// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "components/breakpad/app/breakpad_win.h" #include #include #include #include #include #include #include #include #include "base/base_switches.h" #include "base/basictypes.h" #include "base/command_line.h" #include "base/debug/crash_logging.h" #include "base/debug/dump_without_crashing.h" #include "base/environment.h" #include "base/memory/scoped_ptr.h" #include "base/strings/string16.h" #include "base/strings/string_split.h" #include "base/strings/string_util.h" #include "base/strings/stringprintf.h" #include "base/strings/utf_string_conversions.h" #include "base/synchronization/lock.h" #include "base/win/metro.h" #include "base/win/pe_image.h" #include "base/win/registry.h" #include "base/win/win_util.h" #include "breakpad/src/client/windows/handler/exception_handler.h" #include "components/breakpad/app/breakpad_client.h" #include "components/breakpad/app/crash_keys_win.h" #include "components/breakpad/app/hard_error_handler_win.h" #include "content/public/common/result_codes.h" #include "sandbox/win/src/nt_internals.h" #include "sandbox/win/src/sidestep/preamble_patcher.h" // userenv.dll is required for GetProfileType(). #pragma comment(lib, "userenv.lib") #pragma intrinsic(_AddressOfReturnAddress) #pragma intrinsic(_ReturnAddress) namespace breakpad { namespace { // Minidump with stacks, PEB, TEB, and unloaded module list. const MINIDUMP_TYPE kSmallDumpType = static_cast( MiniDumpWithProcessThreadData | // Get PEB and TEB. MiniDumpWithUnloadedModules); // Get unloaded modules when available. // Minidump with all of the above, plus memory referenced from stack. const MINIDUMP_TYPE kLargerDumpType = static_cast( MiniDumpWithProcessThreadData | // Get PEB and TEB. MiniDumpWithUnloadedModules | // Get unloaded modules when available. MiniDumpWithIndirectlyReferencedMemory); // Get memory referenced by stack. // Large dump with all process memory. const MINIDUMP_TYPE kFullDumpType = static_cast( MiniDumpWithFullMemory | // Full memory from process. MiniDumpWithProcessThreadData | // Get PEB and TEB. MiniDumpWithHandleData | // Get all handle information. MiniDumpWithUnloadedModules); // Get unloaded modules when available. const char kPipeNameVar[] = "CHROME_BREAKPAD_PIPE_NAME"; const wchar_t kGoogleUpdatePipeName[] = L"\\\\.\\pipe\\GoogleCrashServices\\"; const wchar_t kChromePipeName[] = L"\\\\.\\pipe\\ChromeCrashServices"; // This is the well known SID for the system principal. const wchar_t kSystemPrincipalSid[] =L"S-1-5-18"; google_breakpad::ExceptionHandler* g_breakpad = NULL; google_breakpad::ExceptionHandler* g_dumphandler_no_crash = NULL; EXCEPTION_POINTERS g_surrogate_exception_pointers = {0}; EXCEPTION_RECORD g_surrogate_exception_record = {0}; CONTEXT g_surrogate_context = {0}; typedef NTSTATUS (WINAPI* NtTerminateProcessPtr)(HANDLE ProcessHandle, NTSTATUS ExitStatus); char* g_real_terminate_process_stub = NULL; } // namespace // Dumps the current process memory. extern "C" void __declspec(dllexport) __cdecl DumpProcess() { if (g_breakpad) { g_breakpad->WriteMinidump(); } } // Used for dumping a process state when there is no crash. extern "C" void __declspec(dllexport) __cdecl DumpProcessWithoutCrash() { if (g_dumphandler_no_crash) { g_dumphandler_no_crash->WriteMinidump(); } } namespace { // We need to prevent ICF from folding DumpForHangDebuggingThread() and // DumpProcessWithoutCrashThread() together, since that makes them // indistinguishable in crash dumps. We do this by making the function // bodies unique, and prevent optimization from shuffling things around. MSVC_DISABLE_OPTIMIZE() MSVC_PUSH_DISABLE_WARNING(4748) DWORD WINAPI DumpProcessWithoutCrashThread(void*) { DumpProcessWithoutCrash(); return 0; } // The following two functions do exactly the same thing as the two above. But // we want the signatures to be different so that we can easily track them in // crash reports. // TODO(yzshen): Remove when enough information is collected and the hang rate // of pepper/renderer processes is reduced. DWORD WINAPI DumpForHangDebuggingThread(void*) { DumpProcessWithoutCrash(); VLOG(1) << "dumped for hang debugging"; return 0; } MSVC_POP_WARNING() MSVC_ENABLE_OPTIMIZE() } // namespace // Injects a thread into a remote process to dump state when there is no crash. extern "C" HANDLE __declspec(dllexport) __cdecl InjectDumpProcessWithoutCrash(HANDLE process) { return CreateRemoteThread(process, NULL, 0, DumpProcessWithoutCrashThread, 0, 0, NULL); } extern "C" HANDLE __declspec(dllexport) __cdecl InjectDumpForHangDebugging(HANDLE process) { return CreateRemoteThread(process, NULL, 0, DumpForHangDebuggingThread, 0, 0, NULL); } // Returns a string containing a list of all modifiers for the loaded profile. std::wstring GetProfileType() { std::wstring profile_type; DWORD profile_bits = 0; if (::GetProfileType(&profile_bits)) { static const struct { DWORD bit; const wchar_t* name; } kBitNames[] = { { PT_MANDATORY, L"mandatory" }, { PT_ROAMING, L"roaming" }, { PT_TEMPORARY, L"temporary" }, }; for (size_t i = 0; i < arraysize(kBitNames); ++i) { const DWORD this_bit = kBitNames[i].bit; if ((profile_bits & this_bit) != 0) { profile_type.append(kBitNames[i].name); profile_bits &= ~this_bit; if (profile_bits != 0) profile_type.append(L", "); } } } else { DWORD last_error = ::GetLastError(); base::SStringPrintf(&profile_type, L"error %u", last_error); } return profile_type; } namespace { // This callback is used when we want to get a dump without crashing the // process. bool DumpDoneCallbackWhenNoCrash(const wchar_t*, const wchar_t*, void*, EXCEPTION_POINTERS* ex_info, MDRawAssertionInfo*, bool) { return true; } // This callback is executed when the browser process has crashed, after // the crash dump has been created. We need to minimize the amount of work // done here since we have potentially corrupted process. Our job is to // spawn another instance of chrome which will show a 'chrome has crashed' // dialog. This code needs to live in the exe and thus has no access to // facilities such as the i18n helpers. bool DumpDoneCallback(const wchar_t*, const wchar_t*, void*, EXCEPTION_POINTERS* ex_info, MDRawAssertionInfo*, bool) { // Check if the exception is one of the kind which would not be solved // by simply restarting chrome. In this case we show a message box with // and exit silently. Remember that chrome is in a crashed state so we // can't show our own UI from this process. if (HardErrorHandler(ex_info)) return true; if (!GetBreakpadClient()->AboutToRestart()) return true; // Now we just start chrome browser with the same command line. STARTUPINFOW si = {sizeof(si)}; PROCESS_INFORMATION pi; if (::CreateProcessW(NULL, ::GetCommandLineW(), NULL, NULL, FALSE, CREATE_UNICODE_ENVIRONMENT, NULL, NULL, &si, &pi)) { ::CloseHandle(pi.hProcess); ::CloseHandle(pi.hThread); } // After this return we will be terminated. The actual return value is // not used at all. return true; } // flag to indicate that we are already handling an exception. volatile LONG handling_exception = 0; // This callback is used when there is no crash. Note: Unlike the // |FilterCallback| below this does not do dupe detection. It is upto the caller // to implement it. bool FilterCallbackWhenNoCrash( void*, EXCEPTION_POINTERS*, MDRawAssertionInfo*) { GetBreakpadClient()->RecordCrashDumpAttempt(false); return true; } // This callback is executed when the Chrome process has crashed and *before* // the crash dump is created. To prevent duplicate crash reports we // make every thread calling this method, except the very first one, // go to sleep. bool FilterCallback(void*, EXCEPTION_POINTERS*, MDRawAssertionInfo*) { // Capture every thread except the first one in the sleep. We don't // want multiple threads to concurrently report exceptions. if (::InterlockedCompareExchange(&handling_exception, 1, 0) == 1) { ::Sleep(INFINITE); } GetBreakpadClient()->RecordCrashDumpAttempt(true); return true; } // Previous unhandled filter. Will be called if not null when we // intercept a crash. LPTOP_LEVEL_EXCEPTION_FILTER previous_filter = NULL; // Exception filter used when breakpad is not enabled. We just display // the "Do you want to restart" message and then we call the previous filter. long WINAPI ChromeExceptionFilter(EXCEPTION_POINTERS* info) { DumpDoneCallback(NULL, NULL, NULL, info, NULL, false); if (previous_filter) return previous_filter(info); return EXCEPTION_EXECUTE_HANDLER; } // Exception filter for the service process used when breakpad is not enabled. // We just display the "Do you want to restart" message and then die // (without calling the previous filter). long WINAPI ServiceExceptionFilter(EXCEPTION_POINTERS* info) { DumpDoneCallback(NULL, NULL, NULL, info, NULL, false); return EXCEPTION_EXECUTE_HANDLER; } } // namespace // NOTE: This function is used by SyzyASAN to annotate crash reports. If you // change the name or signature of this function you will break SyzyASAN // instrumented releases of Chrome. Please contact syzygy-team@chromium.org // before doing so! extern "C" void __declspec(dllexport) __cdecl SetCrashKeyValueImpl( const wchar_t* key, const wchar_t* value) { CrashKeysWin* keeper = CrashKeysWin::keeper(); if (!keeper) return; // TODO(siggi): This doesn't look quite right - there's NULL deref potential // here, and an implicit std::wstring conversion. Fixme. keeper->SetCrashKeyValue(key, value); } extern "C" void __declspec(dllexport) __cdecl ClearCrashKeyValueImpl( const wchar_t* key) { CrashKeysWin* keeper = CrashKeysWin::keeper(); if (!keeper) return; // TODO(siggi): This doesn't look quite right - there's NULL deref potential // here, and an implicit std::wstring conversion. Fixme. keeper->ClearCrashKeyValue(key); } static bool WrapMessageBoxWithSEH(const wchar_t* text, const wchar_t* caption, UINT flags, bool* exit_now) { // We wrap the call to MessageBoxW with a SEH handler because it some // machines with CursorXP, PeaDict or with FontExplorer installed it crashes // uncontrollably here. Being this a best effort deal we better go away. __try { *exit_now = (IDOK != ::MessageBoxW(NULL, text, caption, flags)); } __except(EXCEPTION_EXECUTE_HANDLER) { // Its not safe to continue executing, exit silently here. ::TerminateProcess(::GetCurrentProcess(), GetBreakpadClient()->GetResultCodeRespawnFailed()); } return true; } // This function is executed by the child process that DumpDoneCallback() // spawned and basically just shows the 'chrome has crashed' dialog if // the CHROME_CRASHED environment variable is present. bool ShowRestartDialogIfCrashed(bool* exit_now) { // If we are being launched in metro mode don't try to show the dialog. if (base::win::IsMetroProcess()) return false; base::string16 message; base::string16 title; bool is_rtl_locale; if (!GetBreakpadClient()->ShouldShowRestartDialog( &title, &message, &is_rtl_locale)) { return false; } // If the UI layout is right-to-left, we need to pass the appropriate MB_XXX // flags so that an RTL message box is displayed. UINT flags = MB_OKCANCEL | MB_ICONWARNING; if (is_rtl_locale) flags |= MB_RIGHT | MB_RTLREADING; return WrapMessageBoxWithSEH(message.c_str(), title.c_str(), flags, exit_now); } // Crashes the process after generating a dump for the provided exception. Note // that the crash reporter should be initialized before calling this function // for it to do anything. // NOTE: This function is used by SyzyASAN to invoke a crash. If you change the // the name or signature of this function you will break SyzyASAN instrumented // releases of Chrome. Please contact syzygy-team@chromium.org before doing so! extern "C" int __declspec(dllexport) CrashForException( EXCEPTION_POINTERS* info) { if (g_breakpad) { g_breakpad->WriteMinidumpForException(info); // Patched stub exists based on conditions (See InitCrashReporter). // As a side note this function also gets called from // WindowProcExceptionFilter. if (g_real_terminate_process_stub == NULL) { ::TerminateProcess(::GetCurrentProcess(), content::RESULT_CODE_KILLED); } else { NtTerminateProcessPtr real_terminate_proc = reinterpret_cast( static_cast(g_real_terminate_process_stub)); real_terminate_proc(::GetCurrentProcess(), content::RESULT_CODE_KILLED); } } return EXCEPTION_CONTINUE_SEARCH; } static NTSTATUS WINAPI HookNtTerminateProcess(HANDLE ProcessHandle, NTSTATUS ExitStatus) { if (g_breakpad && (ProcessHandle == ::GetCurrentProcess() || ProcessHandle == NULL)) { NT_TIB* tib = reinterpret_cast(NtCurrentTeb()); void* address_on_stack = _AddressOfReturnAddress(); if (address_on_stack < tib->StackLimit || address_on_stack > tib->StackBase) { g_surrogate_exception_record.ExceptionAddress = _ReturnAddress(); g_surrogate_exception_record.ExceptionCode = DBG_TERMINATE_PROCESS; g_surrogate_exception_record.ExceptionFlags = EXCEPTION_NONCONTINUABLE; CrashForException(&g_surrogate_exception_pointers); } } NtTerminateProcessPtr real_proc = reinterpret_cast( static_cast(g_real_terminate_process_stub)); return real_proc(ProcessHandle, ExitStatus); } static void InitTerminateProcessHooks() { NtTerminateProcessPtr terminate_process_func_address = reinterpret_cast(::GetProcAddress( ::GetModuleHandle(L"ntdll.dll"), "NtTerminateProcess")); if (terminate_process_func_address == NULL) return; DWORD old_protect = 0; if (!::VirtualProtect(terminate_process_func_address, 5, PAGE_EXECUTE_READWRITE, &old_protect)) return; g_real_terminate_process_stub = reinterpret_cast(VirtualAllocEx( ::GetCurrentProcess(), NULL, sidestep::kMaxPreambleStubSize, MEM_COMMIT, PAGE_EXECUTE_READWRITE)); if (g_real_terminate_process_stub == NULL) return; g_surrogate_exception_pointers.ContextRecord = &g_surrogate_context; g_surrogate_exception_pointers.ExceptionRecord = &g_surrogate_exception_record; sidestep::SideStepError patch_result = sidestep::PreamblePatcher::Patch( terminate_process_func_address, HookNtTerminateProcess, g_real_terminate_process_stub, sidestep::kMaxPreambleStubSize); if (patch_result != sidestep::SIDESTEP_SUCCESS) { CHECK(::VirtualFreeEx(::GetCurrentProcess(), g_real_terminate_process_stub, 0, MEM_RELEASE)); CHECK(::VirtualProtect(terminate_process_func_address, 5, old_protect, &old_protect)); return; } DWORD dummy = 0; CHECK(::VirtualProtect(terminate_process_func_address, 5, old_protect, &dummy)); CHECK(::VirtualProtect(g_real_terminate_process_stub, sidestep::kMaxPreambleStubSize, old_protect, &old_protect)); } static void InitPipeNameEnvVar(bool is_per_user_install) { scoped_ptr env(base::Environment::Create()); if (env->HasVar(kPipeNameVar)) { // The Breakpad pipe name is already configured: nothing to do. return; } // Check whether configuration management controls crash reporting. bool crash_reporting_enabled = true; bool controlled_by_policy = GetBreakpadClient()->ReportingIsEnforcedByPolicy( &crash_reporting_enabled); const CommandLine& command = *CommandLine::ForCurrentProcess(); bool use_crash_service = !controlled_by_policy && (command.HasSwitch(switches::kNoErrorDialogs) || GetBreakpadClient()->IsRunningUnattended()); std::wstring pipe_name; if (use_crash_service) { // Crash reporting is done by crash_service.exe. pipe_name = kChromePipeName; } else { // We want to use the Google Update crash reporting. We need to check if the // user allows it first (in case the administrator didn't already decide // via policy). if (!controlled_by_policy) crash_reporting_enabled = GetBreakpadClient()->GetCollectStatsConsent(); if (!crash_reporting_enabled) { // Crash reporting is disabled, don't set the environment variable. return; } // Build the pipe name. It can be either: // System-wide install: "NamedPipe\GoogleCrashServices\S-1-5-18" // Per-user install: "NamedPipe\GoogleCrashServices\" std::wstring user_sid; if (is_per_user_install) { if (!base::win::GetUserSidString(&user_sid)) { return; } } else { user_sid = kSystemPrincipalSid; } pipe_name = kGoogleUpdatePipeName; pipe_name += user_sid; } env->SetVar(kPipeNameVar, base::UTF16ToASCII(pipe_name)); } void InitDefaultCrashCallback(LPTOP_LEVEL_EXCEPTION_FILTER filter) { previous_filter = SetUnhandledExceptionFilter(filter); } void InitCrashReporter(const std::string& process_type_switch) { const CommandLine& command = *CommandLine::ForCurrentProcess(); if (command.HasSwitch(switches::kDisableBreakpad)) return; // Disable the message box for assertions. _CrtSetReportMode(_CRT_ASSERT, 0); std::wstring process_type = base::ASCIIToWide(process_type_switch); if (process_type.empty()) process_type = L"browser"; wchar_t exe_path[MAX_PATH]; exe_path[0] = 0; GetModuleFileNameW(NULL, exe_path, MAX_PATH); bool is_per_user_install = GetBreakpadClient()->GetIsPerUserInstall(base::FilePath(exe_path)); // This is intentionally leaked. CrashKeysWin* keeper = new CrashKeysWin(); google_breakpad::CustomClientInfo* custom_info = keeper->GetCustomInfo(exe_path, process_type, GetProfileType(), CommandLine::ForCurrentProcess(), GetBreakpadClient()); google_breakpad::ExceptionHandler::MinidumpCallback callback = NULL; LPTOP_LEVEL_EXCEPTION_FILTER default_filter = NULL; // We install the post-dump callback only for the browser and service // processes. It spawns a new browser/service process. if (process_type == L"browser") { callback = &DumpDoneCallback; default_filter = &ChromeExceptionFilter; } else if (process_type == L"service") { callback = &DumpDoneCallback; default_filter = &ServiceExceptionFilter; } if (process_type == L"browser") { InitPipeNameEnvVar(is_per_user_install); GetBreakpadClient()->InitBrowserCrashDumpsRegKey(); } scoped_ptr env(base::Environment::Create()); std::string pipe_name_ascii; if (!env->GetVar(kPipeNameVar, &pipe_name_ascii)) { // Breakpad is not enabled. Configuration is managed or the user // did not allow Google Update to send crashes. We need to use // our default crash handler instead, but only for the // browser/service processes. if (default_filter) InitDefaultCrashCallback(default_filter); return; } std::wstring pipe_name = base::ASCIIToWide(pipe_name_ascii); #ifdef _WIN64 // The protocol for connecting to the out-of-process Breakpad crash // reporter is different for x86-32 and x86-64: the message sizes // are different because the message struct contains a pointer. As // a result, there are two different named pipes to connect to. The // 64-bit one is distinguished with an "-x64" suffix. pipe_name += L"-x64"; #endif // Get the alternate dump directory. We use the temp path. wchar_t temp_dir[MAX_PATH] = {0}; ::GetTempPathW(MAX_PATH, temp_dir); MINIDUMP_TYPE dump_type = kSmallDumpType; // Capture full memory if explicitly instructed to. if (command.HasSwitch(switches::kFullMemoryCrashReport)) dump_type = kFullDumpType; else if (GetBreakpadClient()->GetShouldDumpLargerDumps(is_per_user_install)) dump_type = kLargerDumpType; g_breakpad = new google_breakpad::ExceptionHandler(temp_dir, &FilterCallback, callback, NULL, google_breakpad::ExceptionHandler::HANDLER_ALL, dump_type, pipe_name.c_str(), custom_info); // Now initialize the non crash dump handler. g_dumphandler_no_crash = new google_breakpad::ExceptionHandler(temp_dir, &FilterCallbackWhenNoCrash, &DumpDoneCallbackWhenNoCrash, NULL, // Set the handler to none so this handler would not be added to // |handler_stack_| in |ExceptionHandler| which is a list of exception // handlers. google_breakpad::ExceptionHandler::HANDLER_NONE, dump_type, pipe_name.c_str(), custom_info); // Set the DumpWithoutCrashingFunction for this instance of base.lib. Other // executable images linked with base should set this again for // DumpWithoutCrashing to function correctly. // See chrome_main.cc for example. base::debug::SetDumpWithoutCrashingFunction(&DumpProcessWithoutCrash); if (g_breakpad->IsOutOfProcess()) { // Tells breakpad to handle breakpoint and single step exceptions. // This might break JIT debuggers, but at least it will always // generate a crashdump for these exceptions. g_breakpad->set_handle_debug_exceptions(true); #ifndef _WIN64 if (process_type != L"browser" && !GetBreakpadClient()->IsRunningUnattended()) { // Initialize the hook TerminateProcess to catch unexpected exits. InitTerminateProcessHooks(); } #endif } } // If the user has disabled crash reporting uploads and restarted Chrome, the // restarted instance will still contain the pipe environment variable, which // will allow the restarted process to still upload crash reports. This function // clears the environment variable, so that the restarted Chrome, which inherits // its environment from the current Chrome, will no longer contain the variable. extern "C" void __declspec(dllexport) __cdecl ClearBreakpadPipeEnvironmentVariable() { scoped_ptr env(base::Environment::Create()); env->UnSetVar(kPipeNameVar); } } // namespace breakpad