| Index: components/breakpad/app/breakpad_linux.cc
|
| ===================================================================
|
| --- components/breakpad/app/breakpad_linux.cc (revision 265558)
|
| +++ components/breakpad/app/breakpad_linux.cc (working copy)
|
| @@ -189,6 +189,12 @@
|
| }
|
| #endif
|
|
|
| +#if !defined(OS_CHROMEOS)
|
| +bool my_isxdigit(char c) {
|
| + return (c >= '0' && c <= '9') || ((c | 0x20) >= 'a' && (c | 0x20) <= 'f');
|
| +}
|
| +#endif
|
| +
|
| size_t LengthWithoutTrailingSpaces(const char* str, size_t len) {
|
| while (len > 0 && str[len - 1] == ' ') {
|
| len--;
|
| @@ -297,6 +303,7 @@
|
|
|
| const char* const mime_boundary_;
|
|
|
| + private:
|
| DISALLOW_COPY_AND_ASSIGN(MimeWriter);
|
| };
|
|
|
| @@ -403,8 +410,7 @@
|
| // This subclass is used on Chromium OS to report crashes in a format easy for
|
| // the central crash reporting facility to understand.
|
| // Format is <name>:<data length in decimal>:<data>
|
| -class CrashReporterWriter : public MimeWriter
|
| -{
|
| +class CrashReporterWriter : public MimeWriter {
|
| public:
|
| explicit CrashReporterWriter(int fd);
|
|
|
| @@ -532,6 +538,10 @@
|
| #endif
|
| }
|
|
|
| +size_t WriteNewline() {
|
| + return WriteLog("\n", 1);
|
| +}
|
| +
|
| #if defined(OS_ANDROID)
|
| // Android's native crash handler outputs a diagnostic tombstone to the device
|
| // log. By returning false from the HandlerCallbacks, breakpad will reinstall
|
| @@ -706,8 +716,8 @@
|
| base::android::BuildInfo* android_build_info =
|
| base::android::BuildInfo::GetInstance();
|
| if (android_build_info->sdk_int() >= 18 &&
|
| - strcmp(android_build_info->build_type(), "eng") != 0 &&
|
| - strcmp(android_build_info->build_type(), "userdebug") != 0) {
|
| + my_strcmp(android_build_info->build_type(), "eng") != 0 &&
|
| + my_strcmp(android_build_info->build_type(), "userdebug") != 0) {
|
| // On JB MR2 and later, the system crash handler displays a dialog. For
|
| // renderer crashes, this is a bad user experience and so this is disabled
|
| // for user builds of Android.
|
| @@ -1020,7 +1030,104 @@
|
| sys__exit(1);
|
| }
|
|
|
| +// Runs in the helper process to wait for the upload process running
|
| +// ExecUploadProcessOrTerminate() to finish. Returns the number of bytes written
|
| +// to |fd| and save the written contents to |buf|.
|
| +// |buf| needs to be big enough to hold |bytes_to_read| + 1 characters.
|
| +size_t WaitForCrashReportUploadProcess(int fd, size_t bytes_to_read,
|
| + char* buf) {
|
| + size_t bytes_read = 0;
|
| +
|
| + // Upload should finish in about 10 seconds. Add a few more 500 ms
|
| + // internals to account for process startup time.
|
| + for (size_t wait_count = 0; wait_count < 24; ++wait_count) {
|
| + struct kernel_pollfd poll_fd;
|
| + poll_fd.fd = fd;
|
| + poll_fd.events = POLLIN | POLLPRI | POLLERR;
|
| + int ret = sys_poll(&poll_fd, 1, 500);
|
| + if (ret < 0) {
|
| + // Error
|
| + break;
|
| + } else if (ret > 0) {
|
| + // There is data to read.
|
| + ssize_t len = HANDLE_EINTR(
|
| + sys_read(fd, buf + bytes_read, bytes_to_read - bytes_read));
|
| + if (len < 0)
|
| + break;
|
| + bytes_read += len;
|
| + if (bytes_read == bytes_to_read)
|
| + break;
|
| + }
|
| + // |ret| == 0 -> timed out, continue waiting.
|
| + // or |bytes_read| < |bytes_to_read| still, keep reading.
|
| + }
|
| + buf[bytes_to_read] = 0; // Always NUL terminate the buffer.
|
| + return bytes_read;
|
| +}
|
| +
|
| +// |buf| should be |expected_len| + 1 characters in size and NULL terminated.
|
| +bool IsValidCrashReportId(const char* buf, size_t bytes_read,
|
| + size_t expected_len) {
|
| + if (bytes_read != expected_len)
|
| + return false;
|
| #if defined(OS_CHROMEOS)
|
| + return my_strcmp(buf, "_sys_cr_finished") == 0;
|
| +#else
|
| + for (size_t i = 0; i <= bytes_read; ++i) {
|
| + if (!my_isxdigit(buf[i]))
|
| + return false;
|
| + }
|
| + return true;
|
| +#endif
|
| +}
|
| +
|
| +// |buf| should be |expected_len| + 1 characters in size and NULL terminated.
|
| +void HandleCrashReportId(const char* buf, size_t bytes_read,
|
| + size_t expected_len) {
|
| + WriteNewline();
|
| + if (!IsValidCrashReportId(buf, bytes_read, expected_len)) {
|
| +#if defined(OS_CHROMEOS)
|
| + static const char msg[] = "Crash_reporter failed to process crash report";
|
| +#else
|
| + static const char msg[] = "Failed to get crash dump id.";
|
| +#endif
|
| + WriteLog(msg, sizeof(msg) - 1);
|
| + WriteNewline();
|
| + return;
|
| + }
|
| +
|
| +#if defined(OS_CHROMEOS)
|
| + static const char msg[] = "Crash dump received by crash_reporter\n";
|
| + WriteLog(msg, sizeof(msg) - 1);
|
| +#else
|
| + // Write crash dump id to stderr.
|
| + static const char msg[] = "Crash dump id: ";
|
| + WriteLog(msg, sizeof(msg) - 1);
|
| + WriteLog(buf, my_strlen(buf));
|
| + WriteNewline();
|
| +
|
| + // Write crash dump id to crash log as: seconds_since_epoch,crash_id
|
| + struct kernel_timeval tv;
|
| + if (g_crash_log_path && !sys_gettimeofday(&tv, NULL)) {
|
| + uint64_t time = kernel_timeval_to_ms(&tv) / 1000;
|
| + char time_str[kUint64StringSize];
|
| + const unsigned time_len = my_uint64_len(time);
|
| + my_uint64tos(time_str, time, time_len);
|
| +
|
| + const int kLogOpenFlags = O_CREAT | O_WRONLY | O_APPEND | O_CLOEXEC;
|
| + int log_fd = sys_open(g_crash_log_path, kLogOpenFlags, 0600);
|
| + if (log_fd > 0) {
|
| + sys_write(log_fd, time_str, time_len);
|
| + sys_write(log_fd, ",", 1);
|
| + sys_write(log_fd, buf, my_strlen(buf));
|
| + sys_write(log_fd, "\n", 1);
|
| + IGNORE_RET(sys_close(log_fd));
|
| + }
|
| + }
|
| +#endif
|
| +}
|
| +
|
| +#if defined(OS_CHROMEOS)
|
| const char* GetCrashingProcessName(const BreakpadInfo& info,
|
| google_breakpad::PageAllocator* allocator) {
|
| // Symlink to process binary is at /proc/###/exe.
|
| @@ -1205,6 +1312,7 @@
|
| MimeWriter writer(temp_file_fd, mime_boundary);
|
| #endif
|
| {
|
| + // TODO(thestig) Do not use this inside a compromised context.
|
| std::string product_name;
|
| std::string version;
|
|
|
| @@ -1410,53 +1518,13 @@
|
| // Helper process.
|
| if (upload_child > 0) {
|
| IGNORE_RET(sys_close(fds[1]));
|
| - char id_buf[17]; // Crash report IDs are expected to be 16 chars.
|
| - ssize_t len = -1;
|
| - // Upload should finish in about 10 seconds. Add a few more 500 ms
|
| - // internals to account for process startup time.
|
| - for (size_t wait_count = 0; wait_count < 24; ++wait_count) {
|
| - struct kernel_pollfd poll_fd;
|
| - poll_fd.fd = fds[0];
|
| - poll_fd.events = POLLIN | POLLPRI | POLLERR;
|
| - int ret = sys_poll(&poll_fd, 1, 500);
|
| - if (ret < 0) {
|
| - // Error
|
| - break;
|
| - } else if (ret > 0) {
|
| - // There is data to read.
|
| - len = HANDLE_EINTR(sys_read(fds[0], id_buf, sizeof(id_buf) - 1));
|
| - break;
|
| - }
|
| - // ret == 0 -> timed out, continue waiting.
|
| - }
|
| - if (len > 0) {
|
| - // Write crash dump id to stderr.
|
| - id_buf[len] = 0;
|
| - static const char msg[] = "\nCrash dump id: ";
|
| - WriteLog(msg, sizeof(msg) - 1);
|
| - WriteLog(id_buf, my_strlen(id_buf));
|
| - WriteLog("\n", 1);
|
|
|
| - // Write crash dump id to crash log as: seconds_since_epoch,crash_id
|
| - struct kernel_timeval tv;
|
| - if (g_crash_log_path && !sys_gettimeofday(&tv, NULL)) {
|
| - uint64_t time = kernel_timeval_to_ms(&tv) / 1000;
|
| - char time_str[kUint64StringSize];
|
| - const unsigned time_len = my_uint64_len(time);
|
| - my_uint64tos(time_str, time, time_len);
|
| + const size_t kCrashIdLength = 16;
|
| + char id_buf[kCrashIdLength + 1];
|
| + size_t bytes_read =
|
| + WaitForCrashReportUploadProcess(fds[0], kCrashIdLength, id_buf);
|
| + HandleCrashReportId(id_buf, bytes_read, kCrashIdLength);
|
|
|
| - int log_fd = sys_open(g_crash_log_path,
|
| - O_CREAT | O_WRONLY | O_APPEND,
|
| - 0600);
|
| - if (log_fd > 0) {
|
| - sys_write(log_fd, time_str, time_len);
|
| - sys_write(log_fd, ",", 1);
|
| - sys_write(log_fd, id_buf, my_strlen(id_buf));
|
| - sys_write(log_fd, "\n", 1);
|
| - IGNORE_RET(sys_close(log_fd));
|
| - }
|
| - }
|
| - }
|
| if (sys_waitpid(upload_child, NULL, WNOHANG) == 0) {
|
| // Upload process is still around, kill it.
|
| sys_kill(upload_child, SIGKILL);
|
|
|