// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/app/breakpad_win.h" #include #include #include #include #include #include #include "base/base_switches.h" #include "base/command_line.h" #include "base/environment.h" #include "base/file_util.h" #include "base/file_version_info.h" #include "base/memory/scoped_ptr.h" #include "base/string_split.h" #include "base/string_util.h" #include "base/string16.h" #include "base/stringprintf.h" #include "base/utf_string_conversions.h" #include "base/win/registry.h" #include "base/win/win_util.h" #include "breakpad/src/client/windows/handler/exception_handler.h" #include "chrome/app/breakpad_field_trial_win.h" #include "chrome/app/crash_analysis_win.h" #include "chrome/app/hard_error_handler_win.h" #include "chrome/common/child_process_logging.h" #include "chrome/common/chrome_result_codes.h" #include "chrome/common/chrome_switches.h" #include "chrome/common/env_vars.h" #include "chrome/installer/util/google_chrome_sxs_distribution.h" #include "chrome/installer/util/google_update_settings.h" #include "chrome/installer/util/install_util.h" #include "policy/policy_constants.h" // userenv.dll is required for GetProfileType(). #pragma comment(lib, "userenv.lib") namespace breakpad_win { // TODO(raymes): Modify the way custom crash info is stored. g_custom_entries // is way too too fragile. See // https://code.google.com/p/chromium/issues/detail?id=137062. std::vector* g_custom_entries = NULL; size_t g_num_of_experiments_offset = 0; size_t g_experiment_chunks_offset = 0; bool g_deferred_crash_uploads = false; } // namespace breakpad_win using breakpad_win::g_custom_entries; using breakpad_win::g_experiment_chunks_offset; using breakpad_win::g_num_of_experiments_offset; using breakpad_win::g_deferred_crash_uploads; namespace { // Minidump with stacks, PEB, TEB, and unloaded module list. const MINIDUMP_TYPE kSmallDumpType = static_cast( MiniDumpWithProcessThreadData | // Get PEB and TEB. MiniDumpWithUnloadedModules); // Get unloaded modules when available. // Minidump with all of the above, plus memory referenced from stack. const MINIDUMP_TYPE kLargerDumpType = static_cast( MiniDumpWithProcessThreadData | // Get PEB and TEB. MiniDumpWithUnloadedModules | // Get unloaded modules when available. MiniDumpWithIndirectlyReferencedMemory); // Get memory referenced by stack. // Large dump with all process memory. const MINIDUMP_TYPE kFullDumpType = static_cast( MiniDumpWithFullMemory | // Full memory from process. MiniDumpWithProcessThreadData | // Get PEB and TEB. MiniDumpWithHandleData | // Get all handle information. MiniDumpWithUnloadedModules); // Get unloaded modules when available. const char kPipeNameVar[] = "CHROME_BREAKPAD_PIPE_NAME"; const wchar_t kGoogleUpdatePipeName[] = L"\\\\.\\pipe\\GoogleCrashServices\\"; const wchar_t kChromePipeName[] = L"\\\\.\\pipe\\ChromeCrashServices"; // This is the well known SID for the system principal. const wchar_t kSystemPrincipalSid[] =L"S-1-5-18"; // This is the minimum version of google update that is required for deferred // crash uploads to work. const char kMinUpdateVersion[] = "1.3.21.115"; google_breakpad::ExceptionHandler* g_breakpad = NULL; google_breakpad::ExceptionHandler* g_dumphandler_no_crash = NULL; CrashAnalysis* g_crash_analysis = NULL; static size_t g_url_chunks_offset = 0; static size_t g_num_of_extensions_offset = 0; static size_t g_extension_ids_offset = 0; static size_t g_client_id_offset = 0; static size_t g_gpu_info_offset = 0; static size_t g_printer_info_offset = 0; static size_t g_num_of_views_offset = 0; static size_t g_num_switches_offset = 0; static size_t g_switches_offset = 0; // Maximum length for plugin path to include in plugin crash reports. const size_t kMaxPluginPathLength = 256; // Dumps the current process memory. extern "C" void __declspec(dllexport) __cdecl DumpProcess() { if (g_breakpad) g_breakpad->WriteMinidump(); } // Used for dumping a process state when there is no crash. extern "C" void __declspec(dllexport) __cdecl DumpProcessWithoutCrash() { if (g_dumphandler_no_crash) { g_dumphandler_no_crash->WriteMinidump(); } } // We need to prevent ICF from folding DumpForHangDebuggingThread() and // DumpProcessWithoutCrashThread() together, since that makes them // indistinguishable in crash dumps. We do this by making the function // bodies unique, and prevent optimization from shuffling things around. MSVC_DISABLE_OPTIMIZE() MSVC_PUSH_DISABLE_WARNING(4748) DWORD WINAPI DumpProcessWithoutCrashThread(void*) { DumpProcessWithoutCrash(); return 0; } // The following two functions do exactly the same thing as the two above. But // we want the signatures to be different so that we can easily track them in // crash reports. // TODO(yzshen): Remove when enough information is collected and the hang rate // of pepper/renderer processes is reduced. DWORD WINAPI DumpForHangDebuggingThread(void*) { DumpProcessWithoutCrash(); LOG(INFO) << "dumped for hang debugging"; return 0; } MSVC_POP_WARNING() MSVC_ENABLE_OPTIMIZE() // Injects a thread into a remote process to dump state when there is no crash. extern "C" HANDLE __declspec(dllexport) __cdecl InjectDumpProcessWithoutCrash(HANDLE process) { return CreateRemoteThread(process, NULL, 0, DumpProcessWithoutCrashThread, 0, 0, NULL); } extern "C" HANDLE __declspec(dllexport) __cdecl InjectDumpForHangDebugging(HANDLE process) { return CreateRemoteThread(process, NULL, 0, DumpForHangDebuggingThread, 0, 0, NULL); } extern "C" void DumpProcessAbnormalSignature() { if (!g_breakpad) return; g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"unusual-crash-signature", L"")); g_breakpad->WriteMinidump(); } // Reduces the size of the string |str| to a max of 64 chars. Required because // breakpad's CustomInfoEntry raises an invalid_parameter error if the string // we want to set is longer. std::wstring TrimToBreakpadMax(const std::wstring& str) { std::wstring shorter(str); return shorter.substr(0, google_breakpad::CustomInfoEntry::kValueMaxLength - 1); } static void SetIntegerValue(size_t offset, int value) { if (!g_custom_entries) return; base::wcslcpy((*g_custom_entries)[offset].value, base::StringPrintf(L"%d", value).c_str(), google_breakpad::CustomInfoEntry::kValueMaxLength); } bool IsBoringCommandLineSwitch(const std::wstring& flag) { return StartsWith(flag, L"--channel=", true) || // No point to including this since we already have a ptype field. StartsWith(flag, L"--type=", true) || // Not particularly interesting StartsWith(flag, L"--flash-broker=", true) || // Just about everything has this, don't bother. StartsWith(flag, L"/prefetch:", true) || // We handle the plugin path separately since it is usually too big // to fit in the switches (limited to 63 characters). StartsWith(flag, L"--plugin-path=", true) || // This is too big so we end up truncating it anyway. StartsWith(flag, L"--force-fieldtest=", true) || // These surround the flags that were added by about:flags, it lets // you distinguish which flags were added manually via the command // line versus those added through about:flags. For the most part // we don't care how an option was enabled, so we strip these. // (If you need to know can always look at the PEB). flag == L"--flag-switches-begin" || flag == L"--flag-switches-end"; } // Note that this is suffixed with "2" due to a parameter change that was made // to the predecessor "SetCommandLine()". If the signature changes again, use // a new name. extern "C" void __declspec(dllexport) __cdecl SetCommandLine2( const wchar_t** argv, size_t argc) { if (!g_custom_entries) return; // Copy up to the kMaxSwitches arguments into the custom entries array. Skip // past the first argument, as it is just the executable path. size_t argv_i = 1; size_t num_added = 0; for (; argv_i < argc && num_added < kMaxSwitches; ++argv_i) { // Don't bother including boring command line switches in crash reports. if (IsBoringCommandLineSwitch(argv[argv_i])) continue; base::wcslcpy((*g_custom_entries)[g_switches_offset + num_added].value, argv[argv_i], google_breakpad::CustomInfoEntry::kValueMaxLength); num_added++; } // Make note of the total number of switches. This is useful in case we have // truncated at kMaxSwitches, to see how many were unaccounted for. SetIntegerValue(g_num_switches_offset, static_cast(argc) - 1); } // Appends the plugin path to |g_custom_entries|. void SetPluginPath(const std::wstring& path) { DCHECK(g_custom_entries); if (path.size() > kMaxPluginPathLength) { // If the path is too long, truncate from the start rather than the end, // since we want to be able to recover the DLL name. SetPluginPath(path.substr(path.size() - kMaxPluginPathLength)); return; } // The chunk size without terminator. const size_t kChunkSize = static_cast( google_breakpad::CustomInfoEntry::kValueMaxLength - 1); int chunk_index = 0; size_t chunk_start = 0; // Current position inside |path| for (chunk_start = 0; chunk_start < path.size(); chunk_index++) { size_t chunk_length = std::min(kChunkSize, path.size() - chunk_start); g_custom_entries->push_back(google_breakpad::CustomInfoEntry( base::StringPrintf(L"plugin-path-chunk-%i", chunk_index + 1).c_str(), path.substr(chunk_start, chunk_length).c_str())); chunk_start += chunk_length; } } // Returns a string containing a list of all modifiers for the loaded profile. std::wstring GetProfileType() { std::wstring profile_type; DWORD profile_bits = 0; if (::GetProfileType(&profile_bits)) { static const struct { DWORD bit; const wchar_t* name; } kBitNames[] = { { PT_MANDATORY, L"mandatory" }, { PT_ROAMING, L"roaming" }, { PT_TEMPORARY, L"temporary" }, }; for (size_t i = 0; i < arraysize(kBitNames); ++i) { const DWORD this_bit = kBitNames[i].bit; if ((profile_bits & this_bit) != 0) { profile_type.append(kBitNames[i].name); profile_bits &= ~this_bit; if (profile_bits != 0) profile_type.append(L", "); } } } else { DWORD last_error = ::GetLastError(); base::SStringPrintf(&profile_type, L"error %u", last_error); } return profile_type; } // Returns the custom info structure based on the dll in parameter and the // process type. google_breakpad::CustomClientInfo* GetCustomInfo(const std::wstring& exe_path, const std::wstring& type, const std::wstring& channel) { scoped_ptr version_info(FileVersionInfo::CreateFileVersionInfo(FilePath(exe_path))); std::wstring version, product; std::wstring special_build; if (version_info.get()) { // Get the information from the file. version = version_info->product_version(); if (!version_info->is_official_build()) version.append(L"-devel"); const CommandLine& command = *CommandLine::ForCurrentProcess(); if (command.HasSwitch(switches::kChromeFrame)) { product = L"ChromeFrame"; } else { product = version_info->product_short_name(); } special_build = version_info->special_build(); } else { // No version info found. Make up the values. product = L"Chrome"; version = L"0.0.0.0-devel"; } // We only expect this method to be called once per process. DCHECK(!g_custom_entries); g_custom_entries = new std::vector; // Common g_custom_entries. g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"ver", version.c_str())); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"prod", product.c_str())); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"plat", L"Win32")); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"ptype", type.c_str())); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"channel", channel.c_str())); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"profile-type", GetProfileType().c_str())); if (g_deferred_crash_uploads) g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"deferred-upload", L"true")); if (!special_build.empty()) g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"special", special_build.c_str())); g_num_of_extensions_offset = g_custom_entries->size(); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"num-extensions", L"N/A")); g_extension_ids_offset = g_custom_entries->size(); // one-based index for the name suffix. for (int i = 1; i <= kMaxReportedActiveExtensions; ++i) { g_custom_entries->push_back(google_breakpad::CustomInfoEntry( base::StringPrintf(L"extension-%i", i).c_str(), L"")); } // Add empty values for the gpu_info. We'll put the actual values when we // collect them at this location. g_gpu_info_offset = g_custom_entries->size(); static const wchar_t* const kGpuEntries[] = { L"gpu-venid", L"gpu-devid", L"gpu-driver", L"gpu-psver", L"gpu-vsver", }; for (size_t i = 0; i < arraysize(kGpuEntries); ++i) { g_custom_entries->push_back( google_breakpad::CustomInfoEntry(kGpuEntries[i], L"")); } // Add empty values for the prn_info-*. We'll put the actual values when we // collect them at this location. g_printer_info_offset = g_custom_entries->size(); // one-based index for the name suffix. for (size_t i = 1; i <= kMaxReportedPrinterRecords; ++i) { g_custom_entries->push_back( google_breakpad::CustomInfoEntry( base::StringPrintf(L"prn-info-%d", i).c_str(), L"")); } // Read the id from registry. If reporting has never been enabled // the result will be empty string. Its OK since when user enables reporting // we will insert the new value at this location. std::wstring guid; GoogleUpdateSettings::GetMetricsId(&guid); g_client_id_offset = g_custom_entries->size(); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"guid", guid.c_str())); // Add empty values for the command line switches. We will fill them with // actual values as part of SetCommandLine2(). g_num_switches_offset = g_custom_entries->size(); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"num-switches", L"")); g_switches_offset = g_custom_entries->size(); // one-based index for the name suffix. for (int i = 1; i <= kMaxSwitches; ++i) { g_custom_entries->push_back(google_breakpad::CustomInfoEntry( base::StringPrintf(L"switch-%i", i).c_str(), L"")); } // Fill in the command line arguments using CommandLine::ForCurrentProcess(). // The browser process may call SetCommandLine2() again later on with a // command line that has been augmented with the about:flags experiments. std::vector switches; StringVectorToCStringVector( CommandLine::ForCurrentProcess()->argv(), &switches); SetCommandLine2(&switches[0], switches.size()); if (type == L"renderer" || type == L"plugin" || type == L"ppapi" || type == L"gpu-process") { g_num_of_views_offset = g_custom_entries->size(); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"num-views", L"")); // Create entries for the URL. Currently we only allow each chunk to be 64 // characters, which isn't enough for a URL. As a hack we create 8 entries // and split the URL across the g_custom_entries. g_url_chunks_offset = g_custom_entries->size(); // one-based index for the name suffix. for (int i = 1; i <= kMaxUrlChunks; ++i) { g_custom_entries->push_back(google_breakpad::CustomInfoEntry( base::StringPrintf(L"url-chunk-%i", i).c_str(), L"")); } if (type == L"plugin" || type == L"ppapi") { std::wstring plugin_path = CommandLine::ForCurrentProcess()->GetSwitchValueNative("plugin-path"); if (!plugin_path.empty()) SetPluginPath(plugin_path); } } else { g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"num-views", L"N/A")); } g_num_of_experiments_offset = g_custom_entries->size(); g_custom_entries->push_back( google_breakpad::CustomInfoEntry(L"num-experiments", L"N/A")); g_experiment_chunks_offset = g_custom_entries->size(); // We depend on this in UpdateExperiments... DCHECK_NE(0UL, g_experiment_chunks_offset); // And the test code depends on this. DCHECK_EQ(g_num_of_experiments_offset + 1, g_experiment_chunks_offset); // one-based index for the name suffix. for (int i = 1; i <= kMaxReportedVariationChunks; ++i) { g_custom_entries->push_back(google_breakpad::CustomInfoEntry( base::StringPrintf(L"experiment-chunk-%i", i).c_str(), L"")); } static google_breakpad::CustomClientInfo custom_client_info; custom_client_info.entries = &g_custom_entries->front(); custom_client_info.count = g_custom_entries->size(); return &custom_client_info; } // This callback is used when we want to get a dump without crashing the // process. bool DumpDoneCallbackWhenNoCrash(const wchar_t*, const wchar_t*, void*, EXCEPTION_POINTERS* ex_info, MDRawAssertionInfo*, bool) { return true; } // This callback is executed when the browser process has crashed, after // the crash dump has been created. We need to minimize the amount of work // done here since we have potentially corrupted process. Our job is to // spawn another instance of chrome which will show a 'chrome has crashed' // dialog. This code needs to live in the exe and thus has no access to // facilities such as the i18n helpers. bool DumpDoneCallback(const wchar_t*, const wchar_t*, void*, EXCEPTION_POINTERS* ex_info, MDRawAssertionInfo*, bool) { // If the exception is because there was a problem loading a delay-loaded // module, then show the user a dialog explaining the problem and then exit. if (DelayLoadFailureExceptionMessageBox(ex_info)) return true; // We set CHROME_CRASHED env var. If the CHROME_RESTART is present. // This signals the child process to show the 'chrome has crashed' dialog. scoped_ptr env(base::Environment::Create()); if (!env->HasVar(env_vars::kRestartInfo)) { return true; } env->SetVar(env_vars::kShowRestart, "1"); // Now we just start chrome browser with the same command line. STARTUPINFOW si = {sizeof(si)}; PROCESS_INFORMATION pi; if (::CreateProcessW(NULL, ::GetCommandLineW(), NULL, NULL, FALSE, CREATE_UNICODE_ENVIRONMENT, NULL, NULL, &si, &pi)) { ::CloseHandle(pi.hProcess); ::CloseHandle(pi.hThread); } // After this return we will be terminated. The actual return value is // not used at all. return true; } // flag to indicate that we are already handling an exception. volatile LONG handling_exception = 0; // This callback is used when there is no crash. Note: Unlike the // |FilterCallback| below this does not do dupe detection. It is upto the caller // to implement it. bool FilterCallbackWhenNoCrash( void*, EXCEPTION_POINTERS*, MDRawAssertionInfo*) { return true; } // This callback is executed when the Chrome process has crashed and *before* // the crash dump is created. To prevent duplicate crash reports we // make every thread calling this method, except the very first one, // go to sleep. bool FilterCallback(void*, EXCEPTION_POINTERS*, MDRawAssertionInfo*) { // Capture every thread except the first one in the sleep. We don't // want multiple threads to concurrently report exceptions. if (::InterlockedCompareExchange(&handling_exception, 1, 0) == 1) { ::Sleep(INFINITE); } return true; } // Previous unhandled filter. Will be called if not null when we // intercept a crash. LPTOP_LEVEL_EXCEPTION_FILTER previous_filter = NULL; // Exception filter used when breakpad is not enabled. We just display // the "Do you want to restart" message and then we call the previous filter. long WINAPI ChromeExceptionFilter(EXCEPTION_POINTERS* info) { DumpDoneCallback(NULL, NULL, NULL, info, NULL, false); if (previous_filter) return previous_filter(info); return EXCEPTION_EXECUTE_HANDLER; } // Exception filter for the service process used when breakpad is not enabled. // We just display the "Do you want to restart" message and then die // (without calling the previous filter). long WINAPI ServiceExceptionFilter(EXCEPTION_POINTERS* info) { DumpDoneCallback(NULL, NULL, NULL, info, NULL, false); return EXCEPTION_EXECUTE_HANDLER; } extern "C" void __declspec(dllexport) __cdecl SetActiveURL( const wchar_t* url_cstring) { DCHECK(url_cstring); if (!g_custom_entries) return; std::wstring url(url_cstring); size_t chunk_index = 0; size_t url_size = url.size(); // Split the url across all the chunks. for (size_t url_offset = 0; chunk_index < kMaxUrlChunks && url_offset < url_size; ++chunk_index) { size_t current_chunk_size = std::min(url_size - url_offset, static_cast( google_breakpad::CustomInfoEntry::kValueMaxLength - 1)); wchar_t* entry_value = (*g_custom_entries)[g_url_chunks_offset + chunk_index].value; url._Copy_s(entry_value, google_breakpad::CustomInfoEntry::kValueMaxLength, current_chunk_size, url_offset); entry_value[current_chunk_size] = L'\0'; url_offset += current_chunk_size; } // And null terminate any unneeded chunks. for (; chunk_index < kMaxUrlChunks; ++chunk_index) (*g_custom_entries)[g_url_chunks_offset + chunk_index].value[0] = L'\0'; } extern "C" void __declspec(dllexport) __cdecl SetClientId( const wchar_t* client_id) { if (client_id == NULL) return; if (!g_custom_entries) return; base::wcslcpy((*g_custom_entries)[g_client_id_offset].value, client_id, google_breakpad::CustomInfoEntry::kValueMaxLength); } extern "C" void __declspec(dllexport) __cdecl SetNumberOfExtensions( int number_of_extensions) { SetIntegerValue(g_num_of_extensions_offset, number_of_extensions); } extern "C" void __declspec(dllexport) __cdecl SetExtensionID( int index, const wchar_t* id) { DCHECK(id); DCHECK(index < kMaxReportedActiveExtensions); if (!g_custom_entries) return; base::wcslcpy((*g_custom_entries)[g_extension_ids_offset + index].value, id, google_breakpad::CustomInfoEntry::kValueMaxLength); } extern "C" void __declspec(dllexport) __cdecl SetGpuInfo( const wchar_t* vendor_id, const wchar_t* device_id, const wchar_t* driver_version, const wchar_t* pixel_shader_version, const wchar_t* vertex_shader_version) { if (!g_custom_entries) return; const wchar_t* info[] = { vendor_id, device_id, driver_version, pixel_shader_version, vertex_shader_version }; for (size_t i = 0; i < arraysize(info); ++i) { base::wcslcpy((*g_custom_entries)[g_gpu_info_offset + i].value, info[i], google_breakpad::CustomInfoEntry::kValueMaxLength); } } extern "C" void __declspec(dllexport) __cdecl SetPrinterInfo( const wchar_t* printer_info) { if (!g_custom_entries) return; std::vector info; base::SplitString(printer_info, L';', &info); DCHECK_LE(info.size(), kMaxReportedPrinterRecords); info.resize(kMaxReportedPrinterRecords); for (size_t i = 0; i < info.size(); ++i) { base::wcslcpy((*g_custom_entries)[g_printer_info_offset + i].value, info[i].c_str(), google_breakpad::CustomInfoEntry::kValueMaxLength); } } extern "C" void __declspec(dllexport) __cdecl SetNumberOfViews( int number_of_views) { SetIntegerValue(g_num_of_views_offset, number_of_views); } } // namespace namespace testing { // Access to namespace protected functions for testing purposes. void InitCustomInfoEntries() { GetCustomInfo(L"", L"", L""); } } // namespace testing bool WrapMessageBoxWithSEH(const wchar_t* text, const wchar_t* caption, UINT flags, bool* exit_now) { // We wrap the call to MessageBoxW with a SEH handler because it some // machines with CursorXP, PeaDict or with FontExplorer installed it crashes // uncontrollably here. Being this a best effort deal we better go away. __try { *exit_now = (IDOK != ::MessageBoxW(NULL, text, caption, flags)); } __except(EXCEPTION_EXECUTE_HANDLER) { // Its not safe to continue executing, exit silently here. ::TerminateProcess(::GetCurrentProcess(), chrome::RESULT_CODE_RESPAWN_FAILED); } return true; } // This function is executed by the child process that DumpDoneCallback() // spawned and basically just shows the 'chrome has crashed' dialog if // the CHROME_CRASHED environment variable is present. bool ShowRestartDialogIfCrashed(bool* exit_now) { if (!::GetEnvironmentVariableW(ASCIIToWide(env_vars::kShowRestart).c_str(), NULL, 0)) { return false; } // Only show this for the browser process. See crbug.com/132119. const CommandLine& command_line = *CommandLine::ForCurrentProcess(); std::string process_type = command_line.GetSwitchValueASCII(switches::kProcessType); if (!process_type.empty()) { return false; } DWORD len = ::GetEnvironmentVariableW( ASCIIToWide(env_vars::kRestartInfo).c_str(), NULL, 0); if (!len) return true; wchar_t* restart_data = new wchar_t[len + 1]; ::GetEnvironmentVariableW(ASCIIToWide(env_vars::kRestartInfo).c_str(), restart_data, len); restart_data[len] = 0; // The CHROME_RESTART var contains the dialog strings separated by '|'. // See ChromeBrowserMainPartsWin::PrepareRestartOnCrashEnviroment() // for details. std::vector dlg_strings; base::SplitString(restart_data, L'|', &dlg_strings); delete[] restart_data; if (dlg_strings.size() < 3) return true; // If the UI layout is right-to-left, we need to pass the appropriate MB_XXX // flags so that an RTL message box is displayed. UINT flags = MB_OKCANCEL | MB_ICONWARNING; if (dlg_strings[2] == ASCIIToWide(env_vars::kRtlLocale)) flags |= MB_RIGHT | MB_RTLREADING; return WrapMessageBoxWithSEH(dlg_strings[1].c_str(), dlg_strings[0].c_str(), flags, exit_now); } // Crashes the process after generating a dump for the provided exception. Note // that the crash reporter should be initialized before calling this function // for it to do anything. extern "C" int __declspec(dllexport) CrashForException( EXCEPTION_POINTERS* info) { if (g_breakpad) { g_breakpad->WriteMinidumpForException(info); if (g_crash_analysis) g_crash_analysis->Analyze(info); ::TerminateProcess(::GetCurrentProcess(), content::RESULT_CODE_KILLED); } return EXCEPTION_CONTINUE_SEARCH; } // Determine whether configuration management allows loading the crash reporter. // Since the configuration management infrastructure is not initialized at this // point, we read the corresponding registry key directly. The return status // indicates whether policy data was successfully read. If it is true, |result| // contains the value set by policy. static bool MetricsReportingControlledByPolicy(bool* result) { std::wstring key_name = UTF8ToWide(policy::key::kMetricsReportingEnabled); DWORD value = 0; base::win::RegKey hklm_policy_key(HKEY_LOCAL_MACHINE, policy::kRegistryMandatorySubKey, KEY_READ); if (hklm_policy_key.ReadValueDW(key_name.c_str(), &value) == ERROR_SUCCESS) { *result = value != 0; return true; } base::win::RegKey hkcu_policy_key(HKEY_CURRENT_USER, policy::kRegistryMandatorySubKey, KEY_READ); if (hkcu_policy_key.ReadValueDW(key_name.c_str(), &value) == ERROR_SUCCESS) { *result = value != 0; return true; } return false; } // Check whether the installed version of google update supports deferred // uploads of crash reports. static bool DeferredUploadsSupported(bool system_install) { Version update_version = GoogleUpdateSettings::GetGoogleUpdateVersion(system_install); if (!update_version.IsValid() || update_version.IsOlderThan(std::string(kMinUpdateVersion))) return false; return true; } static void InitPipeNameEnvVar(bool is_per_user_install) { scoped_ptr env(base::Environment::Create()); if (env->HasVar(kPipeNameVar)) { // The Breakpad pipe name is already configured: nothing to do. return; } // Check whether configuration management controls crash reporting. bool crash_reporting_enabled = true; bool controlled_by_policy = MetricsReportingControlledByPolicy(&crash_reporting_enabled); const CommandLine& command = *CommandLine::ForCurrentProcess(); bool use_crash_service = !controlled_by_policy && ((command.HasSwitch(switches::kNoErrorDialogs) || GetEnvironmentVariable( ASCIIToWide(env_vars::kHeadless).c_str(), NULL, 0))); std::wstring pipe_name; if (use_crash_service) { // Crash reporting is done by crash_service.exe. pipe_name = kChromePipeName; } else { // We want to use the Google Update crash reporting. We need to check if the // user allows it first (in case the administrator didn't already decide // via policy). if (!controlled_by_policy) crash_reporting_enabled = GoogleUpdateSettings::GetCollectStatsConsent(); if (!crash_reporting_enabled) { if (!controlled_by_policy && DeferredUploadsSupported(!is_per_user_install)) g_deferred_crash_uploads = true; else return; } // Build the pipe name. It can be either: // System-wide install: "NamedPipe\GoogleCrashServices\S-1-5-18" // Per-user install: "NamedPipe\GoogleCrashServices\" std::wstring user_sid; if (is_per_user_install) { if (!base::win::GetUserSidString(&user_sid)) { return; } } else { user_sid = kSystemPrincipalSid; } pipe_name = kGoogleUpdatePipeName; pipe_name += user_sid; } env->SetVar(kPipeNameVar, WideToASCII(pipe_name)); } void InitCrashReporter() { const CommandLine& command = *CommandLine::ForCurrentProcess(); if (command.HasSwitch(switches::kDisableBreakpad)) return; // Disable the message box for assertions. _CrtSetReportMode(_CRT_ASSERT, 0); std::wstring process_type = command.GetSwitchValueNative(switches::kProcessType); if (process_type.empty()) process_type = L"browser"; wchar_t exe_path[MAX_PATH]; exe_path[0] = 0; GetModuleFileNameW(NULL, exe_path, MAX_PATH); bool is_per_user_install = InstallUtil::IsPerUserInstall(exe_path); std::wstring channel_string; GoogleUpdateSettings::GetChromeChannelAndModifiers(!is_per_user_install, &channel_string); google_breakpad::CustomClientInfo* custom_info = GetCustomInfo(exe_path, process_type, channel_string); google_breakpad::ExceptionHandler::MinidumpCallback callback = NULL; LPTOP_LEVEL_EXCEPTION_FILTER default_filter = NULL; // We install the post-dump callback only for the browser and service // processes. It spawns a new browser/service process. if (process_type == L"browser") { callback = &DumpDoneCallback; default_filter = &ChromeExceptionFilter; } else if (process_type == L"service") { callback = &DumpDoneCallback; default_filter = &ServiceExceptionFilter; } if (process_type == L"browser") { InitPipeNameEnvVar(is_per_user_install); } scoped_ptr env(base::Environment::Create()); std::string pipe_name_ascii; if (!env->GetVar(kPipeNameVar, &pipe_name_ascii)) { // Breakpad is not enabled. Configuration is managed or the user // did not allow Google Update to send crashes. We need to use // our default crash handler instead, but only for the // browser/service processes. if (default_filter) InitDefaultCrashCallback(default_filter); return; } std::wstring pipe_name = ASCIIToWide(pipe_name_ascii); #ifdef _WIN64 // The protocol for connecting to the out-of-process Breakpad crash // reporter is different for x86-32 and x86-64: the message sizes // are different because the message struct contains a pointer. As // a result, there are two different named pipes to connect to. The // 64-bit one is distinguished with an "-x64" suffix. pipe_name += L"-x64"; #endif // Get the alternate dump directory. We use the temp path. wchar_t temp_dir[MAX_PATH] = {0}; ::GetTempPathW(MAX_PATH, temp_dir); MINIDUMP_TYPE dump_type = kSmallDumpType; // Capture full memory if explicitly instructed to. if (command.HasSwitch(switches::kFullMemoryCrashReport)) { dump_type = kFullDumpType; } else { std::wstring channel_name( GoogleUpdateSettings::GetChromeChannel(!is_per_user_install)); // Capture more detail in crash dumps for beta and dev channel builds. if (channel_name == L"dev" || channel_name == L"beta" || channel_name == GoogleChromeSxSDistribution::ChannelName()) dump_type = kLargerDumpType; } g_breakpad = new google_breakpad::ExceptionHandler(temp_dir, &FilterCallback, callback, NULL, google_breakpad::ExceptionHandler::HANDLER_ALL, dump_type, pipe_name.c_str(), custom_info); // Now initialize the non crash dump handler. g_dumphandler_no_crash = new google_breakpad::ExceptionHandler(temp_dir, &FilterCallbackWhenNoCrash, &DumpDoneCallbackWhenNoCrash, NULL, // Set the handler to none so this handler would not be added to // |handler_stack_| in |ExceptionHandler| which is a list of exception // handlers. google_breakpad::ExceptionHandler::HANDLER_NONE, dump_type, pipe_name.c_str(), custom_info); if (command.HasSwitch(switches::kPerformCrashAnalysis)) g_crash_analysis = new CrashAnalysis(); if (g_breakpad->IsOutOfProcess()) { // Tells breakpad to handle breakpoint and single step exceptions. // This might break JIT debuggers, but at least it will always // generate a crashdump for these exceptions. g_breakpad->set_handle_debug_exceptions(true); } } void InitDefaultCrashCallback(LPTOP_LEVEL_EXCEPTION_FILTER filter) { previous_filter = SetUnhandledExceptionFilter(filter); } void StringVectorToCStringVector(const std::vector& wstrings, std::vector* cstrings) { cstrings->clear(); cstrings->reserve(wstrings.size()); for (size_t i = 0; i < wstrings.size(); ++i) cstrings->push_back(wstrings[i].c_str()); }