处理程序中安全调用的整套函数。关于你可以做的最糟糕的事情就是调用任何调用malloc()/ free()的东西 - 或者自己动手。
其次,首先让它在信号处理程序之外工作。
第三,这些可能是适用的:
答案 1 :(得分:1)
为了获得导致SIGSEGV而不是信号处理程序的堆栈跟踪的代码的堆栈跟踪,您必须从ucontext_t
获取ARM寄存器并使用它们进行展开。
但_Unwind_Backtrace()
很难做到。因此,如果您使用libc ++(LLVM STL),最好为32位ARM尝试预编译libunwind
,与现代Android NDK捆绑在一起(sources/cxx-stl/llvm-libc++/libs/armeabi-v7a/libunwind.a
)。这是一个示例代码。
// This method can only be used on 32-bit ARM with libc++ (LLVM STL).
// Android NDK r16b contains "libunwind.a" for armeabi-v7a ABI.
// This library is even silently linked in by the ndk-build,
// so we don't have to add it manually in "Android.mk".
// We can use this library, but we need matching headers,
// namely "libunwind.h" and "__libunwind_config.h".
// For NDK r16b, the headers can be fetched here:
// https://android.googlesource.com/platform/external/libunwind_llvm/+/ndk-r16/include/
#if _LIBCPP_VERSION && __has_include("libunwind.h")
#include "libunwind.h"
#endif
struct BacktraceState {
const ucontext_t* signal_ucontext;
size_t address_count = 0;
static const size_t address_count_max = 30;
uintptr_t addresses[address_count_max] = {};
BacktraceState(const ucontext_t* ucontext) : signal_ucontext(ucontext) {}
bool AddAddress(uintptr_t ip) {
// No more space in the storage. Fail.
if (address_count >= address_count_max)
return false;
// Reset the Thumb bit, if it is set.
const uintptr_t thumb_bit = 1;
ip &= ~thumb_bit;
// Ignore null addresses.
if (ip == 0)
return true;
// Finally add the address to the storage.
addresses[address_count++] = ip;
return true;
}
};
void CaptureBacktraceUsingLibUnwind(BacktraceState* state) {
assert(state);
// Initialize unw_context and unw_cursor.
unw_context_t unw_context = {};
unw_getcontext(&unw_context);
unw_cursor_t unw_cursor = {};
unw_init_local(&unw_cursor, &unw_context);
// Get more contexts.
const ucontext_t* signal_ucontext = state->signal_ucontext;
assert(signal_ucontext);
const sigcontext* signal_mcontext = &(signal_ucontext->uc_mcontext);
assert(signal_mcontext);
// Set registers.
unw_set_reg(&unw_cursor, UNW_ARM_R0, signal_mcontext->arm_r0);
unw_set_reg(&unw_cursor, UNW_ARM_R1, signal_mcontext->arm_r1);
unw_set_reg(&unw_cursor, UNW_ARM_R2, signal_mcontext->arm_r2);
unw_set_reg(&unw_cursor, UNW_ARM_R3, signal_mcontext->arm_r3);
unw_set_reg(&unw_cursor, UNW_ARM_R4, signal_mcontext->arm_r4);
unw_set_reg(&unw_cursor, UNW_ARM_R5, signal_mcontext->arm_r5);
unw_set_reg(&unw_cursor, UNW_ARM_R6, signal_mcontext->arm_r6);
unw_set_reg(&unw_cursor, UNW_ARM_R7, signal_mcontext->arm_r7);
unw_set_reg(&unw_cursor, UNW_ARM_R8, signal_mcontext->arm_r8);
unw_set_reg(&unw_cursor, UNW_ARM_R9, signal_mcontext->arm_r9);
unw_set_reg(&unw_cursor, UNW_ARM_R10, signal_mcontext->arm_r10);
unw_set_reg(&unw_cursor, UNW_ARM_R11, signal_mcontext->arm_fp);
unw_set_reg(&unw_cursor, UNW_ARM_R12, signal_mcontext->arm_ip);
unw_set_reg(&unw_cursor, UNW_ARM_R13, signal_mcontext->arm_sp);
unw_set_reg(&unw_cursor, UNW_ARM_R14, signal_mcontext->arm_lr);
unw_set_reg(&unw_cursor, UNW_ARM_R15, signal_mcontext->arm_pc);
unw_set_reg(&unw_cursor, UNW_REG_IP, signal_mcontext->arm_pc);
unw_set_reg(&unw_cursor, UNW_REG_SP, signal_mcontext->arm_sp);
// unw_step() does not return the first IP.
state->AddAddress(signal_mcontext->arm_pc);
// Unwind frames one by one, going up the frame stack.
while (unw_step(&unw_cursor) > 0) {
unw_word_t ip = 0;
unw_get_reg(&unw_cursor, UNW_REG_IP, &ip);
bool ok = state->AddAddress(ip);
if (!ok)
break;
}
}
void SigActionHandler(int sig, siginfo_t* info, void* ucontext) {
const ucontext_t* signal_ucontext = (const ucontext_t*)ucontext;
assert(signal_ucontext);
BacktraceState backtrace_state(signal_ucontext);
CaptureBacktraceUsingLibUnwind(&backtrace_state);
// Do something with the backtrace - print, save to file, etc.
}
我也建议我看一下这个包含更多代码和更多信息的答案:
https://stackoverflow.com/a/50027799/1016580
如果您使用libstdc ++(GNU STL),请使用Vasily Galkin的解决方案:
https://stackoverflow.com/a/30515756/1016580
,这与其他帖子的Dar Hoo解决方案相同:
答案 2 :(得分:0)
作为在 arm-linux-eabihf 上工作的信号处理程序(例如从一个异常抛出)展开的一部分,我还从信号处理程序中获得了工作回溯。
我很确定这是 glibc 特定的,因此不能在 Android 上运行,但也许它可以被改编或对灵感有用:https://github.com/mvduin/arm-signal-unwind