OLD | NEW |
| (Empty) |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "components/crash/app/breakpad_win.h" | |
6 | |
7 #include <windows.h> | |
8 #include <shellapi.h> | |
9 #include <tchar.h> | |
10 #include <userenv.h> | |
11 #include <winnt.h> | |
12 | |
13 #include <algorithm> | |
14 #include <map> | |
15 #include <vector> | |
16 | |
17 #include "base/base_switches.h" | |
18 #include "base/basictypes.h" | |
19 #include "base/command_line.h" | |
20 #include "base/debug/crash_logging.h" | |
21 #include "base/debug/dump_without_crashing.h" | |
22 #include "base/environment.h" | |
23 #include "base/memory/scoped_ptr.h" | |
24 #include "base/numerics/safe_conversions.h" | |
25 #include "base/strings/string16.h" | |
26 #include "base/strings/string_split.h" | |
27 #include "base/strings/string_util.h" | |
28 #include "base/strings/stringprintf.h" | |
29 #include "base/strings/utf_string_conversions.h" | |
30 #include "base/synchronization/lock.h" | |
31 #include "base/win/metro.h" | |
32 #include "base/win/pe_image.h" | |
33 #include "base/win/registry.h" | |
34 #include "base/win/win_util.h" | |
35 #include "breakpad/src/client/windows/handler/exception_handler.h" | |
36 #include "components/crash/app/crash_keys_win.h" | |
37 #include "components/crash/app/crash_reporter_client.h" | |
38 #include "components/crash/app/hard_error_handler_win.h" | |
39 #include "content/public/common/result_codes.h" | |
40 #include "sandbox/win/src/nt_internals.h" | |
41 #include "sandbox/win/src/sidestep/preamble_patcher.h" | |
42 | |
43 // userenv.dll is required for GetProfileType(). | |
44 #pragma comment(lib, "userenv.lib") | |
45 | |
46 #pragma intrinsic(_AddressOfReturnAddress) | |
47 #pragma intrinsic(_ReturnAddress) | |
48 | |
49 #ifdef _WIN64 | |
50 // See http://msdn.microsoft.com/en-us/library/ddssxxy8.aspx | |
51 typedef struct _UNWIND_INFO { | |
52 unsigned char Version : 3; | |
53 unsigned char Flags : 5; | |
54 unsigned char SizeOfProlog; | |
55 unsigned char CountOfCodes; | |
56 unsigned char FrameRegister : 4; | |
57 unsigned char FrameOffset : 4; | |
58 ULONG ExceptionHandler; | |
59 } UNWIND_INFO, *PUNWIND_INFO; | |
60 #endif | |
61 | |
62 namespace breakpad { | |
63 | |
64 using crash_reporter::GetCrashReporterClient; | |
65 | |
66 namespace { | |
67 | |
68 // Minidump with stacks, PEB, TEB, and unloaded module list. | |
69 const MINIDUMP_TYPE kSmallDumpType = static_cast<MINIDUMP_TYPE>( | |
70 MiniDumpWithProcessThreadData | // Get PEB and TEB. | |
71 MiniDumpWithUnloadedModules); // Get unloaded modules when available. | |
72 | |
73 // Minidump with all of the above, plus memory referenced from stack. | |
74 const MINIDUMP_TYPE kLargerDumpType = static_cast<MINIDUMP_TYPE>( | |
75 MiniDumpWithProcessThreadData | // Get PEB and TEB. | |
76 MiniDumpWithUnloadedModules | // Get unloaded modules when available. | |
77 MiniDumpWithIndirectlyReferencedMemory); // Get memory referenced by stack. | |
78 | |
79 // Large dump with all process memory. | |
80 const MINIDUMP_TYPE kFullDumpType = static_cast<MINIDUMP_TYPE>( | |
81 MiniDumpWithFullMemory | // Full memory from process. | |
82 MiniDumpWithProcessThreadData | // Get PEB and TEB. | |
83 MiniDumpWithHandleData | // Get all handle information. | |
84 MiniDumpWithUnloadedModules); // Get unloaded modules when available. | |
85 | |
86 const char kPipeNameVar[] = "CHROME_BREAKPAD_PIPE_NAME"; | |
87 | |
88 const wchar_t kGoogleUpdatePipeName[] = L"\\\\.\\pipe\\GoogleCrashServices\\"; | |
89 const wchar_t kChromePipeName[] = L"\\\\.\\pipe\\ChromeCrashServices"; | |
90 | |
91 // This is the well known SID for the system principal. | |
92 const wchar_t kSystemPrincipalSid[] =L"S-1-5-18"; | |
93 | |
94 google_breakpad::ExceptionHandler* g_breakpad = NULL; | |
95 google_breakpad::ExceptionHandler* g_dumphandler_no_crash = NULL; | |
96 | |
97 #if !defined(_WIN64) | |
98 EXCEPTION_POINTERS g_surrogate_exception_pointers = {0}; | |
99 EXCEPTION_RECORD g_surrogate_exception_record = {0}; | |
100 CONTEXT g_surrogate_context = {0}; | |
101 #endif // !defined(_WIN64) | |
102 | |
103 typedef NTSTATUS (WINAPI* NtTerminateProcessPtr)(HANDLE ProcessHandle, | |
104 NTSTATUS ExitStatus); | |
105 char* g_real_terminate_process_stub = NULL; | |
106 | |
107 } // namespace | |
108 | |
109 // Dumps the current process memory. | |
110 extern "C" void __declspec(dllexport) __cdecl DumpProcess() { | |
111 if (g_breakpad) { | |
112 g_breakpad->WriteMinidump(); | |
113 } | |
114 } | |
115 | |
116 // Used for dumping a process state when there is no crash. | |
117 extern "C" void __declspec(dllexport) __cdecl DumpProcessWithoutCrash() { | |
118 if (g_dumphandler_no_crash) { | |
119 g_dumphandler_no_crash->WriteMinidump(); | |
120 } | |
121 } | |
122 | |
123 namespace { | |
124 | |
125 // We need to prevent ICF from folding DumpForHangDebuggingThread() and | |
126 // DumpProcessWithoutCrashThread() together, since that makes them | |
127 // indistinguishable in crash dumps. We do this by making the function | |
128 // bodies unique, and prevent optimization from shuffling things around. | |
129 MSVC_DISABLE_OPTIMIZE() | |
130 MSVC_PUSH_DISABLE_WARNING(4748) | |
131 | |
132 DWORD WINAPI DumpProcessWithoutCrashThread(void*) { | |
133 DumpProcessWithoutCrash(); | |
134 return 0; | |
135 } | |
136 | |
137 // The following two functions do exactly the same thing as the two above. But | |
138 // we want the signatures to be different so that we can easily track them in | |
139 // crash reports. | |
140 // TODO(yzshen): Remove when enough information is collected and the hang rate | |
141 // of pepper/renderer processes is reduced. | |
142 DWORD WINAPI DumpForHangDebuggingThread(void*) { | |
143 DumpProcessWithoutCrash(); | |
144 VLOG(1) << "dumped for hang debugging"; | |
145 return 0; | |
146 } | |
147 | |
148 MSVC_POP_WARNING() | |
149 MSVC_ENABLE_OPTIMIZE() | |
150 | |
151 } // namespace | |
152 | |
153 // Injects a thread into a remote process to dump state when there is no crash. | |
154 extern "C" HANDLE __declspec(dllexport) __cdecl | |
155 InjectDumpProcessWithoutCrash(HANDLE process) { | |
156 return CreateRemoteThread(process, NULL, 0, DumpProcessWithoutCrashThread, | |
157 0, 0, NULL); | |
158 } | |
159 | |
160 extern "C" HANDLE __declspec(dllexport) __cdecl | |
161 InjectDumpForHangDebugging(HANDLE process) { | |
162 return CreateRemoteThread(process, NULL, 0, DumpForHangDebuggingThread, | |
163 0, 0, NULL); | |
164 } | |
165 | |
166 // Returns a string containing a list of all modifiers for the loaded profile. | |
167 std::wstring GetProfileType() { | |
168 std::wstring profile_type; | |
169 DWORD profile_bits = 0; | |
170 if (::GetProfileType(&profile_bits)) { | |
171 static const struct { | |
172 DWORD bit; | |
173 const wchar_t* name; | |
174 } kBitNames[] = { | |
175 { PT_MANDATORY, L"mandatory" }, | |
176 { PT_ROAMING, L"roaming" }, | |
177 { PT_TEMPORARY, L"temporary" }, | |
178 }; | |
179 for (size_t i = 0; i < arraysize(kBitNames); ++i) { | |
180 const DWORD this_bit = kBitNames[i].bit; | |
181 if ((profile_bits & this_bit) != 0) { | |
182 profile_type.append(kBitNames[i].name); | |
183 profile_bits &= ~this_bit; | |
184 if (profile_bits != 0) | |
185 profile_type.append(L", "); | |
186 } | |
187 } | |
188 } else { | |
189 DWORD last_error = ::GetLastError(); | |
190 base::SStringPrintf(&profile_type, L"error %u", last_error); | |
191 } | |
192 return profile_type; | |
193 } | |
194 | |
195 namespace { | |
196 | |
197 // This callback is used when we want to get a dump without crashing the | |
198 // process. | |
199 bool DumpDoneCallbackWhenNoCrash(const wchar_t*, const wchar_t*, void*, | |
200 EXCEPTION_POINTERS* ex_info, | |
201 MDRawAssertionInfo*, bool succeeded) { | |
202 GetCrashReporterClient()->RecordCrashDumpAttemptResult( | |
203 false /* is_real_crash */, succeeded); | |
204 return true; | |
205 } | |
206 | |
207 // This callback is executed when the browser process has crashed, after | |
208 // the crash dump has been created. We need to minimize the amount of work | |
209 // done here since we have potentially corrupted process. Our job is to | |
210 // spawn another instance of chrome which will show a 'chrome has crashed' | |
211 // dialog. This code needs to live in the exe and thus has no access to | |
212 // facilities such as the i18n helpers. | |
213 bool DumpDoneCallback(const wchar_t*, const wchar_t*, void*, | |
214 EXCEPTION_POINTERS* ex_info, | |
215 MDRawAssertionInfo*, bool succeeded) { | |
216 GetCrashReporterClient()->RecordCrashDumpAttemptResult( | |
217 true /* is_real_crash */, succeeded); | |
218 // Check if the exception is one of the kind which would not be solved | |
219 // by simply restarting chrome. In this case we show a message box with | |
220 // and exit silently. Remember that chrome is in a crashed state so we | |
221 // can't show our own UI from this process. | |
222 if (HardErrorHandler(ex_info)) | |
223 return true; | |
224 | |
225 if (!GetCrashReporterClient()->AboutToRestart()) | |
226 return true; | |
227 | |
228 // Now we just start chrome browser with the same command line. | |
229 STARTUPINFOW si = {sizeof(si)}; | |
230 PROCESS_INFORMATION pi; | |
231 if (::CreateProcessW(NULL, ::GetCommandLineW(), NULL, NULL, FALSE, | |
232 CREATE_UNICODE_ENVIRONMENT, NULL, NULL, &si, &pi)) { | |
233 ::CloseHandle(pi.hProcess); | |
234 ::CloseHandle(pi.hThread); | |
235 } | |
236 // After this return we will be terminated. The actual return value is | |
237 // not used at all. | |
238 return true; | |
239 } | |
240 | |
241 // flag to indicate that we are already handling an exception. | |
242 volatile LONG handling_exception = 0; | |
243 | |
244 // This callback is used when there is no crash. Note: Unlike the | |
245 // |FilterCallback| below this does not do dupe detection. It is upto the caller | |
246 // to implement it. | |
247 bool FilterCallbackWhenNoCrash( | |
248 void*, EXCEPTION_POINTERS*, MDRawAssertionInfo*) { | |
249 GetCrashReporterClient()->RecordCrashDumpAttempt(false); | |
250 return true; | |
251 } | |
252 | |
253 // This callback is executed when the Chrome process has crashed and *before* | |
254 // the crash dump is created. To prevent duplicate crash reports we | |
255 // make every thread calling this method, except the very first one, | |
256 // go to sleep. | |
257 bool FilterCallback(void*, EXCEPTION_POINTERS*, MDRawAssertionInfo*) { | |
258 // Capture every thread except the first one in the sleep. We don't | |
259 // want multiple threads to concurrently report exceptions. | |
260 if (::InterlockedCompareExchange(&handling_exception, 1, 0) == 1) { | |
261 ::Sleep(INFINITE); | |
262 } | |
263 GetCrashReporterClient()->RecordCrashDumpAttempt(true); | |
264 return true; | |
265 } | |
266 | |
267 // Previous unhandled filter. Will be called if not null when we | |
268 // intercept a crash. | |
269 LPTOP_LEVEL_EXCEPTION_FILTER previous_filter = NULL; | |
270 | |
271 // Exception filter used when breakpad is not enabled. We just display | |
272 // the "Do you want to restart" message and then we call the previous filter. | |
273 long WINAPI ChromeExceptionFilter(EXCEPTION_POINTERS* info) { | |
274 DumpDoneCallback(NULL, NULL, NULL, info, NULL, false); | |
275 | |
276 if (previous_filter) | |
277 return previous_filter(info); | |
278 | |
279 return EXCEPTION_EXECUTE_HANDLER; | |
280 } | |
281 | |
282 // Exception filter for the service process used when breakpad is not enabled. | |
283 // We just display the "Do you want to restart" message and then die | |
284 // (without calling the previous filter). | |
285 long WINAPI ServiceExceptionFilter(EXCEPTION_POINTERS* info) { | |
286 DumpDoneCallback(NULL, NULL, NULL, info, NULL, false); | |
287 return EXCEPTION_EXECUTE_HANDLER; | |
288 } | |
289 | |
290 #if !defined(COMPONENT_BUILD) | |
291 // Installed via base::debug::SetCrashKeyReportingFunctions. | |
292 void SetCrashKeyValueForBaseDebug(const base::StringPiece& key, | |
293 const base::StringPiece& value) { | |
294 DCHECK(CrashKeysWin::keeper()); | |
295 CrashKeysWin::keeper()->SetCrashKeyValue(base::UTF8ToUTF16(key), | |
296 base::UTF8ToUTF16(value)); | |
297 } | |
298 | |
299 // Installed via base::debug::SetCrashKeyReportingFunctions. | |
300 void ClearCrashKeyForBaseDebug(const base::StringPiece& key) { | |
301 DCHECK(CrashKeysWin::keeper()); | |
302 CrashKeysWin::keeper()->ClearCrashKeyValue(base::UTF8ToUTF16(key)); | |
303 } | |
304 #endif // !defined(COMPONENT_BUILD) | |
305 | |
306 } // namespace | |
307 | |
308 // NOTE: This function is used by SyzyASAN to annotate crash reports. If you | |
309 // change the name or signature of this function you will break SyzyASAN | |
310 // instrumented releases of Chrome. Please contact syzygy-team@chromium.org | |
311 // before doing so! | |
312 extern "C" void __declspec(dllexport) __cdecl SetCrashKeyValueImpl( | |
313 const wchar_t* key, const wchar_t* value) { | |
314 CrashKeysWin* keeper = CrashKeysWin::keeper(); | |
315 if (!keeper) | |
316 return; | |
317 | |
318 // TODO(siggi): This doesn't look quite right - there's NULL deref potential | |
319 // here, and an implicit std::wstring conversion. Fixme. | |
320 keeper->SetCrashKeyValue(key, value); | |
321 } | |
322 | |
323 extern "C" void __declspec(dllexport) __cdecl ClearCrashKeyValueImpl( | |
324 const wchar_t* key) { | |
325 CrashKeysWin* keeper = CrashKeysWin::keeper(); | |
326 if (!keeper) | |
327 return; | |
328 | |
329 // TODO(siggi): This doesn't look quite right - there's NULL deref potential | |
330 // here, and an implicit std::wstring conversion. Fixme. | |
331 keeper->ClearCrashKeyValue(key); | |
332 } | |
333 | |
334 static bool WrapMessageBoxWithSEH(const wchar_t* text, const wchar_t* caption, | |
335 UINT flags, bool* exit_now) { | |
336 // We wrap the call to MessageBoxW with a SEH handler because it some | |
337 // machines with CursorXP, PeaDict or with FontExplorer installed it crashes | |
338 // uncontrollably here. Being this a best effort deal we better go away. | |
339 __try { | |
340 *exit_now = (IDOK != ::MessageBoxW(NULL, text, caption, flags)); | |
341 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
342 // Its not safe to continue executing, exit silently here. | |
343 ::TerminateProcess(::GetCurrentProcess(), | |
344 GetCrashReporterClient()->GetResultCodeRespawnFailed()); | |
345 } | |
346 | |
347 return true; | |
348 } | |
349 | |
350 // This function is executed by the child process that DumpDoneCallback() | |
351 // spawned and basically just shows the 'chrome has crashed' dialog if | |
352 // the CHROME_CRASHED environment variable is present. | |
353 bool ShowRestartDialogIfCrashed(bool* exit_now) { | |
354 // If we are being launched in metro mode don't try to show the dialog. | |
355 if (base::win::IsMetroProcess()) | |
356 return false; | |
357 | |
358 base::string16 message; | |
359 base::string16 title; | |
360 bool is_rtl_locale; | |
361 if (!GetCrashReporterClient()->ShouldShowRestartDialog( | |
362 &title, &message, &is_rtl_locale)) { | |
363 return false; | |
364 } | |
365 | |
366 // If the UI layout is right-to-left, we need to pass the appropriate MB_XXX | |
367 // flags so that an RTL message box is displayed. | |
368 UINT flags = MB_OKCANCEL | MB_ICONWARNING; | |
369 if (is_rtl_locale) | |
370 flags |= MB_RIGHT | MB_RTLREADING; | |
371 | |
372 return WrapMessageBoxWithSEH(message.c_str(), title.c_str(), flags, exit_now); | |
373 } | |
374 | |
375 extern "C" void __declspec(dllexport) TerminateProcessWithoutDump() { | |
376 // Patched stub exists based on conditions (See InitCrashReporter). | |
377 // As a side note this function also gets called from | |
378 // WindowProcExceptionFilter. | |
379 if (g_real_terminate_process_stub == NULL) { | |
380 ::TerminateProcess(::GetCurrentProcess(), content::RESULT_CODE_KILLED); | |
381 } else { | |
382 NtTerminateProcessPtr real_terminate_proc = | |
383 reinterpret_cast<NtTerminateProcessPtr>( | |
384 static_cast<char*>(g_real_terminate_process_stub)); | |
385 real_terminate_proc(::GetCurrentProcess(), content::RESULT_CODE_KILLED); | |
386 } | |
387 } | |
388 | |
389 // Crashes the process after generating a dump for the provided exception. Note | |
390 // that the crash reporter should be initialized before calling this function | |
391 // for it to do anything. | |
392 // NOTE: This function is used by SyzyASAN to invoke a crash. If you change the | |
393 // the name or signature of this function you will break SyzyASAN instrumented | |
394 // releases of Chrome. Please contact syzygy-team@chromium.org before doing so! | |
395 extern "C" int __declspec(dllexport) CrashForException( | |
396 EXCEPTION_POINTERS* info) { | |
397 if (g_breakpad) { | |
398 g_breakpad->WriteMinidumpForException(info); | |
399 TerminateProcessWithoutDump(); | |
400 } | |
401 return EXCEPTION_CONTINUE_SEARCH; | |
402 } | |
403 | |
404 #ifndef _WIN64 | |
405 static NTSTATUS WINAPI HookNtTerminateProcess(HANDLE ProcessHandle, | |
406 NTSTATUS ExitStatus) { | |
407 if (g_breakpad && | |
408 (ProcessHandle == ::GetCurrentProcess() || ProcessHandle == NULL)) { | |
409 NT_TIB* tib = reinterpret_cast<NT_TIB*>(NtCurrentTeb()); | |
410 void* address_on_stack = _AddressOfReturnAddress(); | |
411 if (address_on_stack < tib->StackLimit || | |
412 address_on_stack > tib->StackBase) { | |
413 g_surrogate_exception_record.ExceptionAddress = _ReturnAddress(); | |
414 g_surrogate_exception_record.ExceptionCode = DBG_TERMINATE_PROCESS; | |
415 g_surrogate_exception_record.ExceptionFlags = EXCEPTION_NONCONTINUABLE; | |
416 CrashForException(&g_surrogate_exception_pointers); | |
417 } | |
418 } | |
419 | |
420 NtTerminateProcessPtr real_proc = | |
421 reinterpret_cast<NtTerminateProcessPtr>( | |
422 static_cast<char*>(g_real_terminate_process_stub)); | |
423 return real_proc(ProcessHandle, ExitStatus); | |
424 } | |
425 | |
426 static void InitTerminateProcessHooks() { | |
427 NtTerminateProcessPtr terminate_process_func_address = | |
428 reinterpret_cast<NtTerminateProcessPtr>(::GetProcAddress( | |
429 ::GetModuleHandle(L"ntdll.dll"), "NtTerminateProcess")); | |
430 if (terminate_process_func_address == NULL) | |
431 return; | |
432 | |
433 DWORD old_protect = 0; | |
434 if (!::VirtualProtect(terminate_process_func_address, 5, | |
435 PAGE_EXECUTE_READWRITE, &old_protect)) | |
436 return; | |
437 | |
438 g_real_terminate_process_stub = reinterpret_cast<char*>(VirtualAllocEx( | |
439 ::GetCurrentProcess(), NULL, sidestep::kMaxPreambleStubSize, | |
440 MEM_COMMIT, PAGE_EXECUTE_READWRITE)); | |
441 if (g_real_terminate_process_stub == NULL) | |
442 return; | |
443 | |
444 g_surrogate_exception_pointers.ContextRecord = &g_surrogate_context; | |
445 g_surrogate_exception_pointers.ExceptionRecord = | |
446 &g_surrogate_exception_record; | |
447 | |
448 sidestep::SideStepError patch_result = | |
449 sidestep::PreamblePatcher::Patch( | |
450 terminate_process_func_address, HookNtTerminateProcess, | |
451 g_real_terminate_process_stub, sidestep::kMaxPreambleStubSize); | |
452 if (patch_result != sidestep::SIDESTEP_SUCCESS) { | |
453 CHECK(::VirtualFreeEx(::GetCurrentProcess(), g_real_terminate_process_stub, | |
454 0, MEM_RELEASE)); | |
455 CHECK(::VirtualProtect(terminate_process_func_address, 5, old_protect, | |
456 &old_protect)); | |
457 return; | |
458 } | |
459 | |
460 DWORD dummy = 0; | |
461 CHECK(::VirtualProtect(terminate_process_func_address, | |
462 5, | |
463 old_protect, | |
464 &dummy)); | |
465 CHECK(::VirtualProtect(g_real_terminate_process_stub, | |
466 sidestep::kMaxPreambleStubSize, | |
467 old_protect, | |
468 &old_protect)); | |
469 } | |
470 #endif | |
471 | |
472 static void InitPipeNameEnvVar(bool is_per_user_install) { | |
473 scoped_ptr<base::Environment> env(base::Environment::Create()); | |
474 if (env->HasVar(kPipeNameVar)) { | |
475 // The Breakpad pipe name is already configured: nothing to do. | |
476 return; | |
477 } | |
478 | |
479 // Check whether configuration management controls crash reporting. | |
480 bool crash_reporting_enabled = true; | |
481 bool controlled_by_policy = | |
482 GetCrashReporterClient()->ReportingIsEnforcedByPolicy( | |
483 &crash_reporting_enabled); | |
484 | |
485 const base::CommandLine& command = *base::CommandLine::ForCurrentProcess(); | |
486 bool use_crash_service = !controlled_by_policy && | |
487 (command.HasSwitch(switches::kNoErrorDialogs) || | |
488 GetCrashReporterClient()->IsRunningUnattended()); | |
489 | |
490 std::wstring pipe_name; | |
491 if (use_crash_service) { | |
492 // Crash reporting is done by crash_service.exe. | |
493 pipe_name = kChromePipeName; | |
494 } else { | |
495 // We want to use the Google Update crash reporting. We need to check if the | |
496 // user allows it first (in case the administrator didn't already decide | |
497 // via policy). | |
498 if (!controlled_by_policy) | |
499 crash_reporting_enabled = | |
500 GetCrashReporterClient()->GetCollectStatsConsent(); | |
501 | |
502 if (!crash_reporting_enabled) { | |
503 // Crash reporting is disabled, don't set the environment variable. | |
504 return; | |
505 } | |
506 | |
507 // Build the pipe name. It can be either: | |
508 // System-wide install: "NamedPipe\GoogleCrashServices\S-1-5-18" | |
509 // Per-user install: "NamedPipe\GoogleCrashServices\<user SID>" | |
510 std::wstring user_sid; | |
511 if (is_per_user_install) { | |
512 if (!base::win::GetUserSidString(&user_sid)) { | |
513 return; | |
514 } | |
515 } else { | |
516 user_sid = kSystemPrincipalSid; | |
517 } | |
518 | |
519 pipe_name = kGoogleUpdatePipeName; | |
520 pipe_name += user_sid; | |
521 } | |
522 env->SetVar(kPipeNameVar, base::UTF16ToASCII(pipe_name)); | |
523 } | |
524 | |
525 void InitDefaultCrashCallback(LPTOP_LEVEL_EXCEPTION_FILTER filter) { | |
526 previous_filter = SetUnhandledExceptionFilter(filter); | |
527 } | |
528 | |
529 void InitCrashReporter(const std::string& process_type_switch) { | |
530 const base::CommandLine& command = *base::CommandLine::ForCurrentProcess(); | |
531 if (command.HasSwitch(switches::kDisableBreakpad)) | |
532 return; | |
533 | |
534 // Disable the message box for assertions. | |
535 _CrtSetReportMode(_CRT_ASSERT, 0); | |
536 | |
537 base::string16 process_type = base::ASCIIToUTF16(process_type_switch); | |
538 if (process_type.empty()) | |
539 process_type = L"browser"; | |
540 | |
541 wchar_t exe_path[MAX_PATH]; | |
542 exe_path[0] = 0; | |
543 GetModuleFileNameW(NULL, exe_path, MAX_PATH); | |
544 | |
545 bool is_per_user_install = | |
546 GetCrashReporterClient()->GetIsPerUserInstall(base::FilePath(exe_path)); | |
547 | |
548 // This is intentionally leaked. | |
549 CrashKeysWin* keeper = new CrashKeysWin(); | |
550 | |
551 google_breakpad::CustomClientInfo* custom_info = | |
552 keeper->GetCustomInfo(exe_path, process_type, GetProfileType(), | |
553 base::CommandLine::ForCurrentProcess(), | |
554 GetCrashReporterClient()); | |
555 | |
556 #if !defined(COMPONENT_BUILD) | |
557 // chrome/common/child_process_logging_win.cc registers crash keys for | |
558 // chrome.dll. In a component build, that is sufficient as chrome.dll and | |
559 // chrome.exe share a copy of base (in base.dll). | |
560 // In a static build, the EXE must separately initialize the crash keys | |
561 // configuration as it has its own statically linked copy of base. | |
562 base::debug::SetCrashKeyReportingFunctions(&SetCrashKeyValueForBaseDebug, | |
563 &ClearCrashKeyForBaseDebug); | |
564 GetCrashReporterClient()->RegisterCrashKeys(); | |
565 #endif | |
566 | |
567 google_breakpad::ExceptionHandler::MinidumpCallback callback = NULL; | |
568 LPTOP_LEVEL_EXCEPTION_FILTER default_filter = NULL; | |
569 // We install the post-dump callback only for the browser and service | |
570 // processes. It spawns a new browser/service process. | |
571 if (process_type == L"browser") { | |
572 callback = &DumpDoneCallback; | |
573 default_filter = &ChromeExceptionFilter; | |
574 } else if (process_type == L"service") { | |
575 callback = &DumpDoneCallback; | |
576 default_filter = &ServiceExceptionFilter; | |
577 } | |
578 | |
579 if (process_type == L"browser") { | |
580 InitPipeNameEnvVar(is_per_user_install); | |
581 GetCrashReporterClient()->InitBrowserCrashDumpsRegKey(); | |
582 } | |
583 | |
584 scoped_ptr<base::Environment> env(base::Environment::Create()); | |
585 std::string pipe_name_ascii; | |
586 if (!env->GetVar(kPipeNameVar, &pipe_name_ascii)) { | |
587 // Breakpad is not enabled. Configuration is managed or the user | |
588 // did not allow Google Update to send crashes. We need to use | |
589 // our default crash handler instead, but only for the | |
590 // browser/service processes. | |
591 if (default_filter) | |
592 InitDefaultCrashCallback(default_filter); | |
593 return; | |
594 } | |
595 base::string16 pipe_name = base::ASCIIToUTF16(pipe_name_ascii); | |
596 | |
597 #ifdef _WIN64 | |
598 // The protocol for connecting to the out-of-process Breakpad crash | |
599 // reporter is different for x86-32 and x86-64: the message sizes | |
600 // are different because the message struct contains a pointer. As | |
601 // a result, there are two different named pipes to connect to. The | |
602 // 64-bit one is distinguished with an "-x64" suffix. | |
603 pipe_name += L"-x64"; | |
604 #endif | |
605 | |
606 // Get the alternate dump directory. We use the temp path. | |
607 wchar_t temp_dir[MAX_PATH] = {0}; | |
608 ::GetTempPathW(MAX_PATH, temp_dir); | |
609 | |
610 MINIDUMP_TYPE dump_type = kSmallDumpType; | |
611 // Capture full memory if explicitly instructed to. | |
612 if (command.HasSwitch(switches::kFullMemoryCrashReport)) | |
613 dump_type = kFullDumpType; | |
614 else if (GetCrashReporterClient()->GetShouldDumpLargerDumps( | |
615 is_per_user_install)) | |
616 dump_type = kLargerDumpType; | |
617 | |
618 g_breakpad = new google_breakpad::ExceptionHandler(temp_dir, &FilterCallback, | |
619 callback, NULL, | |
620 google_breakpad::ExceptionHandler::HANDLER_ALL, | |
621 dump_type, pipe_name.c_str(), custom_info); | |
622 | |
623 // Now initialize the non crash dump handler. | |
624 g_dumphandler_no_crash = new google_breakpad::ExceptionHandler(temp_dir, | |
625 &FilterCallbackWhenNoCrash, | |
626 &DumpDoneCallbackWhenNoCrash, | |
627 NULL, | |
628 // Set the handler to none so this handler would not be added to | |
629 // |handler_stack_| in |ExceptionHandler| which is a list of exception | |
630 // handlers. | |
631 google_breakpad::ExceptionHandler::HANDLER_NONE, | |
632 dump_type, pipe_name.c_str(), custom_info); | |
633 | |
634 // Set the DumpWithoutCrashingFunction for this instance of base.lib. Other | |
635 // executable images linked with base should set this again for | |
636 // DumpWithoutCrashing to function correctly. | |
637 // See chrome_main.cc for example. | |
638 base::debug::SetDumpWithoutCrashingFunction(&DumpProcessWithoutCrash); | |
639 | |
640 if (g_breakpad->IsOutOfProcess()) { | |
641 // Tells breakpad to handle breakpoint and single step exceptions. | |
642 // This might break JIT debuggers, but at least it will always | |
643 // generate a crashdump for these exceptions. | |
644 g_breakpad->set_handle_debug_exceptions(true); | |
645 | |
646 #ifndef _WIN64 | |
647 if (process_type != L"browser" && | |
648 !GetCrashReporterClient()->IsRunningUnattended()) { | |
649 // Initialize the hook TerminateProcess to catch unexpected exits. | |
650 InitTerminateProcessHooks(); | |
651 } | |
652 #endif | |
653 } | |
654 } | |
655 | |
656 void ConsumeInvalidHandleExceptions() { | |
657 if (g_breakpad) { | |
658 g_breakpad->set_consume_invalid_handle_exceptions(true); | |
659 } | |
660 if (g_dumphandler_no_crash) { | |
661 g_dumphandler_no_crash->set_consume_invalid_handle_exceptions(true); | |
662 } | |
663 } | |
664 | |
665 // If the user has disabled crash reporting uploads and restarted Chrome, the | |
666 // restarted instance will still contain the pipe environment variable, which | |
667 // will allow the restarted process to still upload crash reports. This function | |
668 // clears the environment variable, so that the restarted Chrome, which inherits | |
669 // its environment from the current Chrome, will no longer contain the variable. | |
670 extern "C" void __declspec(dllexport) __cdecl | |
671 ClearBreakpadPipeEnvironmentVariable() { | |
672 scoped_ptr<base::Environment> env(base::Environment::Create()); | |
673 env->UnSetVar(kPipeNameVar); | |
674 } | |
675 | |
676 #ifdef _WIN64 | |
677 int CrashForExceptionInNonABICompliantCodeRange( | |
678 PEXCEPTION_RECORD ExceptionRecord, | |
679 ULONG64 EstablisherFrame, | |
680 PCONTEXT ContextRecord, | |
681 PDISPATCHER_CONTEXT DispatcherContext) { | |
682 EXCEPTION_POINTERS info = { ExceptionRecord, ContextRecord }; | |
683 return CrashForException(&info); | |
684 } | |
685 | |
686 struct ExceptionHandlerRecord { | |
687 RUNTIME_FUNCTION runtime_function; | |
688 UNWIND_INFO unwind_info; | |
689 unsigned char thunk[12]; | |
690 }; | |
691 | |
692 extern "C" void __declspec(dllexport) __cdecl | |
693 RegisterNonABICompliantCodeRange(void* start, size_t size_in_bytes) { | |
694 ExceptionHandlerRecord* record = | |
695 reinterpret_cast<ExceptionHandlerRecord*>(start); | |
696 | |
697 // We assume that the first page of the code range is executable and | |
698 // committed and reserved for breakpad. What could possibly go wrong? | |
699 | |
700 // All addresses are 32bit relative offsets to start. | |
701 record->runtime_function.BeginAddress = 0; | |
702 record->runtime_function.EndAddress = | |
703 base::checked_cast<DWORD>(size_in_bytes); | |
704 record->runtime_function.UnwindData = | |
705 offsetof(ExceptionHandlerRecord, unwind_info); | |
706 | |
707 // Create unwind info that only specifies an exception handler. | |
708 record->unwind_info.Version = 1; | |
709 record->unwind_info.Flags = UNW_FLAG_EHANDLER; | |
710 record->unwind_info.SizeOfProlog = 0; | |
711 record->unwind_info.CountOfCodes = 0; | |
712 record->unwind_info.FrameRegister = 0; | |
713 record->unwind_info.FrameOffset = 0; | |
714 record->unwind_info.ExceptionHandler = | |
715 offsetof(ExceptionHandlerRecord, thunk); | |
716 | |
717 // Hardcoded thunk. | |
718 // mov imm64, rax | |
719 record->thunk[0] = 0x48; | |
720 record->thunk[1] = 0xb8; | |
721 void* handler = &CrashForExceptionInNonABICompliantCodeRange; | |
722 memcpy(&record->thunk[2], &handler, 8); | |
723 | |
724 // jmp rax | |
725 record->thunk[10] = 0xff; | |
726 record->thunk[11] = 0xe0; | |
727 | |
728 // Protect reserved page against modifications. | |
729 DWORD old_protect; | |
730 CHECK(VirtualProtect( | |
731 start, sizeof(ExceptionHandlerRecord), PAGE_EXECUTE_READ, &old_protect)); | |
732 CHECK(RtlAddFunctionTable( | |
733 &record->runtime_function, 1, reinterpret_cast<DWORD64>(start))); | |
734 } | |
735 | |
736 extern "C" void __declspec(dllexport) __cdecl | |
737 UnregisterNonABICompliantCodeRange(void* start) { | |
738 ExceptionHandlerRecord* record = | |
739 reinterpret_cast<ExceptionHandlerRecord*>(start); | |
740 | |
741 CHECK(RtlDeleteFunctionTable(&record->runtime_function)); | |
742 } | |
743 #endif | |
744 | |
745 } // namespace breakpad | |
OLD | NEW |