| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome_elf/chrome_elf_main.h" | 5 #include "chrome_elf/chrome_elf_main.h" |
| 6 | 6 |
| 7 #include <windows.h> | 7 #include <windows.h> |
| 8 #include <algorithm> | 8 #include <algorithm> |
| 9 | 9 |
| 10 #include "base/lazy_instance.h" | 10 #include "base/lazy_instance.h" |
| (...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 77 void DisableSetUnhandledExceptionFilter() { | 77 void DisableSetUnhandledExceptionFilter() { |
| 78 DWORD patched = g_set_unhandled_exception_filter.PatchFromModule( | 78 DWORD patched = g_set_unhandled_exception_filter.PatchFromModule( |
| 79 GetModuleHandle(nullptr), "kernel32.dll", "SetUnhandledExceptionFilter", | 79 GetModuleHandle(nullptr), "kernel32.dll", "SetUnhandledExceptionFilter", |
| 80 SetUnhandledExceptionFilterPatch); | 80 SetUnhandledExceptionFilterPatch); |
| 81 CHECK(patched == 0); | 81 CHECK(patched == 0); |
| 82 } | 82 } |
| 83 #endif // !defined(ADDRESS_SANITIZER) | 83 #endif // !defined(ADDRESS_SANITIZER) |
| 84 | 84 |
| 85 } // namespace | 85 } // namespace |
| 86 | 86 |
| 87 // This function is a temporary workaround for https://crbug.com/655788. We |
| 88 // need to come up with a better way to initialize crash reporting that can |
| 89 // happen inside DllMain(). |
| 90 void SignalInitializeCrashReporting() { |
| 91 InitializeCrashReportingForProcess(); |
| 92 } |
| 93 |
| 87 void SignalChromeElf() { | 94 void SignalChromeElf() { |
| 88 blacklist::ResetBeacon(); | 95 blacklist::ResetBeacon(); |
| 89 } | 96 } |
| 90 | 97 |
| 91 // This helper is invoked by code in chrome.dll to retrieve the crash reports. | 98 // This helper is invoked by code in chrome.dll to retrieve the crash reports. |
| 92 // See CrashUploadListCrashpad. Note that we do not pass an std::vector here, | 99 // See CrashUploadListCrashpad. Note that we do not pass an std::vector here, |
| 93 // because we do not want to allocate/free in different modules. The returned | 100 // because we do not want to allocate/free in different modules. The returned |
| 94 // pointer is read-only. | 101 // pointer is read-only. |
| 95 extern "C" __declspec(dllexport) void GetCrashReportsImpl( | 102 extern "C" __declspec(dllexport) void GetCrashReportsImpl( |
| 96 const crash_reporter::Report** reports, | 103 const crash_reporter::Report** reports, |
| 97 size_t* report_count) { | 104 size_t* report_count) { |
| 98 crash_reporter::GetReports(g_crash_reports.Pointer()); | 105 crash_reporter::GetReports(g_crash_reports.Pointer()); |
| 99 *reports = g_crash_reports.Pointer()->data(); | 106 *reports = g_crash_reports.Pointer()->data(); |
| 100 *report_count = g_crash_reports.Pointer()->size(); | 107 *report_count = g_crash_reports.Pointer()->size(); |
| 101 } | 108 } |
| 102 | 109 |
| 103 // This helper is invoked by debugging code in chrome to register the client | 110 // This helper is invoked by debugging code in chrome to register the client |
| 104 // id. | 111 // id. |
| 105 extern "C" __declspec(dllexport) void SetMetricsClientId( | 112 extern "C" __declspec(dllexport) void SetMetricsClientId( |
| 106 const char* client_id) { | 113 const char* client_id) { |
| 107 if (client_id) | 114 if (client_id) |
| 108 crash_keys::SetMetricsClientIdFromGUID(client_id); | 115 crash_keys::SetMetricsClientIdFromGUID(client_id); |
| 109 } | 116 } |
| 110 | 117 |
| 111 BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) { | 118 BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) { |
| 112 if (reason == DLL_PROCESS_ATTACH) { | 119 if (reason == DLL_PROCESS_ATTACH) { |
| 113 InitializeCrashReportingForProcess(); | |
| 114 // CRT on initialization installs an exception filter which calls | |
| 115 // TerminateProcess. We need to hook CRT's attempt to set an exception | |
| 116 // handler and ignore it. Don't do this when ASan is present, or ASan will | |
| 117 // fail to install its own unhandled exception filter. | |
| 118 #if !defined(ADDRESS_SANITIZER) | 120 #if !defined(ADDRESS_SANITIZER) |
| 119 DisableSetUnhandledExceptionFilter(); | 121 DisableSetUnhandledExceptionFilter(); |
| 120 #endif | 122 #endif |
| 121 | 123 |
| 122 install_static::InitializeProcessType(); | 124 install_static::InitializeProcessType(); |
| 123 | 125 |
| 124 __try { | 126 __try { |
| 125 blacklist::Initialize(false); // Don't force, abort if beacon is present. | 127 blacklist::Initialize(false); // Don't force, abort if beacon is present. |
| 126 } __except(GenerateCrashDump(GetExceptionInformation())) { | 128 } __except(GenerateCrashDump(GetExceptionInformation())) { |
| 127 } | 129 } |
| 128 } | 130 } |
| 129 return TRUE; | 131 return TRUE; |
| 130 } | 132 } |
| OLD | NEW |