What's inside the stack?

后端 未结 4 1103
逝去的感伤
逝去的感伤 2021-02-20 07:32

If I run a program, just like

#include 
int main(int argc, char *argv[], char *env[]) {
  printf(\"My references are at %p, %p, %p\\n\", &argc         


        
相关标签:
4条回答
  • 2021-02-20 07:46

    The contents of the stack are basically:

    • Whatever the OS passes to the program.
    • Call frames (also called stack frames, activation areas, ...)

    What does the OS pass to the program? A typical *nix will pass the environment, arguments to the program, possibly some auxiliary information, and pointers to them to be passed to main().

    In Linux, you'll see:

    • a NULL
    • the filename for the program.
    • environment strings
    • argument strings (including argv[0])
    • padding full of zeros
    • the auxv array, used to pass information from the kernel to the program
    • pointers to environment strings, ended by a NULL pointer
    • pointers to argument strings, ended by a NULL pointer
    • argc

    Then, below that are stack frames, which contain:

    • arguments
    • the return address
    • possibly the old value of the frame pointer
    • possibly a canary
    • local variables
    • some padding, for alignment purposes

    How do you know which is which in each stack frame? The compiler knows, so it just treats its location in the stack frame appropriately. Debuggers can use annotations for each function in the form of debug info, if available. Otherwise, if there is a frame pointer, you can identify things relative to it: local variables are below the frame pointer, arguments are above the stack pointer. Otherwise, you must use heuristics, things that look like code addresses are probably code addresses, but sometimes this results in incorrect and annoying stack traces.

    0 讨论(0)
  • 2021-02-20 07:53

    Without some knowledge of the overlay, you only see bits, or numbers. While some of the regions are subject to machine specifics, a large number of the details are pretty standard.

    If you didn't move too far outside of a nested routine, you are probably looking at the call stack portion of memory. With some generally considered "unsafe" C, you can write up fun functions that access function variables a few "calls" above, even if those variables were not "passed" to the function as written in the source code.

    The call stack is a good place to start, as 3rd party libraries must be callable by programs that aren't even written yet. As such, it is fairly standardized.

    Stepping outside of your process memory boundaries will give you the dreaded Segmentation violation, as memory fencing will detect an attempt to access non-authorized memory by the process. Malloc does a little more than "just" return a pointer, on systems with memory segmentation features, it also "marks" the memory accessible to that process and checks all memory accesses that the process assignments are not being violated.

    If you keep following this path, sooner or later, you'll get an interest in either the kernel or the object format. It's much easier to investigate one way of how things are done with Linux, where the source code is available. Having the source code allows you to not reverse-engineer the data structures by looking at their binaries. When starting out, the hard part will be learning how to find the right headers. Later it will be learning how to poke around and possibly change stuff that under non-tinkering conditions you probably shouldn't be changing.

    PS. You might consider this memory "the stack" but after a while, you'll see that really it's just a large slab of accessible memory, with one portion of it being considered the stack...

    0 讨论(0)
  • 2021-02-20 08:06

    The details are very dependent on your environment. The operating system generally defines an ABI, but that's in fact only enforced for syscalls.

    Each language (and each compiler even if they compile the same language) in fact may do some things differently.

    However there is some sort of system-wide convention, at least in the sense of interfacing with dynamically loaded libraries.

    Yet, details vary a lot.

    A very simple "primer" could be http://kernelnewbies.org/ABI

    A very detailed and complete specification you could look at to get an idea of the level of complexity and details that are involved in defining an ABI is "System V Application Binary Interface AMD64 Architecture Processor Supplement" http://www.x86-64.org/documentation/abi.pdf

    0 讨论(0)
  • 2021-02-20 08:07

    The content of the stack will vary depending on the architecture ABI, the compiler, and probably various compiler settings and options.

    A good place to start is the published ABI for your target architecture, then check that your particular compiler conforms to that standard. Ultimately you could analyse the assembler output of the compiler or observe the instruction level operation in your debugger.

    Remember also that a compiler need not initialise the stack, and will certainly not "clear it down", when it has finished with it, so when it is allocated to a process or thread, it might contain any value - even at power-on, SDRAM for example will not contain any specific or predictable value, if the physical RAM address has been previously used by another process since power on or even an earlier called function in the same process, the content will have whatever that process left in it. So just looking at the raw stack does not tell you much.

    Commonly a generic stack frame may contain the address that control will jump to when the function returns, the values of all the parameters passed, and the value of all auto local variables in the function. However the ARM ABI for example passes the first four arguments to a function in registers R0 to R3, and holds the return value of the leaf function in the LR register, so it is not as simple in all cases as the "typical" implementation I have suggested.

    0 讨论(0)
提交回复
热议问题