Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(247)

Unified Diff: third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc

Issue 1505213004: Copy Crashpad into the Chrome tree instead of importing it via DEPS (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Address review comments, update README.chromium Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc
diff --git a/third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc b/third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc
new file mode 100644
index 0000000000000000000000000000000000000000..f408fb18c77de9a5ca15269b6873182d62e6770e
--- /dev/null
+++ b/third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc
@@ -0,0 +1,312 @@
+// Copyright 2015 The Crashpad Authors. All rights reserved.
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+#include "snapshot/win/pe_image_reader.h"
+
+#include <string.h>
+
+#include "base/logging.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/strings/stringprintf.h"
+#include "client/crashpad_info.h"
+#include "snapshot/win/process_reader_win.h"
+#include "util/misc/pdb_structures.h"
+#include "util/win/process_structs.h"
+
+namespace crashpad {
+
+namespace {
+
+std::string RangeToString(const CheckedWinAddressRange& range) {
+ return base::StringPrintf("[0x%llx + 0x%llx (%s)]",
+ range.Base(),
+ range.Size(),
+ range.Is64Bit() ? "64" : "32");
+}
+
+// Map from Traits to an IMAGE_NT_HEADERSxx.
+template <class Traits>
+struct NtHeadersForTraits;
+
+template <>
+struct NtHeadersForTraits<process_types::internal::Traits32> {
+ using type = IMAGE_NT_HEADERS32;
+};
+
+template <>
+struct NtHeadersForTraits<process_types::internal::Traits64> {
+ using type = IMAGE_NT_HEADERS64;
+};
+
+} // namespace
+
+PEImageReader::PEImageReader()
+ : process_reader_(nullptr),
+ module_range_(),
+ module_name_(),
+ initialized_() {
+}
+
+PEImageReader::~PEImageReader() {
+}
+
+bool PEImageReader::Initialize(ProcessReaderWin* process_reader,
+ WinVMAddress address,
+ WinVMSize size,
+ const std::string& module_name) {
+ INITIALIZATION_STATE_SET_INITIALIZING(initialized_);
+
+ process_reader_ = process_reader;
+ module_range_.SetRange(process_reader_->Is64Bit(), address, size);
+ if (!module_range_.IsValid()) {
+ LOG(WARNING) << "invalid module range for " << module_name << ": "
+ << RangeToString(module_range_);
+ return false;
+ }
+ module_name_ = module_name;
+
+ INITIALIZATION_STATE_SET_VALID(initialized_);
+ return true;
+}
+
+template <class Traits>
+bool PEImageReader::GetCrashpadInfo(
+ process_types::CrashpadInfo<Traits>* crashpad_info) const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+
+ IMAGE_SECTION_HEADER section;
+ if (!GetSectionByName<typename NtHeadersForTraits<Traits>::type>("CPADinfo",
+ &section)) {
+ return false;
+ }
+
+ if (section.Misc.VirtualSize < sizeof(process_types::CrashpadInfo<Traits>)) {
+ LOG(WARNING) << "small crashpad info section size "
+ << section.Misc.VirtualSize << ", " << module_name_;
+ return false;
+ }
+
+ WinVMAddress crashpad_info_address = Address() + section.VirtualAddress;
+ CheckedWinAddressRange crashpad_info_range(process_reader_->Is64Bit(),
+ crashpad_info_address,
+ section.Misc.VirtualSize);
+ if (!crashpad_info_range.IsValid()) {
+ LOG(WARNING) << "invalid range for crashpad info: "
+ << RangeToString(crashpad_info_range);
+ return false;
+ }
+
+ if (!module_range_.ContainsRange(crashpad_info_range)) {
+ LOG(WARNING) << "crashpad info does not fall inside module "
+ << module_name_;
+ return false;
+ }
+
+ if (!process_reader_->ReadMemory(crashpad_info_address,
+ sizeof(process_types::CrashpadInfo<Traits>),
+ crashpad_info)) {
+ LOG(WARNING) << "could not read crashpad info " << module_name_;
+ return false;
+ }
+
+ if (crashpad_info->signature != CrashpadInfo::kSignature ||
+ crashpad_info->version < 1) {
+ LOG(WARNING) << "unexpected crashpad info data " << module_name_;
+ return false;
+ }
+
+ return true;
+}
+
+bool PEImageReader::DebugDirectoryInformation(UUID* uuid,
+ DWORD* age,
+ std::string* pdbname) const {
+ if (process_reader_->Is64Bit()) {
+ return ReadDebugDirectoryInformation<IMAGE_NT_HEADERS64>(
+ uuid, age, pdbname);
+ } else {
+ return ReadDebugDirectoryInformation<IMAGE_NT_HEADERS32>(
+ uuid, age, pdbname);
+ }
+}
+
+template <class NtHeadersType>
+bool PEImageReader::ReadDebugDirectoryInformation(UUID* uuid,
+ DWORD* age,
+ std::string* pdbname) const {
+ NtHeadersType nt_headers;
+ if (!ReadNtHeaders(&nt_headers, nullptr))
+ return false;
+
+ if (nt_headers.FileHeader.SizeOfOptionalHeader <
+ offsetof(decltype(nt_headers.OptionalHeader),
+ DataDirectory[IMAGE_DIRECTORY_ENTRY_DEBUG]) +
+ sizeof(nt_headers.OptionalHeader
+ .DataDirectory[IMAGE_DIRECTORY_ENTRY_DEBUG]) ||
+ nt_headers.OptionalHeader.NumberOfRvaAndSizes <=
+ IMAGE_DIRECTORY_ENTRY_DEBUG) {
+ return false;
+ }
+
+ const IMAGE_DATA_DIRECTORY& data_directory =
+ nt_headers.OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_DEBUG];
+ if (data_directory.VirtualAddress == 0 || data_directory.Size == 0)
+ return false;
+ IMAGE_DEBUG_DIRECTORY debug_directory;
+ if (data_directory.Size % sizeof(debug_directory) != 0)
+ return false;
+ for (size_t offset = 0; offset < data_directory.Size;
+ offset += sizeof(debug_directory)) {
+ if (!CheckedReadMemory(Address() + data_directory.VirtualAddress + offset,
+ sizeof(debug_directory),
+ &debug_directory)) {
+ LOG(WARNING) << "could not read data directory";
+ return false;
+ }
+
+ if (debug_directory.Type != IMAGE_DEBUG_TYPE_CODEVIEW)
+ continue;
+
+ if (debug_directory.AddressOfRawData) {
+ if (debug_directory.SizeOfData < sizeof(CodeViewRecordPDB70)) {
+ LOG(WARNING) << "CodeView debug entry of unexpected size";
+ continue;
+ }
+
+ scoped_ptr<char[]> data(new char[debug_directory.SizeOfData]);
+ if (!CheckedReadMemory(Address() + debug_directory.AddressOfRawData,
+ debug_directory.SizeOfData,
+ data.get())) {
+ LOG(WARNING) << "could not read debug directory";
+ return false;
+ }
+
+ if (*reinterpret_cast<DWORD*>(data.get()) !=
+ CodeViewRecordPDB70::kSignature) {
+ LOG(WARNING) << "encountered non-7.0 CodeView debug record";
+ continue;
+ }
+
+ CodeViewRecordPDB70* codeview =
+ reinterpret_cast<CodeViewRecordPDB70*>(data.get());
+ *uuid = codeview->uuid;
+ *age = codeview->age;
+ // This is a NUL-terminated string encoded in the codepage of the system
+ // where the binary was linked. We have no idea what that was, so we just
+ // assume ASCII.
+ *pdbname = std::string(reinterpret_cast<char*>(&codeview->pdb_name[0]));
+ return true;
+ } else if (debug_directory.PointerToRawData) {
+ // This occurs for non-PDB based debug information. We simply ignore these
+ // as we don't expect to encounter modules that will be in this format
+ // for which we'll actually have symbols. See
+ // https://crashpad.chromium.org/bug/47.
+ }
+ }
+
+ return false;
+}
+
+template <class NtHeadersType>
+bool PEImageReader::ReadNtHeaders(NtHeadersType* nt_headers,
+ WinVMAddress* nt_headers_address) const {
+ IMAGE_DOS_HEADER dos_header;
+ if (!CheckedReadMemory(Address(), sizeof(IMAGE_DOS_HEADER), &dos_header)) {
+ LOG(WARNING) << "could not read dos header of " << module_name_;
+ return false;
+ }
+
+ if (dos_header.e_magic != IMAGE_DOS_SIGNATURE) {
+ LOG(WARNING) << "invalid e_magic in dos header of " << module_name_;
+ return false;
+ }
+
+ WinVMAddress local_nt_headers_address = Address() + dos_header.e_lfanew;
+ if (!CheckedReadMemory(
+ local_nt_headers_address, sizeof(NtHeadersType), nt_headers)) {
+ LOG(WARNING) << "could not read nt headers of " << module_name_;
+ return false;
+ }
+
+ if (nt_headers->Signature != IMAGE_NT_SIGNATURE) {
+ LOG(WARNING) << "invalid signature in nt headers of " << module_name_;
+ return false;
+ }
+
+ if (nt_headers_address)
+ *nt_headers_address = local_nt_headers_address;
+
+ return true;
+}
+
+template <class NtHeadersType>
+bool PEImageReader::GetSectionByName(const std::string& name,
+ IMAGE_SECTION_HEADER* section) const {
+ if (name.size() > sizeof(section->Name)) {
+ LOG(WARNING) << "supplied section name too long " << name;
+ return false;
+ }
+
+ NtHeadersType nt_headers;
+ WinVMAddress nt_headers_address;
+ if (!ReadNtHeaders(&nt_headers, &nt_headers_address))
+ return false;
+
+ WinVMAddress first_section_address =
+ nt_headers_address + offsetof(NtHeadersType, OptionalHeader) +
+ nt_headers.FileHeader.SizeOfOptionalHeader;
+ for (DWORD i = 0; i < nt_headers.FileHeader.NumberOfSections; ++i) {
+ WinVMAddress section_address =
+ first_section_address + sizeof(IMAGE_SECTION_HEADER) * i;
+ if (!CheckedReadMemory(
+ section_address, sizeof(IMAGE_SECTION_HEADER), section)) {
+ LOG(WARNING) << "could not read section " << i << " of " << module_name_;
+ return false;
+ }
+ if (strncmp(reinterpret_cast<const char*>(section->Name),
+ name.c_str(),
+ sizeof(section->Name)) == 0) {
+ return true;
+ }
+ }
+
+ return false;
+}
+
+bool PEImageReader::CheckedReadMemory(WinVMAddress address,
+ WinVMSize size,
+ void* into) const {
+ CheckedWinAddressRange read_range(process_reader_->Is64Bit(), address, size);
+ if (!read_range.IsValid()) {
+ LOG(WARNING) << "invalid read range: " << RangeToString(read_range);
+ return false;
+ }
+ if (!module_range_.ContainsRange(read_range)) {
+ LOG(WARNING) << "attempt to read outside of module " << module_name_
+ << " at range: " << RangeToString(read_range);
+ return false;
+ }
+ return process_reader_->ReadMemory(address, size, into);
+}
+
+// Explicit instantiations with the only 2 valid template arguments to avoid
+// putting the body of the function in the header.
+template bool PEImageReader::GetCrashpadInfo<process_types::internal::Traits32>(
+ process_types::CrashpadInfo<process_types::internal::Traits32>*
+ crashpad_info) const;
+template bool PEImageReader::GetCrashpadInfo<process_types::internal::Traits64>(
+ process_types::CrashpadInfo<process_types::internal::Traits64>*
+ crashpad_info) const;
+
+} // namespace crashpad

Powered by Google App Engine
This is Rietveld 408576698