Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(753)

Side by Side Diff: chrome/tools/crash_service/crash_service.cc

Issue 26688006: Move CrashService class to breakpad component (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: updates Created 7 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « chrome/tools/crash_service/crash_service.h ('k') | chrome/tools/crash_service/main.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/tools/crash_service/crash_service.h"
6
7 #include <windows.h>
8
9 #include <sddl.h>
10 #include <fstream>
11 #include <map>
12
13 #include "base/command_line.h"
14 #include "base/file_util.h"
15 #include "base/logging.h"
16 #include "base/path_service.h"
17 #include "base/win/windows_version.h"
18 #include "breakpad/src/client/windows/crash_generation/client_info.h"
19 #include "breakpad/src/client/windows/crash_generation/crash_generation_server.h "
20 #include "breakpad/src/client/windows/sender/crash_report_sender.h"
21 #include "chrome/common/chrome_constants.h"
22 #include "chrome/common/chrome_paths.h"
23
24 namespace {
25
26 const wchar_t kTestPipeName[] = L"\\\\.\\pipe\\ChromeCrashServices";
27
28 const wchar_t kCrashReportURL[] = L"https://clients2.google.com/cr/report";
29 const wchar_t kCheckPointFile[] = L"crash_checkpoint.txt";
30
31 typedef std::map<std::wstring, std::wstring> CrashMap;
32
33 bool CustomInfoToMap(const google_breakpad::ClientInfo* client_info,
34 const std::wstring& reporter_tag, CrashMap* map) {
35 google_breakpad::CustomClientInfo info = client_info->GetCustomInfo();
36
37 for (uintptr_t i = 0; i < info.count; ++i) {
38 (*map)[info.entries[i].name] = info.entries[i].value;
39 }
40
41 (*map)[L"rept"] = reporter_tag;
42
43 return !map->empty();
44 }
45
46 bool WriteCustomInfoToFile(const std::wstring& dump_path, const CrashMap& map) {
47 std::wstring file_path(dump_path);
48 size_t last_dot = file_path.rfind(L'.');
49 if (last_dot == std::wstring::npos)
50 return false;
51 file_path.resize(last_dot);
52 file_path += L".txt";
53
54 std::wofstream file(file_path.c_str(),
55 std::ios_base::out | std::ios_base::app | std::ios::binary);
56 if (!file.is_open())
57 return false;
58
59 CrashMap::const_iterator pos;
60 for (pos = map.begin(); pos != map.end(); ++pos) {
61 std::wstring line = pos->first;
62 line += L':';
63 line += pos->second;
64 line += L'\n';
65 file.write(line.c_str(), static_cast<std::streamsize>(line.length()));
66 }
67 return true;
68 }
69
70 // The window procedure task is to handle when a) the user logs off.
71 // b) the system shuts down or c) when the user closes the window.
72 LRESULT __stdcall CrashSvcWndProc(HWND hwnd, UINT message,
73 WPARAM wparam, LPARAM lparam) {
74 switch (message) {
75 case WM_CLOSE:
76 case WM_ENDSESSION:
77 case WM_DESTROY:
78 PostQuitMessage(0);
79 break;
80 default:
81 return DefWindowProc(hwnd, message, wparam, lparam);
82 }
83 return 0;
84 }
85
86 // This is the main and only application window.
87 HWND g_top_window = NULL;
88
89 bool CreateTopWindow(HINSTANCE instance, bool visible) {
90 WNDCLASSEXW wcx = {0};
91 wcx.cbSize = sizeof(wcx);
92 wcx.style = CS_HREDRAW | CS_VREDRAW;
93 wcx.lpfnWndProc = CrashSvcWndProc;
94 wcx.hInstance = instance;
95 wcx.lpszClassName = L"crash_svc_class";
96 ATOM atom = ::RegisterClassExW(&wcx);
97 DWORD style = visible ? WS_POPUPWINDOW | WS_VISIBLE : WS_OVERLAPPED;
98
99 // The window size is zero but being a popup window still shows in the
100 // task bar and can be closed using the system menu or using task manager.
101 HWND window = CreateWindowExW(0, wcx.lpszClassName, L"crash service", style,
102 CW_USEDEFAULT, CW_USEDEFAULT, 0, 0,
103 NULL, NULL, instance, NULL);
104 if (!window)
105 return false;
106
107 ::UpdateWindow(window);
108 VLOG(1) << "window handle is " << window;
109 g_top_window = window;
110 return true;
111 }
112
113 // Simple helper class to keep the process alive until the current request
114 // finishes.
115 class ProcessingLock {
116 public:
117 ProcessingLock() {
118 ::InterlockedIncrement(&op_count_);
119 }
120 ~ProcessingLock() {
121 ::InterlockedDecrement(&op_count_);
122 }
123 static bool IsWorking() {
124 return (op_count_ != 0);
125 }
126 private:
127 static volatile LONG op_count_;
128 };
129
130 volatile LONG ProcessingLock::op_count_ = 0;
131
132 // This structure contains the information that the worker thread needs to
133 // send a crash dump to the server.
134 struct DumpJobInfo {
135 DWORD pid;
136 CrashService* self;
137 CrashMap map;
138 std::wstring dump_path;
139
140 DumpJobInfo(DWORD process_id, CrashService* service,
141 const CrashMap& crash_map, const std::wstring& path)
142 : pid(process_id), self(service), map(crash_map), dump_path(path) {
143 }
144 };
145
146 } // namespace
147
148 // Command line switches:
149 const char CrashService::kMaxReports[] = "max-reports";
150 const char CrashService::kNoWindow[] = "no-window";
151 const char CrashService::kReporterTag[] = "reporter";
152 const char CrashService::kDumpsDir[] = "dumps-dir";
153 const char CrashService::kPipeName[] = "pipe-name";
154
155 CrashService::CrashService(const std::wstring& report_dir)
156 : report_path_(report_dir),
157 sender_(NULL),
158 dumper_(NULL),
159 requests_handled_(0),
160 requests_sent_(0),
161 clients_connected_(0),
162 clients_terminated_(0) {
163 chrome::RegisterPathProvider();
164 }
165
166 CrashService::~CrashService() {
167 base::AutoLock lock(sending_);
168 delete dumper_;
169 delete sender_;
170 }
171
172
173 bool CrashService::Initialize(const std::wstring& command_line) {
174 using google_breakpad::CrashReportSender;
175 using google_breakpad::CrashGenerationServer;
176
177 std::wstring pipe_name = kTestPipeName;
178 int max_reports = -1;
179
180 // The checkpoint file allows CrashReportSender to enforce the the maximum
181 // reports per day quota. Does not seem to serve any other purpose.
182 base::FilePath checkpoint_path = report_path_.Append(kCheckPointFile);
183
184 // The dumps path is typically : '<user profile>\Local settings\
185 // Application data\Goggle\Chrome\Crash Reports' and the report path is
186 // Application data\Google\Chrome\Reported Crashes.txt
187 base::FilePath user_data_dir;
188 if (!PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
189 LOG(ERROR) << "could not get DIR_USER_DATA";
190 return false;
191 }
192 report_path_ = user_data_dir.Append(chrome::kCrashReportLog);
193
194 CommandLine cmd_line = CommandLine::FromString(command_line);
195
196 base::FilePath dumps_path;
197 if (cmd_line.HasSwitch(kDumpsDir)) {
198 dumps_path = base::FilePath(cmd_line.GetSwitchValueNative(kDumpsDir));
199 } else {
200 if (!PathService::Get(chrome::DIR_CRASH_DUMPS, &dumps_path)) {
201 LOG(ERROR) << "could not get DIR_CRASH_DUMPS";
202 return false;
203 }
204 }
205
206 // We can override the send reports quota with a command line switch.
207 if (cmd_line.HasSwitch(kMaxReports))
208 max_reports = _wtoi(cmd_line.GetSwitchValueNative(kMaxReports).c_str());
209
210 // Allow the global pipe name to be overridden for better testability.
211 if (cmd_line.HasSwitch(kPipeName))
212 pipe_name = cmd_line.GetSwitchValueNative(kPipeName);
213
214 #ifdef _WIN64
215 pipe_name += L"-x64";
216 #endif
217
218 if (max_reports > 0) {
219 // Create the http sender object.
220 sender_ = new CrashReportSender(checkpoint_path.value());
221 sender_->set_max_reports_per_day(max_reports);
222 }
223
224 SECURITY_ATTRIBUTES security_attributes = {0};
225 SECURITY_ATTRIBUTES* security_attributes_actual = NULL;
226
227 if (base::win::GetVersion() >= base::win::VERSION_VISTA) {
228 SECURITY_DESCRIPTOR* security_descriptor =
229 reinterpret_cast<SECURITY_DESCRIPTOR*>(
230 GetSecurityDescriptorForLowIntegrity());
231 DCHECK(security_descriptor != NULL);
232
233 security_attributes.nLength = sizeof(security_attributes);
234 security_attributes.lpSecurityDescriptor = security_descriptor;
235 security_attributes.bInheritHandle = FALSE;
236
237 security_attributes_actual = &security_attributes;
238 }
239
240 // Create the OOP crash generator object.
241 dumper_ = new CrashGenerationServer(pipe_name, security_attributes_actual,
242 &CrashService::OnClientConnected, this,
243 &CrashService::OnClientDumpRequest, this,
244 &CrashService::OnClientExited, this,
245 NULL, NULL,
246 true, &dumps_path.value());
247
248 if (!dumper_) {
249 LOG(ERROR) << "could not create dumper";
250 if (security_attributes.lpSecurityDescriptor)
251 LocalFree(security_attributes.lpSecurityDescriptor);
252 return false;
253 }
254
255 if (!CreateTopWindow(::GetModuleHandleW(NULL),
256 !cmd_line.HasSwitch(kNoWindow))) {
257 LOG(ERROR) << "could not create window";
258 if (security_attributes.lpSecurityDescriptor)
259 LocalFree(security_attributes.lpSecurityDescriptor);
260 return false;
261 }
262
263 reporter_tag_ = L"crash svc";
264 if (cmd_line.HasSwitch(kReporterTag))
265 reporter_tag_ = cmd_line.GetSwitchValueNative(kReporterTag);
266
267 // Log basic information.
268 VLOG(1) << "pipe name is " << pipe_name
269 << "\ndumps at " << dumps_path.value()
270 << "\nreports at " << report_path_.value();
271
272 if (sender_) {
273 VLOG(1) << "checkpoint is " << checkpoint_path.value()
274 << "\nserver is " << kCrashReportURL
275 << "\nmaximum " << sender_->max_reports_per_day() << " reports/day"
276 << "\nreporter is " << reporter_tag_;
277 }
278 // Start servicing clients.
279 if (!dumper_->Start()) {
280 LOG(ERROR) << "could not start dumper";
281 if (security_attributes.lpSecurityDescriptor)
282 LocalFree(security_attributes.lpSecurityDescriptor);
283 return false;
284 }
285
286 if (security_attributes.lpSecurityDescriptor)
287 LocalFree(security_attributes.lpSecurityDescriptor);
288
289 // This is throwaway code. We don't need to sync with the browser process
290 // once Google Update is updated to a version supporting OOP crash handling.
291 // Create or open an event to signal the browser process that the crash
292 // service is initialized.
293 HANDLE running_event =
294 ::CreateEventW(NULL, TRUE, TRUE, L"g_chrome_crash_svc");
295 // If the browser already had the event open, the CreateEvent call did not
296 // signal it. We need to do it manually.
297 ::SetEvent(running_event);
298
299 return true;
300 }
301
302 void CrashService::OnClientConnected(void* context,
303 const google_breakpad::ClientInfo* client_info) {
304 ProcessingLock lock;
305 VLOG(1) << "client start. pid = " << client_info->pid();
306 CrashService* self = static_cast<CrashService*>(context);
307 ::InterlockedIncrement(&self->clients_connected_);
308 }
309
310 void CrashService::OnClientExited(void* context,
311 const google_breakpad::ClientInfo* client_info) {
312 ProcessingLock lock;
313 VLOG(1) << "client end. pid = " << client_info->pid();
314 CrashService* self = static_cast<CrashService*>(context);
315 ::InterlockedIncrement(&self->clients_terminated_);
316
317 if (!self->sender_)
318 return;
319
320 // When we are instructed to send reports we need to exit if there are
321 // no more clients to service. The next client that runs will start us.
322 // Only chrome.exe starts crash_service with a non-zero max_reports.
323 if (self->clients_connected_ > self->clients_terminated_)
324 return;
325 if (self->sender_->max_reports_per_day() > 0) {
326 // Wait for the other thread to send crashes, if applicable. The sender
327 // thread takes the sending_ lock, so the sleep is just to give it a
328 // chance to start.
329 ::Sleep(1000);
330 base::AutoLock lock(self->sending_);
331 // Some people can restart chrome very fast, check again if we have
332 // a new client before exiting for real.
333 if (self->clients_connected_ == self->clients_terminated_) {
334 VLOG(1) << "zero clients. exiting";
335 ::PostMessage(g_top_window, WM_CLOSE, 0, 0);
336 }
337 }
338 }
339
340 void CrashService::OnClientDumpRequest(void* context,
341 const google_breakpad::ClientInfo* client_info,
342 const std::wstring* file_path) {
343 ProcessingLock lock;
344
345 if (!file_path) {
346 LOG(ERROR) << "dump with no file path";
347 return;
348 }
349 if (!client_info) {
350 LOG(ERROR) << "dump with no client info";
351 return;
352 }
353
354 CrashService* self = static_cast<CrashService*>(context);
355 if (!self) {
356 LOG(ERROR) << "dump with no context";
357 return;
358 }
359
360 CrashMap map;
361 CustomInfoToMap(client_info, self->reporter_tag_, &map);
362
363 // Move dump file to the directory under client breakpad dump location.
364 base::FilePath dump_location = base::FilePath(*file_path);
365 CrashMap::const_iterator it = map.find(L"breakpad-dump-location");
366 if (it != map.end()) {
367 base::FilePath alternate_dump_location = base::FilePath(it->second);
368 file_util::CreateDirectoryW(alternate_dump_location);
369 alternate_dump_location = alternate_dump_location.Append(
370 dump_location.BaseName());
371 base::Move(dump_location, alternate_dump_location);
372 dump_location = alternate_dump_location;
373 }
374
375 DWORD pid = client_info->pid();
376 VLOG(1) << "dump for pid = " << pid << " is " << dump_location.value();
377
378 if (!WriteCustomInfoToFile(dump_location.value(), map)) {
379 LOG(ERROR) << "could not write custom info file";
380 }
381
382 if (!self->sender_)
383 return;
384
385 // Send the crash dump using a worker thread. This operation has retry
386 // logic in case there is no internet connection at the time.
387 DumpJobInfo* dump_job = new DumpJobInfo(pid, self, map,
388 dump_location.value());
389 if (!::QueueUserWorkItem(&CrashService::AsyncSendDump,
390 dump_job, WT_EXECUTELONGFUNCTION)) {
391 LOG(ERROR) << "could not queue job";
392 }
393 }
394
395 // We are going to try sending the report several times. If we can't send,
396 // we sleep from one minute to several hours depending on the retry round.
397 unsigned long CrashService::AsyncSendDump(void* context) {
398 if (!context)
399 return 0;
400
401 DumpJobInfo* info = static_cast<DumpJobInfo*>(context);
402
403 std::wstring report_id = L"<unsent>";
404
405 const DWORD kOneMinute = 60*1000;
406 const DWORD kOneHour = 60*kOneMinute;
407
408 const DWORD kSleepSchedule[] = {
409 24*kOneHour,
410 8*kOneHour,
411 4*kOneHour,
412 kOneHour,
413 15*kOneMinute,
414 0};
415
416 int retry_round = arraysize(kSleepSchedule) - 1;
417
418 do {
419 ::Sleep(kSleepSchedule[retry_round]);
420 {
421 // Take the server lock while sending. This also prevent early
422 // termination of the service object.
423 base::AutoLock lock(info->self->sending_);
424 VLOG(1) << "trying to send report for pid = " << info->pid;
425 google_breakpad::ReportResult send_result
426 = info->self->sender_->SendCrashReport(kCrashReportURL, info->map,
427 info->dump_path, &report_id);
428 switch (send_result) {
429 case google_breakpad::RESULT_FAILED:
430 report_id = L"<network issue>";
431 break;
432 case google_breakpad::RESULT_REJECTED:
433 report_id = L"<rejected>";
434 ++info->self->requests_handled_;
435 retry_round = 0;
436 break;
437 case google_breakpad::RESULT_SUCCEEDED:
438 ++info->self->requests_sent_;
439 ++info->self->requests_handled_;
440 retry_round = 0;
441 break;
442 case google_breakpad::RESULT_THROTTLED:
443 report_id = L"<throttled>";
444 break;
445 default:
446 report_id = L"<unknown>";
447 break;
448 };
449 }
450
451 VLOG(1) << "dump for pid =" << info->pid << " crash2 id =" << report_id;
452 --retry_round;
453 } while (retry_round >= 0);
454
455 if (!::DeleteFileW(info->dump_path.c_str()))
456 LOG(WARNING) << "could not delete " << info->dump_path;
457
458 delete info;
459 return 0;
460 }
461
462 int CrashService::ProcessingLoop() {
463 MSG msg;
464 while (GetMessage(&msg, NULL, 0, 0)) {
465 TranslateMessage(&msg);
466 DispatchMessage(&msg);
467 }
468
469 VLOG(1) << "session ending..";
470 while (ProcessingLock::IsWorking()) {
471 ::Sleep(50);
472 }
473
474 VLOG(1) << "clients connected :" << clients_connected_
475 << "\nclients terminated :" << clients_terminated_
476 << "\ndumps serviced :" << requests_handled_
477 << "\ndumps reported :" << requests_sent_;
478
479 return static_cast<int>(msg.wParam);
480 }
481
482 PSECURITY_DESCRIPTOR CrashService::GetSecurityDescriptorForLowIntegrity() {
483 // Build the SDDL string for the label.
484 std::wstring sddl = L"S:(ML;;NW;;;S-1-16-4096)";
485
486 DWORD error = ERROR_SUCCESS;
487 PSECURITY_DESCRIPTOR sec_desc = NULL;
488
489 PACL sacl = NULL;
490 BOOL sacl_present = FALSE;
491 BOOL sacl_defaulted = FALSE;
492
493 if (::ConvertStringSecurityDescriptorToSecurityDescriptorW(sddl.c_str(),
494 SDDL_REVISION,
495 &sec_desc, NULL)) {
496 if (::GetSecurityDescriptorSacl(sec_desc, &sacl_present, &sacl,
497 &sacl_defaulted)) {
498 return sec_desc;
499 }
500 }
501
502 return NULL;
503 }
OLDNEW
« no previous file with comments | « chrome/tools/crash_service/crash_service.h ('k') | chrome/tools/crash_service/main.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698