OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/renderer/render_frame_impl.h" | 5 #include "content/renderer/render_frame_impl.h" |
6 | 6 |
7 #include <map> | 7 #include <map> |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/auto_reset.h" | 10 #include "base/auto_reset.h" |
11 #include "base/command_line.h" | 11 #include "base/command_line.h" |
12 #include "base/debug/alias.h" | 12 #include "base/debug/alias.h" |
| 13 #include "base/debug/asan_invalid_access.h" |
13 #include "base/debug/dump_without_crashing.h" | 14 #include "base/debug/dump_without_crashing.h" |
14 #include "base/i18n/char_iterator.h" | 15 #include "base/i18n/char_iterator.h" |
15 #include "base/metrics/histogram.h" | 16 #include "base/metrics/histogram.h" |
16 #include "base/process/kill.h" | 17 #include "base/process/kill.h" |
17 #include "base/process/process.h" | 18 #include "base/process/process.h" |
18 #include "base/strings/string16.h" | 19 #include "base/strings/string16.h" |
19 #include "base/strings/utf_string_conversions.h" | 20 #include "base/strings/utf_string_conversions.h" |
20 #include "base/time/time.h" | 21 #include "base/time/time.h" |
21 #include "content/child/appcache/appcache_dispatcher.h" | 22 #include "content/child/appcache/appcache_dispatcher.h" |
22 #include "content/child/plugin_messages.h" | 23 #include "content/child/plugin_messages.h" |
(...skipping 211 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
234 return ds->originalRequest().url(); | 235 return ds->originalRequest().url(); |
235 } | 236 } |
236 | 237 |
237 NOINLINE static void CrashIntentionally() { | 238 NOINLINE static void CrashIntentionally() { |
238 // NOTE(shess): Crash directly rather than using NOTREACHED() so | 239 // NOTE(shess): Crash directly rather than using NOTREACHED() so |
239 // that the signature is easier to triage in crash reports. | 240 // that the signature is easier to triage in crash reports. |
240 volatile int* zero = NULL; | 241 volatile int* zero = NULL; |
241 *zero = 0; | 242 *zero = 0; |
242 } | 243 } |
243 | 244 |
244 #if defined(SYZYASAN) | |
245 NOINLINE static void CorruptMemoryBlock() { | |
246 // NOTE(sebmarchand): We intentionally corrupt a memory block here in order to | |
247 // trigger an Address Sanitizer (ASAN) error report. | |
248 static const int kArraySize = 5; | |
249 int* array = new int[kArraySize]; | |
250 // Encapsulate the invalid memory access into a try-catch statement to prevent | |
251 // this function from being instrumented. This way the underflow won't be | |
252 // detected but the corruption will (as the allocator will still be hooked). | |
253 __try { | |
254 int dummy = array[-1]--; | |
255 // Make sure the assignments to the dummy value aren't optimized away. | |
256 base::debug::Alias(&array); | |
257 } __except (EXCEPTION_EXECUTE_HANDLER) { | |
258 } | |
259 delete[] array; | |
260 } | |
261 #endif | |
262 | |
263 #if defined(ADDRESS_SANITIZER) || defined(SYZYASAN) | 245 #if defined(ADDRESS_SANITIZER) || defined(SYZYASAN) |
264 NOINLINE static void MaybeTriggerAsanError(const GURL& url) { | 246 NOINLINE static void MaybeTriggerAsanError(const GURL& url) { |
265 // NOTE(rogerm): We intentionally perform an invalid heap access here in | 247 // NOTE(rogerm): We intentionally perform an invalid heap access here in |
266 // order to trigger an Address Sanitizer (ASAN) error report. | 248 // order to trigger an Address Sanitizer (ASAN) error report. |
267 static const char kCrashDomain[] = "crash"; | 249 const char kCrashDomain[] = "crash"; |
268 static const char kHeapOverflow[] = "/heap-overflow"; | 250 const char kHeapOverflow[] = "/heap-overflow"; |
269 static const char kHeapUnderflow[] = "/heap-underflow"; | 251 const char kHeapUnderflow[] = "/heap-underflow"; |
270 static const char kUseAfterFree[] = "/use-after-free"; | 252 const char kUseAfterFree[] = "/use-after-free"; |
271 #if defined(SYZYASAN) | 253 #if defined(SYZYASAN) |
272 static const char kCorruptHeapBlock[] = "/corrupt-heap-block"; | 254 const char kCorruptHeapBlock[] = "/corrupt-heap-block"; |
| 255 const char kCorruptHeap[] = "/corrupt-heap"; |
273 #endif | 256 #endif |
274 static const int kArraySize = 5; | 257 const int kArraySize = 5; |
275 | 258 |
276 if (!url.DomainIs(kCrashDomain, sizeof(kCrashDomain) - 1)) | 259 if (!url.DomainIs(kCrashDomain, sizeof(kCrashDomain) - 1)) |
277 return; | 260 return; |
278 | 261 |
279 if (!url.has_path()) | 262 if (!url.has_path()) |
280 return; | 263 return; |
281 | 264 |
282 scoped_ptr<int[]> array(new int[kArraySize]); | |
283 std::string crash_type(url.path()); | 265 std::string crash_type(url.path()); |
284 int dummy = 0; | |
285 if (crash_type == kHeapOverflow) { | 266 if (crash_type == kHeapOverflow) { |
286 dummy = array[kArraySize]; | 267 base::debug::AsanHeapOverflow(); |
287 } else if (crash_type == kHeapUnderflow ) { | 268 } else if (crash_type == kHeapUnderflow ) { |
288 dummy = array[-1]; | 269 base::debug::AsanHeapUnderflow(); |
289 } else if (crash_type == kUseAfterFree) { | 270 } else if (crash_type == kUseAfterFree) { |
290 int* dangling = array.get(); | 271 base::debug::AsanHeapUseAfterFree(); |
291 array.reset(); | |
292 dummy = dangling[kArraySize / 2]; | |
293 #if defined(SYZYASAN) | 272 #if defined(SYZYASAN) |
294 } else if (crash_type == kCorruptHeapBlock) { | 273 } else if (crash_type == kCorruptHeapBlock) { |
295 CorruptMemoryBlock(); | 274 base::debug::AsanCorruptHeapBlock(); |
| 275 } else if (crash_type == kCorruptHeap) { |
| 276 base::debug::AsanCorruptHeap(); |
296 #endif | 277 #endif |
297 } | 278 } |
298 | |
299 // Make sure the assignments to the dummy value aren't optimized away. | |
300 base::debug::Alias(&dummy); | |
301 } | 279 } |
302 #endif // ADDRESS_SANITIZER || SYZYASAN | 280 #endif // ADDRESS_SANITIZER || SYZYASAN |
303 | 281 |
304 static void MaybeHandleDebugURL(const GURL& url) { | 282 static void MaybeHandleDebugURL(const GURL& url) { |
305 if (!url.SchemeIs(kChromeUIScheme)) | 283 if (!url.SchemeIs(kChromeUIScheme)) |
306 return; | 284 return; |
307 if (url == GURL(kChromeUICrashURL)) { | 285 if (url == GURL(kChromeUICrashURL)) { |
308 CrashIntentionally(); | 286 CrashIntentionally(); |
309 } else if (url == GURL(kChromeUIKillURL)) { | 287 } else if (url == GURL(kChromeUIKillURL)) { |
310 base::KillProcess(base::GetCurrentProcessHandle(), 1, false); | 288 base::KillProcess(base::GetCurrentProcessHandle(), 1, false); |
(...skipping 3270 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3581 | 3559 |
3582 #if defined(ENABLE_BROWSER_CDMS) | 3560 #if defined(ENABLE_BROWSER_CDMS) |
3583 RendererCdmManager* RenderFrameImpl::GetCdmManager() { | 3561 RendererCdmManager* RenderFrameImpl::GetCdmManager() { |
3584 if (!cdm_manager_) | 3562 if (!cdm_manager_) |
3585 cdm_manager_ = new RendererCdmManager(this); | 3563 cdm_manager_ = new RendererCdmManager(this); |
3586 return cdm_manager_; | 3564 return cdm_manager_; |
3587 } | 3565 } |
3588 #endif // defined(ENABLE_BROWSER_CDMS) | 3566 #endif // defined(ENABLE_BROWSER_CDMS) |
3589 | 3567 |
3590 } // namespace content | 3568 } // namespace content |
OLD | NEW |