Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(254)

Side by Side Diff: chrome_elf/chrome_elf_main.cc

Issue 2225453002: Revert of Don't IAT patch SetUnhandledExceptionFilter when ASan is active (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome_elf/chrome_elf_main.h" 5 #include "chrome_elf/chrome_elf_main.h"
6 6
7 #include <windows.h> 7 #include <windows.h>
8 #include <algorithm> 8 #include <algorithm>
9 9
10 #include "base/lazy_instance.h" 10 #include "base/lazy_instance.h"
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
43 return file_name_string; 43 return file_name_string;
44 } 44 }
45 45
46 void InitializeCrashReportingForProcess() { 46 void InitializeCrashReportingForProcess() {
47 // We want to initialize crash reporting only in chrome.exe 47 // We want to initialize crash reporting only in chrome.exe
48 if (GetExeName() != L"chrome.exe") 48 if (GetExeName() != L"chrome.exe")
49 return; 49 return;
50 ChromeCrashReporterClient::InitializeCrashReportingForProcess(); 50 ChromeCrashReporterClient::InitializeCrashReportingForProcess();
51 } 51 }
52 52
53 #if !defined(ADDRESS_SANITIZER)
54 // chrome_elf loads early in the process and initializes Crashpad. That in turn 53 // chrome_elf loads early in the process and initializes Crashpad. That in turn
55 // uses the SetUnhandledExceptionFilter API to set a top level exception 54 // uses the SetUnhandledExceptionFilter API to set a top level exception
56 // handler for the process. When the process eventually initializes, CRT sets 55 // handler for the process. When the process eventually initializes, CRT sets
57 // an exception handler which calls TerminateProcess which effectively bypasses 56 // an exception handler which calls TerminateProcess which effectively bypasses
58 // us. Ideally we want to be at the top of the unhandled exception filter 57 // us. Ideally we want to be at the top of the unhandled exception filter
59 // chain. However we don't have a good way of intercepting the 58 // chain. However we don't have a good way of intercepting the
60 // SetUnhandledExceptionFilter API in the sandbox. EAT patching kernel32 or 59 // SetUnhandledExceptionFilter API in the sandbox. EAT patching kernel32 or
61 // kernelbase should ideally work. However the kernel32 kernelbase dlls are 60 // kernelbase should ideally work. However the kernel32 kernelbase dlls are
62 // prebound which causes EAT patching to not work. Sidestep works. However it 61 // prebound which causes EAT patching to not work. Sidestep works. However it
63 // is only supported for 32 bit. For now we use IAT patching for the 62 // is only supported for 32 bit. For now we use IAT patching for the
(...skipping 10 matching lines...) Expand all
74 } 73 }
75 74
76 // Please refer above to more information about why we intercept the 75 // Please refer above to more information about why we intercept the
77 // SetUnhandledExceptionFilter API. 76 // SetUnhandledExceptionFilter API.
78 void DisableSetUnhandledExceptionFilter() { 77 void DisableSetUnhandledExceptionFilter() {
79 DWORD patched = g_set_unhandled_exception_filter.PatchFromModule( 78 DWORD patched = g_set_unhandled_exception_filter.PatchFromModule(
80 GetModuleHandle(nullptr), "kernel32.dll", "SetUnhandledExceptionFilter", 79 GetModuleHandle(nullptr), "kernel32.dll", "SetUnhandledExceptionFilter",
81 SetUnhandledExceptionFilterPatch); 80 SetUnhandledExceptionFilterPatch);
82 CHECK(patched == 0); 81 CHECK(patched == 0);
83 } 82 }
84 #endif // !defined(ADDRESS_SANITIZER)
85 83
86 } // namespace 84 } // namespace
87 85
88 void SignalChromeElf() { 86 void SignalChromeElf() {
89 blacklist::ResetBeacon(); 87 blacklist::ResetBeacon();
90 } 88 }
91 89
92 // This helper is invoked by code in chrome.dll to retrieve the crash reports. 90 // This helper is invoked by code in chrome.dll to retrieve the crash reports.
93 // See CrashUploadListCrashpad. Note that we do not pass an std::vector here, 91 // See CrashUploadListCrashpad. Note that we do not pass an std::vector here,
94 // because we do not want to allocate/free in different modules. The returned 92 // because we do not want to allocate/free in different modules. The returned
(...skipping 12 matching lines...) Expand all
107 const char* client_id) { 105 const char* client_id) {
108 if (client_id) 106 if (client_id)
109 crash_keys::SetMetricsClientIdFromGUID(client_id); 107 crash_keys::SetMetricsClientIdFromGUID(client_id);
110 } 108 }
111 109
112 BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) { 110 BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) {
113 if (reason == DLL_PROCESS_ATTACH) { 111 if (reason == DLL_PROCESS_ATTACH) {
114 InitializeCrashReportingForProcess(); 112 InitializeCrashReportingForProcess();
115 // CRT on initialization installs an exception filter which calls 113 // CRT on initialization installs an exception filter which calls
116 // TerminateProcess. We need to hook CRT's attempt to set an exception 114 // TerminateProcess. We need to hook CRT's attempt to set an exception
117 // handler and ignore it. Don't do this when ASan is present, or ASan will 115 // handler and ignore it.
118 // fail to install its own unhandled exception filter.
119 #if !defined(ADDRESS_SANITIZER)
120 DisableSetUnhandledExceptionFilter(); 116 DisableSetUnhandledExceptionFilter();
121 #endif
122 117
123 install_static::InitializeProcessType(); 118 install_static::InitializeProcessType();
124 if (install_static::g_process_type == 119 if (install_static::g_process_type ==
125 install_static::ProcessType::BROWSER_PROCESS) 120 install_static::ProcessType::BROWSER_PROCESS)
126 EarlyBrowserSecurity(); 121 EarlyBrowserSecurity();
127 122
128 __try { 123 __try {
129 blacklist::Initialize(false); // Don't force, abort if beacon is present. 124 blacklist::Initialize(false); // Don't force, abort if beacon is present.
130 } __except(GenerateCrashDump(GetExceptionInformation())) { 125 } __except(GenerateCrashDump(GetExceptionInformation())) {
131 } 126 }
132 } 127 }
133 return TRUE; 128 return TRUE;
134 } 129 }
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698