Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(654)

Unified Diff: components/breakpad/browser/crash_handler_host_linux.cc

Issue 296553002: Breakpad Linux: Prevent some memory leaks. (Try 2) (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: fix asan Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « components/breakpad/browser/crash_handler_host_linux.h ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/breakpad/browser/crash_handler_host_linux.cc
===================================================================
--- components/breakpad/browser/crash_handler_host_linux.cc (revision 271470)
+++ components/breakpad/browser/crash_handler_host_linux.cc (working copy)
@@ -17,7 +17,6 @@
#include "base/format_macros.h"
#include "base/linux_util.h"
#include "base/logging.h"
-#include "base/memory/singleton.h"
#include "base/message_loop/message_loop.h"
#include "base/path_service.h"
#include "base/posix/eintr_wrapper.h"
@@ -44,14 +43,16 @@
namespace {
+const size_t kNumFDs = 1;
// The length of the control message:
-const unsigned kControlMsgSize =
- CMSG_SPACE(sizeof(int)) + CMSG_SPACE(sizeof(struct ucred));
+const size_t kControlMsgSize =
+ CMSG_SPACE(kNumFDs * sizeof(int)) + CMSG_SPACE(sizeof(struct ucred));
// The length of the regular payload:
-const unsigned kCrashContextSize = sizeof(ExceptionHandler::CrashContext);
+const size_t kCrashContextSize = sizeof(ExceptionHandler::CrashContext);
// Handles the crash dump and frees the allocated BreakpadInfo struct.
-void CrashDumpTask(CrashHandlerHostLinux* handler, BreakpadInfo* info) {
+void CrashDumpTask(CrashHandlerHostLinux* handler,
+ scoped_ptr<BreakpadInfo> info) {
if (handler->IsShuttingDown() && info->upload) {
base::DeleteFile(base::FilePath(info->filename), false);
#if defined(ADDRESS_SANITIZER)
@@ -64,11 +65,11 @@
delete[] info->filename;
#if defined(ADDRESS_SANITIZER)
delete[] info->log_filename;
+ delete[] info->asan_report_str;
#endif
delete[] info->process_type;
delete[] info->distro;
delete info->crash_keys;
- delete info;
}
} // namespace
@@ -93,11 +94,11 @@
// inherit some sockets. With PF_UNIX+SOCK_DGRAM, it can call sendmsg to send
// a datagram to any (abstract) socket on the same system. With
// SOCK_SEQPACKET, this is prevented.
- CHECK_EQ(socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds), 0);
+ CHECK_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds));
static const int on = 1;
// Enable passcred on the server end of the socket
- CHECK_EQ(setsockopt(fds[1], SOL_SOCKET, SO_PASSCRED, &on, sizeof(on)), 0);
+ CHECK_EQ(0, setsockopt(fds[1], SOL_SOCKET, SO_PASSCRED, &on, sizeof(on)));
process_socket_ = fds[0];
browser_socket_ = fds[1];
@@ -132,7 +133,7 @@
}
void CrashHandlerHostLinux::OnFileCanReadWithoutBlocking(int fd) {
- DCHECK_EQ(fd, browser_socket_);
+ DCHECK_EQ(browser_socket_, fd);
// A process has crashed and has signaled us by writing a datagram
// to the death signal socket. The datagram contains the crash context needed
@@ -144,16 +145,12 @@
struct msghdr msg = {0};
struct iovec iov[kCrashIovSize];
- // Freed in WriteDumpFile();
- char* crash_context = new char[kCrashContextSize];
- // Freed in CrashDumpTask();
- char* distro = new char[kDistroSize + 1];
+ scoped_ptr<char[]> crash_context(new char[kCrashContextSize]);
#if defined(ADDRESS_SANITIZER)
- asan_report_str_ = new char[kMaxAsanReportSize + 1];
+ scoped_ptr<char[]> asan_report(new char[kMaxAsanReportSize + 1]);
#endif
- // Freed in CrashDumpTask().
- CrashKeyStorage* crash_keys = new CrashKeyStorage;
+ scoped_ptr<CrashKeyStorage> crash_keys(new CrashKeyStorage);
google_breakpad::SerializedNonAllocatingMap* serialized_crash_keys;
size_t crash_keys_size = crash_keys->Serialize(
const_cast<const google_breakpad::SerializedNonAllocatingMap**>(
@@ -166,7 +163,6 @@
char control[kControlMsgSize];
const ssize_t expected_msg_size =
kCrashContextSize +
- kDistroSize + 1 +
sizeof(tid_buf_addr) + sizeof(tid_fd) +
sizeof(uptime) +
#if defined(ADDRESS_SANITIZER)
@@ -174,23 +170,24 @@
#endif
sizeof(oom_size) +
crash_keys_size;
- iov[0].iov_base = crash_context;
+ iov[0].iov_base = crash_context.get();
iov[0].iov_len = kCrashContextSize;
- iov[1].iov_base = distro;
- iov[1].iov_len = kDistroSize + 1;
- iov[2].iov_base = &tid_buf_addr;
- iov[2].iov_len = sizeof(tid_buf_addr);
- iov[3].iov_base = &tid_fd;
- iov[3].iov_len = sizeof(tid_fd);
- iov[4].iov_base = &uptime;
- iov[4].iov_len = sizeof(uptime);
- iov[5].iov_base = &oom_size;
- iov[5].iov_len = sizeof(oom_size);
- iov[6].iov_base = serialized_crash_keys;
- iov[6].iov_len = crash_keys_size;
-#if defined(ADDRESS_SANITIZER)
- iov[7].iov_base = asan_report_str_;
- iov[7].iov_len = kMaxAsanReportSize + 1;
+ iov[1].iov_base = &tid_buf_addr;
+ iov[1].iov_len = sizeof(tid_buf_addr);
+ iov[2].iov_base = &tid_fd;
+ iov[2].iov_len = sizeof(tid_fd);
+ iov[3].iov_base = &uptime;
+ iov[3].iov_len = sizeof(uptime);
+ iov[4].iov_base = &oom_size;
+ iov[4].iov_len = sizeof(oom_size);
+ iov[5].iov_base = serialized_crash_keys;
+ iov[5].iov_len = crash_keys_size;
+#if !defined(ADDRESS_SANITIZER)
+ COMPILE_ASSERT(5 == kCrashIovSize - 1, Incorrect_Number_Of_Iovec_Members);
+#else
+ iov[6].iov_base = asan_report.get();
+ iov[6].iov_len = kMaxAsanReportSize + 1;
+ COMPILE_ASSERT(6 == kCrashIovSize - 1, Incorrect_Number_Of_Iovec_Members);
#endif
msg.msg_iov = iov;
msg.msg_iovlen = kCrashIovSize;
@@ -225,16 +222,16 @@
if (hdr->cmsg_level != SOL_SOCKET)
continue;
if (hdr->cmsg_type == SCM_RIGHTS) {
- const unsigned len = hdr->cmsg_len -
+ const size_t len = hdr->cmsg_len -
(((uint8_t*)CMSG_DATA(hdr)) - (uint8_t*)hdr);
- DCHECK_EQ(len % sizeof(int), 0u);
- const unsigned num_fds = len / sizeof(int);
- if (num_fds != 1) {
+ DCHECK_EQ(0U, len % sizeof(int));
+ const size_t num_fds = len / sizeof(int);
+ if (num_fds != kNumFDs) {
// A nasty process could try and send us too many descriptors and
// force a leak.
LOG(ERROR) << "Death signal contained wrong number of descriptors;"
<< " num_fds:" << num_fds;
- for (unsigned i = 0; i < num_fds; ++i)
+ for (size_t i = 0; i < num_fds; ++i)
close(reinterpret_cast<int*>(CMSG_DATA(hdr))[i]);
return;
} else {
@@ -290,21 +287,37 @@
}
ExceptionHandler::CrashContext* bad_context =
- reinterpret_cast<ExceptionHandler::CrashContext*>(crash_context);
+ reinterpret_cast<ExceptionHandler::CrashContext*>(crash_context.get());
bad_context->tid = crashing_tid;
- // Freed in CrashDumpTask();
- BreakpadInfo* info = new BreakpadInfo;
+ scoped_ptr<BreakpadInfo> info(new BreakpadInfo);
info->fd = -1;
info->process_type_length = process_type_.length();
+ // Freed in CrashDumpTask().
char* process_type_str = new char[info->process_type_length + 1];
process_type_.copy(process_type_str, info->process_type_length);
process_type_str[info->process_type_length] = '\0';
info->process_type = process_type_str;
- info->distro_length = strlen(distro);
- info->distro = distro;
+ std::string distro = base::GetLinuxDistro();
jochen (gone - plz use gerrit) 2014/05/22 10:52:28 this method crashes in thread restrictions :-/
+ info->distro_length = distro.length();
+ // Freed in CrashDumpTask().
+ char* distro_str = new char[info->distro_length + 1];
+ distro.copy(distro_str, info->distro_length);
+ distro_str[info->distro_length] = '\0';
+ info->distro = distro_str;
+
+ // Memory released from scoped_ptrs below are also freed in CrashDumpTask().
+ info->crash_keys = crash_keys.release();
+#if defined(ADDRESS_SANITIZER)
+ asan_report[kMaxAsanReportSize] = '\0';
+ info->asan_report_str = asan_report.release();
+ info->asan_report_length = strlen(info->asan_report_str);
+#endif
+
+ info->process_start_time = uptime;
+ info->oom_size = oom_size;
#if defined(OS_ANDROID)
// Nothing gets uploaded in android.
info->upload = false;
@@ -312,29 +325,21 @@
info->upload = upload_;
#endif
- info->crash_keys = crash_keys;
-#if defined(ADDRESS_SANITIZER)
- info->asan_report_str = asan_report_str_;
- info->asan_report_length = strlen(asan_report_str_);
-#endif
- info->process_start_time = uptime;
- info->oom_size = oom_size;
-
BrowserThread::GetBlockingPool()->PostSequencedWorkerTask(
worker_pool_token_,
FROM_HERE,
base::Bind(&CrashHandlerHostLinux::WriteDumpFile,
base::Unretained(this),
- info,
+ base::Passed(&info),
+ base::Passed(&crash_context),
crashing_pid,
- crash_context,
signal_fd));
}
-void CrashHandlerHostLinux::WriteDumpFile(BreakpadInfo* info,
+void CrashHandlerHostLinux::WriteDumpFile(scoped_ptr<BreakpadInfo> info,
+ scoped_ptr<char[]> crash_context,
pid_t crashing_pid,
- char* crash_context,
int signal_fd) {
DCHECK(BrowserThread::GetBlockingPool()->IsRunningSequenceOnCurrentThread(
worker_pool_token_));
@@ -343,16 +348,16 @@
PathService::Get(base::DIR_TEMP, &dumps_path);
if (!info->upload)
dumps_path = dumps_path_;
- const uint64 rand = base::RandUint64();
const std::string minidump_filename =
base::StringPrintf("%s/chromium-%s-minidump-%016" PRIx64 ".dmp",
dumps_path.value().c_str(),
process_type_.c_str(),
- rand);
+ base::RandUint64());
if (!google_breakpad::WriteMinidump(minidump_filename.c_str(),
kMaxMinidumpFileSize,
- crashing_pid, crash_context,
+ crashing_pid,
+ crash_context.get(),
kCrashContextSize,
google_breakpad::MappingList(),
google_breakpad::AppMemoryList())) {
@@ -360,25 +365,18 @@
}
#if defined(ADDRESS_SANITIZER)
// Create a temporary file holding the AddressSanitizer report.
- const std::string log_filename =
- base::StringPrintf("%s/chromium-%s-minidump-%016" PRIx64 ".log",
- dumps_path.value().c_str(),
- process_type_.c_str(),
- rand);
- FILE* logfile = fopen(log_filename.c_str(), "w");
- CHECK(logfile);
- fprintf(logfile, "%s", asan_report_str_);
- fclose(logfile);
+ const base::FilePath log_path =
+ base::FilePath(minidump_filename).ReplaceExtension("log");
+ base::WriteFile(log_path, info->asan_report_str, info->asan_report_length);
#endif
- delete[] crash_context;
-
- // Freed in CrashDumpTask();
+ // Freed in CrashDumpTask().
char* minidump_filename_str = new char[minidump_filename.length() + 1];
minidump_filename.copy(minidump_filename_str, minidump_filename.length());
minidump_filename_str[minidump_filename.length()] = '\0';
info->filename = minidump_filename_str;
#if defined(ADDRESS_SANITIZER)
+ // Freed in CrashDumpTask().
char* minidump_log_filename_str = new char[minidump_filename.length() + 1];
minidump_filename.copy(minidump_log_filename_str, minidump_filename.length());
memcpy(minidump_log_filename_str + minidump_filename.length() - 3, "log", 3);
@@ -391,11 +389,11 @@
BrowserThread::IO, FROM_HERE,
base::Bind(&CrashHandlerHostLinux::QueueCrashDumpTask,
base::Unretained(this),
- info,
+ base::Passed(&info),
signal_fd));
}
-void CrashHandlerHostLinux::QueueCrashDumpTask(BreakpadInfo* info,
+void CrashHandlerHostLinux::QueueCrashDumpTask(scoped_ptr<BreakpadInfo> info,
int signal_fd) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
@@ -407,12 +405,12 @@
msg.msg_iov = &done_iov;
msg.msg_iovlen = 1;
- (void) HANDLE_EINTR(sendmsg(signal_fd, &msg, MSG_DONTWAIT | MSG_NOSIGNAL));
+ HANDLE_EINTR(sendmsg(signal_fd, &msg, MSG_DONTWAIT | MSG_NOSIGNAL));
close(signal_fd);
uploader_thread_->message_loop()->PostTask(
FROM_HERE,
- base::Bind(&CrashDumpTask, base::Unretained(this), info));
+ base::Bind(&CrashDumpTask, base::Unretained(this), base::Passed(&info)));
}
void CrashHandlerHostLinux::WillDestroyCurrentMessageLoop() {
« no previous file with comments | « components/breakpad/browser/crash_handler_host_linux.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698