| Index: third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc
|
| diff --git a/third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc b/third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..f408fb18c77de9a5ca15269b6873182d62e6770e
|
| --- /dev/null
|
| +++ b/third_party/crashpad/crashpad/snapshot/win/pe_image_reader.cc
|
| @@ -0,0 +1,312 @@
|
| +// Copyright 2015 The Crashpad Authors. All rights reserved.
|
| +//
|
| +// Licensed under the Apache License, Version 2.0 (the "License");
|
| +// you may not use this file except in compliance with the License.
|
| +// You may obtain a copy of the License at
|
| +//
|
| +// http://www.apache.org/licenses/LICENSE-2.0
|
| +//
|
| +// Unless required by applicable law or agreed to in writing, software
|
| +// distributed under the License is distributed on an "AS IS" BASIS,
|
| +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
| +// See the License for the specific language governing permissions and
|
| +// limitations under the License.
|
| +
|
| +#include "snapshot/win/pe_image_reader.h"
|
| +
|
| +#include <string.h>
|
| +
|
| +#include "base/logging.h"
|
| +#include "base/memory/scoped_ptr.h"
|
| +#include "base/strings/stringprintf.h"
|
| +#include "client/crashpad_info.h"
|
| +#include "snapshot/win/process_reader_win.h"
|
| +#include "util/misc/pdb_structures.h"
|
| +#include "util/win/process_structs.h"
|
| +
|
| +namespace crashpad {
|
| +
|
| +namespace {
|
| +
|
| +std::string RangeToString(const CheckedWinAddressRange& range) {
|
| + return base::StringPrintf("[0x%llx + 0x%llx (%s)]",
|
| + range.Base(),
|
| + range.Size(),
|
| + range.Is64Bit() ? "64" : "32");
|
| +}
|
| +
|
| +// Map from Traits to an IMAGE_NT_HEADERSxx.
|
| +template <class Traits>
|
| +struct NtHeadersForTraits;
|
| +
|
| +template <>
|
| +struct NtHeadersForTraits<process_types::internal::Traits32> {
|
| + using type = IMAGE_NT_HEADERS32;
|
| +};
|
| +
|
| +template <>
|
| +struct NtHeadersForTraits<process_types::internal::Traits64> {
|
| + using type = IMAGE_NT_HEADERS64;
|
| +};
|
| +
|
| +} // namespace
|
| +
|
| +PEImageReader::PEImageReader()
|
| + : process_reader_(nullptr),
|
| + module_range_(),
|
| + module_name_(),
|
| + initialized_() {
|
| +}
|
| +
|
| +PEImageReader::~PEImageReader() {
|
| +}
|
| +
|
| +bool PEImageReader::Initialize(ProcessReaderWin* process_reader,
|
| + WinVMAddress address,
|
| + WinVMSize size,
|
| + const std::string& module_name) {
|
| + INITIALIZATION_STATE_SET_INITIALIZING(initialized_);
|
| +
|
| + process_reader_ = process_reader;
|
| + module_range_.SetRange(process_reader_->Is64Bit(), address, size);
|
| + if (!module_range_.IsValid()) {
|
| + LOG(WARNING) << "invalid module range for " << module_name << ": "
|
| + << RangeToString(module_range_);
|
| + return false;
|
| + }
|
| + module_name_ = module_name;
|
| +
|
| + INITIALIZATION_STATE_SET_VALID(initialized_);
|
| + return true;
|
| +}
|
| +
|
| +template <class Traits>
|
| +bool PEImageReader::GetCrashpadInfo(
|
| + process_types::CrashpadInfo<Traits>* crashpad_info) const {
|
| + INITIALIZATION_STATE_DCHECK_VALID(initialized_);
|
| +
|
| + IMAGE_SECTION_HEADER section;
|
| + if (!GetSectionByName<typename NtHeadersForTraits<Traits>::type>("CPADinfo",
|
| + §ion)) {
|
| + return false;
|
| + }
|
| +
|
| + if (section.Misc.VirtualSize < sizeof(process_types::CrashpadInfo<Traits>)) {
|
| + LOG(WARNING) << "small crashpad info section size "
|
| + << section.Misc.VirtualSize << ", " << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + WinVMAddress crashpad_info_address = Address() + section.VirtualAddress;
|
| + CheckedWinAddressRange crashpad_info_range(process_reader_->Is64Bit(),
|
| + crashpad_info_address,
|
| + section.Misc.VirtualSize);
|
| + if (!crashpad_info_range.IsValid()) {
|
| + LOG(WARNING) << "invalid range for crashpad info: "
|
| + << RangeToString(crashpad_info_range);
|
| + return false;
|
| + }
|
| +
|
| + if (!module_range_.ContainsRange(crashpad_info_range)) {
|
| + LOG(WARNING) << "crashpad info does not fall inside module "
|
| + << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + if (!process_reader_->ReadMemory(crashpad_info_address,
|
| + sizeof(process_types::CrashpadInfo<Traits>),
|
| + crashpad_info)) {
|
| + LOG(WARNING) << "could not read crashpad info " << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + if (crashpad_info->signature != CrashpadInfo::kSignature ||
|
| + crashpad_info->version < 1) {
|
| + LOG(WARNING) << "unexpected crashpad info data " << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + return true;
|
| +}
|
| +
|
| +bool PEImageReader::DebugDirectoryInformation(UUID* uuid,
|
| + DWORD* age,
|
| + std::string* pdbname) const {
|
| + if (process_reader_->Is64Bit()) {
|
| + return ReadDebugDirectoryInformation<IMAGE_NT_HEADERS64>(
|
| + uuid, age, pdbname);
|
| + } else {
|
| + return ReadDebugDirectoryInformation<IMAGE_NT_HEADERS32>(
|
| + uuid, age, pdbname);
|
| + }
|
| +}
|
| +
|
| +template <class NtHeadersType>
|
| +bool PEImageReader::ReadDebugDirectoryInformation(UUID* uuid,
|
| + DWORD* age,
|
| + std::string* pdbname) const {
|
| + NtHeadersType nt_headers;
|
| + if (!ReadNtHeaders(&nt_headers, nullptr))
|
| + return false;
|
| +
|
| + if (nt_headers.FileHeader.SizeOfOptionalHeader <
|
| + offsetof(decltype(nt_headers.OptionalHeader),
|
| + DataDirectory[IMAGE_DIRECTORY_ENTRY_DEBUG]) +
|
| + sizeof(nt_headers.OptionalHeader
|
| + .DataDirectory[IMAGE_DIRECTORY_ENTRY_DEBUG]) ||
|
| + nt_headers.OptionalHeader.NumberOfRvaAndSizes <=
|
| + IMAGE_DIRECTORY_ENTRY_DEBUG) {
|
| + return false;
|
| + }
|
| +
|
| + const IMAGE_DATA_DIRECTORY& data_directory =
|
| + nt_headers.OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_DEBUG];
|
| + if (data_directory.VirtualAddress == 0 || data_directory.Size == 0)
|
| + return false;
|
| + IMAGE_DEBUG_DIRECTORY debug_directory;
|
| + if (data_directory.Size % sizeof(debug_directory) != 0)
|
| + return false;
|
| + for (size_t offset = 0; offset < data_directory.Size;
|
| + offset += sizeof(debug_directory)) {
|
| + if (!CheckedReadMemory(Address() + data_directory.VirtualAddress + offset,
|
| + sizeof(debug_directory),
|
| + &debug_directory)) {
|
| + LOG(WARNING) << "could not read data directory";
|
| + return false;
|
| + }
|
| +
|
| + if (debug_directory.Type != IMAGE_DEBUG_TYPE_CODEVIEW)
|
| + continue;
|
| +
|
| + if (debug_directory.AddressOfRawData) {
|
| + if (debug_directory.SizeOfData < sizeof(CodeViewRecordPDB70)) {
|
| + LOG(WARNING) << "CodeView debug entry of unexpected size";
|
| + continue;
|
| + }
|
| +
|
| + scoped_ptr<char[]> data(new char[debug_directory.SizeOfData]);
|
| + if (!CheckedReadMemory(Address() + debug_directory.AddressOfRawData,
|
| + debug_directory.SizeOfData,
|
| + data.get())) {
|
| + LOG(WARNING) << "could not read debug directory";
|
| + return false;
|
| + }
|
| +
|
| + if (*reinterpret_cast<DWORD*>(data.get()) !=
|
| + CodeViewRecordPDB70::kSignature) {
|
| + LOG(WARNING) << "encountered non-7.0 CodeView debug record";
|
| + continue;
|
| + }
|
| +
|
| + CodeViewRecordPDB70* codeview =
|
| + reinterpret_cast<CodeViewRecordPDB70*>(data.get());
|
| + *uuid = codeview->uuid;
|
| + *age = codeview->age;
|
| + // This is a NUL-terminated string encoded in the codepage of the system
|
| + // where the binary was linked. We have no idea what that was, so we just
|
| + // assume ASCII.
|
| + *pdbname = std::string(reinterpret_cast<char*>(&codeview->pdb_name[0]));
|
| + return true;
|
| + } else if (debug_directory.PointerToRawData) {
|
| + // This occurs for non-PDB based debug information. We simply ignore these
|
| + // as we don't expect to encounter modules that will be in this format
|
| + // for which we'll actually have symbols. See
|
| + // https://crashpad.chromium.org/bug/47.
|
| + }
|
| + }
|
| +
|
| + return false;
|
| +}
|
| +
|
| +template <class NtHeadersType>
|
| +bool PEImageReader::ReadNtHeaders(NtHeadersType* nt_headers,
|
| + WinVMAddress* nt_headers_address) const {
|
| + IMAGE_DOS_HEADER dos_header;
|
| + if (!CheckedReadMemory(Address(), sizeof(IMAGE_DOS_HEADER), &dos_header)) {
|
| + LOG(WARNING) << "could not read dos header of " << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + if (dos_header.e_magic != IMAGE_DOS_SIGNATURE) {
|
| + LOG(WARNING) << "invalid e_magic in dos header of " << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + WinVMAddress local_nt_headers_address = Address() + dos_header.e_lfanew;
|
| + if (!CheckedReadMemory(
|
| + local_nt_headers_address, sizeof(NtHeadersType), nt_headers)) {
|
| + LOG(WARNING) << "could not read nt headers of " << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + if (nt_headers->Signature != IMAGE_NT_SIGNATURE) {
|
| + LOG(WARNING) << "invalid signature in nt headers of " << module_name_;
|
| + return false;
|
| + }
|
| +
|
| + if (nt_headers_address)
|
| + *nt_headers_address = local_nt_headers_address;
|
| +
|
| + return true;
|
| +}
|
| +
|
| +template <class NtHeadersType>
|
| +bool PEImageReader::GetSectionByName(const std::string& name,
|
| + IMAGE_SECTION_HEADER* section) const {
|
| + if (name.size() > sizeof(section->Name)) {
|
| + LOG(WARNING) << "supplied section name too long " << name;
|
| + return false;
|
| + }
|
| +
|
| + NtHeadersType nt_headers;
|
| + WinVMAddress nt_headers_address;
|
| + if (!ReadNtHeaders(&nt_headers, &nt_headers_address))
|
| + return false;
|
| +
|
| + WinVMAddress first_section_address =
|
| + nt_headers_address + offsetof(NtHeadersType, OptionalHeader) +
|
| + nt_headers.FileHeader.SizeOfOptionalHeader;
|
| + for (DWORD i = 0; i < nt_headers.FileHeader.NumberOfSections; ++i) {
|
| + WinVMAddress section_address =
|
| + first_section_address + sizeof(IMAGE_SECTION_HEADER) * i;
|
| + if (!CheckedReadMemory(
|
| + section_address, sizeof(IMAGE_SECTION_HEADER), section)) {
|
| + LOG(WARNING) << "could not read section " << i << " of " << module_name_;
|
| + return false;
|
| + }
|
| + if (strncmp(reinterpret_cast<const char*>(section->Name),
|
| + name.c_str(),
|
| + sizeof(section->Name)) == 0) {
|
| + return true;
|
| + }
|
| + }
|
| +
|
| + return false;
|
| +}
|
| +
|
| +bool PEImageReader::CheckedReadMemory(WinVMAddress address,
|
| + WinVMSize size,
|
| + void* into) const {
|
| + CheckedWinAddressRange read_range(process_reader_->Is64Bit(), address, size);
|
| + if (!read_range.IsValid()) {
|
| + LOG(WARNING) << "invalid read range: " << RangeToString(read_range);
|
| + return false;
|
| + }
|
| + if (!module_range_.ContainsRange(read_range)) {
|
| + LOG(WARNING) << "attempt to read outside of module " << module_name_
|
| + << " at range: " << RangeToString(read_range);
|
| + return false;
|
| + }
|
| + return process_reader_->ReadMemory(address, size, into);
|
| +}
|
| +
|
| +// Explicit instantiations with the only 2 valid template arguments to avoid
|
| +// putting the body of the function in the header.
|
| +template bool PEImageReader::GetCrashpadInfo<process_types::internal::Traits32>(
|
| + process_types::CrashpadInfo<process_types::internal::Traits32>*
|
| + crashpad_info) const;
|
| +template bool PEImageReader::GetCrashpadInfo<process_types::internal::Traits64>(
|
| + process_types::CrashpadInfo<process_types::internal::Traits64>*
|
| + crashpad_info) const;
|
| +
|
| +} // namespace crashpad
|
|
|