2013-11-23 12:26:47 +00:00
|
|
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
2014-04-25 09:49:37 +00:00
|
|
|
// Use of this source code is governed by the MIT license that can be
|
2013-11-23 12:26:47 +00:00
|
|
|
// found in the LICENSE file.
|
|
|
|
|
2014-03-16 00:30:26 +00:00
|
|
|
#include "atom/common/crash_reporter/win/crash_service.h"
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
#include <windows.h>
|
|
|
|
|
|
|
|
#include <sddl.h>
|
|
|
|
#include <fstream> // NOLINT
|
|
|
|
#include <map>
|
|
|
|
|
|
|
|
#include "base/command_line.h"
|
2015-01-10 01:45:50 +00:00
|
|
|
#include "base/files/file_util.h"
|
2013-11-23 12:26:47 +00:00
|
|
|
#include "base/logging.h"
|
2019-01-21 18:26:33 +00:00
|
|
|
#include "base/stl_util.h"
|
2014-11-11 08:38:16 +00:00
|
|
|
#include "base/strings/string_number_conversions.h"
|
2015-08-04 11:30:35 +00:00
|
|
|
#include "base/strings/string_util.h"
|
2014-11-11 08:38:16 +00:00
|
|
|
#include "base/time/time.h"
|
2013-11-23 12:26:47 +00:00
|
|
|
#include "base/win/windows_version.h"
|
2018-06-26 05:03:56 +00:00
|
|
|
#include "breakpad/src/client/windows/crash_generation/client_info.h"
|
|
|
|
#include "breakpad/src/client/windows/crash_generation/crash_generation_server.h"
|
|
|
|
#include "breakpad/src/client/windows/sender/crash_report_sender.h"
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
namespace breakpad {
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2015-08-04 11:30:35 +00:00
|
|
|
const wchar_t kWaitEventFormat[] = L"$1CrashServiceWaitEvent";
|
2015-08-04 11:35:46 +00:00
|
|
|
const wchar_t kClassNameFormat[] = L"$1CrashServiceWindow";
|
|
|
|
|
2013-11-23 12:26:47 +00:00
|
|
|
const wchar_t kTestPipeName[] = L"\\\\.\\pipe\\ChromeCrashServices";
|
|
|
|
|
2013-11-24 12:33:26 +00:00
|
|
|
const wchar_t kGoogleReportURL[] = L"https://clients2.google.com/cr/report";
|
2013-11-23 12:26:47 +00:00
|
|
|
const wchar_t kCheckPointFile[] = L"crash_checkpoint.txt";
|
|
|
|
|
|
|
|
typedef std::map<std::wstring, std::wstring> CrashMap;
|
|
|
|
|
|
|
|
bool CustomInfoToMap(const google_breakpad::ClientInfo* client_info,
|
2018-04-18 01:55:30 +00:00
|
|
|
const std::wstring& reporter_tag,
|
|
|
|
CrashMap* map) {
|
2013-11-23 12:26:47 +00:00
|
|
|
google_breakpad::CustomClientInfo info = client_info->GetCustomInfo();
|
|
|
|
|
|
|
|
for (uintptr_t i = 0; i < info.count; ++i) {
|
|
|
|
(*map)[info.entries[i].name] = info.entries[i].value;
|
|
|
|
}
|
|
|
|
|
|
|
|
(*map)[L"rept"] = reporter_tag;
|
|
|
|
|
|
|
|
return !map->empty();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WriteCustomInfoToFile(const std::wstring& dump_path, const CrashMap& map) {
|
|
|
|
std::wstring file_path(dump_path);
|
|
|
|
size_t last_dot = file_path.rfind(L'.');
|
|
|
|
if (last_dot == std::wstring::npos)
|
|
|
|
return false;
|
|
|
|
file_path.resize(last_dot);
|
|
|
|
file_path += L".txt";
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
std::wofstream file(file_path.c_str(), std::ios_base::out |
|
|
|
|
std::ios_base::app |
|
|
|
|
std::ios::binary);
|
2013-11-23 12:26:47 +00:00
|
|
|
if (!file.is_open())
|
|
|
|
return false;
|
|
|
|
|
|
|
|
CrashMap::const_iterator pos;
|
|
|
|
for (pos = map.begin(); pos != map.end(); ++pos) {
|
|
|
|
std::wstring line = pos->first;
|
|
|
|
line += L':';
|
|
|
|
line += pos->second;
|
|
|
|
line += L'\n';
|
|
|
|
file.write(line.c_str(), static_cast<std::streamsize>(line.length()));
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-11-11 08:38:16 +00:00
|
|
|
bool WriteReportIDToFile(const std::wstring& dump_path,
|
|
|
|
const std::wstring& report_id) {
|
|
|
|
std::wstring file_path(dump_path);
|
|
|
|
size_t last_slash = file_path.rfind(L'\\');
|
|
|
|
if (last_slash == std::wstring::npos)
|
|
|
|
return false;
|
|
|
|
file_path.resize(last_slash);
|
|
|
|
file_path += L"\\uploads.log";
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
std::wofstream file(file_path.c_str(), std::ios_base::out |
|
|
|
|
std::ios_base::app |
|
|
|
|
std::ios::binary);
|
2014-11-11 08:38:16 +00:00
|
|
|
if (!file.is_open())
|
|
|
|
return false;
|
|
|
|
|
2016-03-09 19:27:16 +00:00
|
|
|
int64_t seconds_since_epoch =
|
2014-11-11 08:38:16 +00:00
|
|
|
(base::Time::Now() - base::Time::UnixEpoch()).InSeconds();
|
2019-04-20 17:20:37 +00:00
|
|
|
std::wstring line = base::NumberToString16(seconds_since_epoch);
|
2014-11-11 08:38:16 +00:00
|
|
|
line += L',';
|
|
|
|
line += report_id;
|
|
|
|
line += L'\n';
|
|
|
|
file.write(line.c_str(), static_cast<std::streamsize>(line.length()));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-11-23 12:26:47 +00:00
|
|
|
// The window procedure task is to handle when a) the user logs off.
|
|
|
|
// b) the system shuts down or c) when the user closes the window.
|
2018-04-18 01:55:30 +00:00
|
|
|
LRESULT __stdcall CrashSvcWndProc(HWND hwnd,
|
|
|
|
UINT message,
|
|
|
|
WPARAM wparam,
|
|
|
|
LPARAM lparam) {
|
2013-11-23 12:26:47 +00:00
|
|
|
switch (message) {
|
|
|
|
case WM_CLOSE:
|
|
|
|
case WM_ENDSESSION:
|
|
|
|
case WM_DESTROY:
|
|
|
|
PostQuitMessage(0);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return DefWindowProc(hwnd, message, wparam, lparam);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
// This is the main and only application window.
|
|
|
|
HWND g_top_window = NULL;
|
|
|
|
|
2015-08-04 11:35:46 +00:00
|
|
|
bool CreateTopWindow(HINSTANCE instance,
|
|
|
|
const base::string16& application_name,
|
|
|
|
bool visible) {
|
2018-04-18 01:55:30 +00:00
|
|
|
base::string16 class_name =
|
|
|
|
base::ReplaceStringPlaceholders(kClassNameFormat, application_name, NULL);
|
2015-08-04 11:35:46 +00:00
|
|
|
|
2013-11-23 12:26:47 +00:00
|
|
|
WNDCLASSEXW wcx = {0};
|
|
|
|
wcx.cbSize = sizeof(wcx);
|
|
|
|
wcx.style = CS_HREDRAW | CS_VREDRAW;
|
|
|
|
wcx.lpfnWndProc = CrashSvcWndProc;
|
|
|
|
wcx.hInstance = instance;
|
2015-08-04 11:35:46 +00:00
|
|
|
wcx.lpszClassName = class_name.c_str();
|
2018-06-25 20:30:00 +00:00
|
|
|
::RegisterClassExW(&wcx);
|
2013-11-23 12:26:47 +00:00
|
|
|
DWORD style = visible ? WS_POPUPWINDOW | WS_VISIBLE : WS_OVERLAPPED;
|
|
|
|
|
|
|
|
// The window size is zero but being a popup window still shows in the
|
|
|
|
// task bar and can be closed using the system menu or using task manager.
|
|
|
|
HWND window = CreateWindowExW(0, wcx.lpszClassName, L"crash service", style,
|
2018-04-18 01:55:30 +00:00
|
|
|
CW_USEDEFAULT, CW_USEDEFAULT, 0, 0, NULL, NULL,
|
|
|
|
instance, NULL);
|
2013-11-23 12:26:47 +00:00
|
|
|
if (!window)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
::UpdateWindow(window);
|
|
|
|
VLOG(1) << "window handle is " << window;
|
|
|
|
g_top_window = window;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Simple helper class to keep the process alive until the current request
|
|
|
|
// finishes.
|
|
|
|
class ProcessingLock {
|
|
|
|
public:
|
2018-04-18 01:55:30 +00:00
|
|
|
ProcessingLock() { ::InterlockedIncrement(&op_count_); }
|
|
|
|
~ProcessingLock() { ::InterlockedDecrement(&op_count_); }
|
|
|
|
static bool IsWorking() { return (op_count_ != 0); }
|
|
|
|
|
2013-11-23 12:26:47 +00:00
|
|
|
private:
|
|
|
|
static volatile LONG op_count_;
|
|
|
|
};
|
|
|
|
|
|
|
|
volatile LONG ProcessingLock::op_count_ = 0;
|
|
|
|
|
|
|
|
// This structure contains the information that the worker thread needs to
|
|
|
|
// send a crash dump to the server.
|
|
|
|
struct DumpJobInfo {
|
|
|
|
DWORD pid;
|
|
|
|
CrashService* self;
|
|
|
|
CrashMap map;
|
|
|
|
std::wstring dump_path;
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
DumpJobInfo(DWORD process_id,
|
|
|
|
CrashService* service,
|
|
|
|
const CrashMap& crash_map,
|
|
|
|
const std::wstring& path)
|
|
|
|
: pid(process_id), self(service), map(crash_map), dump_path(path) {}
|
2013-11-23 12:26:47 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
// Command line switches:
|
2018-04-18 01:55:30 +00:00
|
|
|
const char CrashService::kMaxReports[] = "max-reports";
|
|
|
|
const char CrashService::kNoWindow[] = "no-window";
|
|
|
|
const char CrashService::kReporterTag[] = "reporter";
|
|
|
|
const char CrashService::kDumpsDir[] = "dumps-dir";
|
|
|
|
const char CrashService::kPipeName[] = "pipe-name";
|
|
|
|
const char CrashService::kReporterURL[] = "reporter-url";
|
2013-11-23 12:26:47 +00:00
|
|
|
|
2018-05-21 22:18:38 +00:00
|
|
|
CrashService::CrashService() {}
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
CrashService::~CrashService() {
|
|
|
|
base::AutoLock lock(sending_);
|
|
|
|
delete dumper_;
|
|
|
|
delete sender_;
|
|
|
|
}
|
|
|
|
|
2015-08-04 11:30:35 +00:00
|
|
|
bool CrashService::Initialize(const base::string16& application_name,
|
|
|
|
const base::FilePath& operating_dir,
|
2013-11-23 12:26:47 +00:00
|
|
|
const base::FilePath& dumps_path) {
|
|
|
|
using google_breakpad::CrashGenerationServer;
|
2018-04-18 01:55:30 +00:00
|
|
|
using google_breakpad::CrashReportSender;
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
std::wstring pipe_name = kTestPipeName;
|
|
|
|
int max_reports = -1;
|
|
|
|
|
2016-03-08 04:22:03 +00:00
|
|
|
// The checkpoint file allows CrashReportSender to enforce the maximum
|
2013-11-23 12:26:47 +00:00
|
|
|
// reports per day quota. Does not seem to serve any other purpose.
|
|
|
|
base::FilePath checkpoint_path = operating_dir.Append(kCheckPointFile);
|
|
|
|
|
2015-03-10 22:27:27 +00:00
|
|
|
base::CommandLine& cmd_line = *base::CommandLine::ForCurrentProcess();
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
base::FilePath dumps_path_to_use = dumps_path;
|
|
|
|
|
|
|
|
if (cmd_line.HasSwitch(kDumpsDir)) {
|
|
|
|
dumps_path_to_use =
|
|
|
|
base::FilePath(cmd_line.GetSwitchValueNative(kDumpsDir));
|
|
|
|
}
|
|
|
|
|
|
|
|
// We can override the send reports quota with a command line switch.
|
|
|
|
if (cmd_line.HasSwitch(kMaxReports))
|
|
|
|
max_reports = _wtoi(cmd_line.GetSwitchValueNative(kMaxReports).c_str());
|
|
|
|
|
|
|
|
// Allow the global pipe name to be overridden for better testability.
|
|
|
|
if (cmd_line.HasSwitch(kPipeName))
|
|
|
|
pipe_name = cmd_line.GetSwitchValueNative(kPipeName);
|
|
|
|
|
|
|
|
if (max_reports > 0) {
|
|
|
|
// Create the http sender object.
|
|
|
|
sender_ = new CrashReportSender(checkpoint_path.value());
|
|
|
|
sender_->set_max_reports_per_day(max_reports);
|
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_ATTRIBUTES security_attributes = {0};
|
2016-07-11 16:23:33 +00:00
|
|
|
SECURITY_DESCRIPTOR* security_descriptor =
|
|
|
|
reinterpret_cast<SECURITY_DESCRIPTOR*>(
|
|
|
|
GetSecurityDescriptorForLowIntegrity());
|
|
|
|
DCHECK(security_descriptor != NULL);
|
2013-11-23 12:26:47 +00:00
|
|
|
|
2016-07-11 16:23:33 +00:00
|
|
|
security_attributes.nLength = sizeof(security_attributes);
|
|
|
|
security_attributes.lpSecurityDescriptor = security_descriptor;
|
|
|
|
security_attributes.bInheritHandle = FALSE;
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
// Create the OOP crash generator object.
|
2018-04-18 01:55:30 +00:00
|
|
|
dumper_ = new CrashGenerationServer(
|
|
|
|
pipe_name, &security_attributes, &CrashService::OnClientConnected, this,
|
|
|
|
&CrashService::OnClientDumpRequest, this, &CrashService::OnClientExited,
|
|
|
|
this, NULL, NULL, true, &dumps_path_to_use.value());
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
if (!dumper_) {
|
|
|
|
LOG(ERROR) << "could not create dumper";
|
|
|
|
if (security_attributes.lpSecurityDescriptor)
|
|
|
|
LocalFree(security_attributes.lpSecurityDescriptor);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
if (!CreateTopWindow(::GetModuleHandleW(NULL), application_name,
|
2013-11-23 12:26:47 +00:00
|
|
|
!cmd_line.HasSwitch(kNoWindow))) {
|
|
|
|
LOG(ERROR) << "could not create window";
|
|
|
|
if (security_attributes.lpSecurityDescriptor)
|
|
|
|
LocalFree(security_attributes.lpSecurityDescriptor);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
reporter_tag_ = L"crash svc";
|
|
|
|
if (cmd_line.HasSwitch(kReporterTag))
|
|
|
|
reporter_tag_ = cmd_line.GetSwitchValueNative(kReporterTag);
|
|
|
|
|
2013-11-24 12:33:26 +00:00
|
|
|
reporter_url_ = kGoogleReportURL;
|
|
|
|
if (cmd_line.HasSwitch(kReporterURL))
|
|
|
|
reporter_url_ = cmd_line.GetSwitchValueNative(kReporterURL);
|
|
|
|
|
2013-11-23 12:26:47 +00:00
|
|
|
// Log basic information.
|
2018-04-18 01:55:30 +00:00
|
|
|
VLOG(1) << "pipe name is " << pipe_name << "\ndumps at "
|
|
|
|
<< dumps_path_to_use.value();
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
if (sender_) {
|
2018-04-18 01:55:30 +00:00
|
|
|
VLOG(1) << "checkpoint is " << checkpoint_path.value() << "\nserver is "
|
|
|
|
<< reporter_url_ << "\nmaximum " << sender_->max_reports_per_day()
|
|
|
|
<< " reports/day"
|
2013-11-23 12:26:47 +00:00
|
|
|
<< "\nreporter is " << reporter_tag_;
|
|
|
|
}
|
|
|
|
// Start servicing clients.
|
|
|
|
if (!dumper_->Start()) {
|
|
|
|
LOG(ERROR) << "could not start dumper";
|
|
|
|
if (security_attributes.lpSecurityDescriptor)
|
|
|
|
LocalFree(security_attributes.lpSecurityDescriptor);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (security_attributes.lpSecurityDescriptor)
|
|
|
|
LocalFree(security_attributes.lpSecurityDescriptor);
|
|
|
|
|
|
|
|
// Create or open an event to signal the browser process that the crash
|
|
|
|
// service is initialized.
|
2018-04-18 01:55:30 +00:00
|
|
|
base::string16 wait_name =
|
|
|
|
base::ReplaceStringPlaceholders(kWaitEventFormat, application_name, NULL);
|
2015-10-15 05:16:24 +00:00
|
|
|
HANDLE wait_event = ::CreateEventW(NULL, TRUE, TRUE, wait_name.c_str());
|
2015-08-04 11:30:35 +00:00
|
|
|
::SetEvent(wait_event);
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
void CrashService::OnClientConnected(
|
|
|
|
void* context,
|
2013-11-23 12:26:47 +00:00
|
|
|
const google_breakpad::ClientInfo* client_info) {
|
|
|
|
ProcessingLock lock;
|
|
|
|
VLOG(1) << "client start. pid = " << client_info->pid();
|
|
|
|
CrashService* self = static_cast<CrashService*>(context);
|
|
|
|
::InterlockedIncrement(&self->clients_connected_);
|
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
void CrashService::OnClientExited(
|
|
|
|
void* context,
|
2013-11-23 12:26:47 +00:00
|
|
|
const google_breakpad::ClientInfo* client_info) {
|
2016-05-10 04:09:41 +00:00
|
|
|
ProcessingLock processing_lock;
|
2013-11-23 12:26:47 +00:00
|
|
|
VLOG(1) << "client end. pid = " << client_info->pid();
|
|
|
|
CrashService* self = static_cast<CrashService*>(context);
|
|
|
|
::InterlockedIncrement(&self->clients_terminated_);
|
|
|
|
|
|
|
|
if (!self->sender_)
|
|
|
|
return;
|
|
|
|
|
|
|
|
// When we are instructed to send reports we need to exit if there are
|
|
|
|
// no more clients to service. The next client that runs will start us.
|
|
|
|
// Only chrome.exe starts crash_service with a non-zero max_reports.
|
|
|
|
if (self->clients_connected_ > self->clients_terminated_)
|
|
|
|
return;
|
|
|
|
if (self->sender_->max_reports_per_day() > 0) {
|
|
|
|
// Wait for the other thread to send crashes, if applicable. The sender
|
|
|
|
// thread takes the sending_ lock, so the sleep is just to give it a
|
|
|
|
// chance to start.
|
|
|
|
::Sleep(1000);
|
|
|
|
base::AutoLock lock(self->sending_);
|
|
|
|
// Some people can restart chrome very fast, check again if we have
|
|
|
|
// a new client before exiting for real.
|
|
|
|
if (self->clients_connected_ == self->clients_terminated_) {
|
|
|
|
VLOG(1) << "zero clients. exiting";
|
|
|
|
::PostMessage(g_top_window, WM_CLOSE, 0, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
void CrashService::OnClientDumpRequest(
|
|
|
|
void* context,
|
2013-11-23 12:26:47 +00:00
|
|
|
const google_breakpad::ClientInfo* client_info,
|
|
|
|
const std::wstring* file_path) {
|
|
|
|
ProcessingLock lock;
|
|
|
|
|
|
|
|
if (!file_path) {
|
|
|
|
LOG(ERROR) << "dump with no file path";
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!client_info) {
|
|
|
|
LOG(ERROR) << "dump with no client info";
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
CrashService* self = static_cast<CrashService*>(context);
|
|
|
|
if (!self) {
|
|
|
|
LOG(ERROR) << "dump with no context";
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
CrashMap map;
|
|
|
|
CustomInfoToMap(client_info, self->reporter_tag_, &map);
|
|
|
|
|
|
|
|
// Move dump file to the directory under client breakpad dump location.
|
|
|
|
base::FilePath dump_location = base::FilePath(*file_path);
|
|
|
|
CrashMap::const_iterator it = map.find(L"breakpad-dump-location");
|
|
|
|
if (it != map.end()) {
|
|
|
|
base::FilePath alternate_dump_location = base::FilePath(it->second);
|
2014-07-11 04:19:01 +00:00
|
|
|
base::CreateDirectoryW(alternate_dump_location);
|
2018-04-18 01:55:30 +00:00
|
|
|
alternate_dump_location =
|
|
|
|
alternate_dump_location.Append(dump_location.BaseName());
|
2013-12-17 06:01:40 +00:00
|
|
|
base::Move(dump_location, alternate_dump_location);
|
2013-11-23 12:26:47 +00:00
|
|
|
dump_location = alternate_dump_location;
|
|
|
|
}
|
|
|
|
|
|
|
|
DWORD pid = client_info->pid();
|
|
|
|
VLOG(1) << "dump for pid = " << pid << " is " << dump_location.value();
|
|
|
|
|
|
|
|
if (!WriteCustomInfoToFile(dump_location.value(), map)) {
|
|
|
|
LOG(ERROR) << "could not write custom info file";
|
|
|
|
}
|
|
|
|
|
2017-03-29 12:16:27 +00:00
|
|
|
if (!self->sender_ || map.find(L"skip_upload") != map.end())
|
2013-11-23 12:26:47 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
// Send the crash dump using a worker thread. This operation has retry
|
|
|
|
// logic in case there is no internet connection at the time.
|
2018-04-18 01:55:30 +00:00
|
|
|
DumpJobInfo* dump_job =
|
|
|
|
new DumpJobInfo(pid, self, map, dump_location.value());
|
|
|
|
if (!::QueueUserWorkItem(&CrashService::AsyncSendDump, dump_job,
|
|
|
|
WT_EXECUTELONGFUNCTION)) {
|
2013-11-23 12:26:47 +00:00
|
|
|
LOG(ERROR) << "could not queue job";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We are going to try sending the report several times. If we can't send,
|
|
|
|
// we sleep from one minute to several hours depending on the retry round.
|
|
|
|
DWORD CrashService::AsyncSendDump(void* context) {
|
|
|
|
if (!context)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
DumpJobInfo* info = static_cast<DumpJobInfo*>(context);
|
|
|
|
|
|
|
|
std::wstring report_id = L"<unsent>";
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
const DWORD kOneMinute = 60 * 1000;
|
|
|
|
const DWORD kOneHour = 60 * kOneMinute;
|
2013-11-23 12:26:47 +00:00
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
const DWORD kSleepSchedule[] = {24 * kOneHour, 8 * kOneHour, 4 * kOneHour,
|
|
|
|
kOneHour, 15 * kOneMinute, 0};
|
2013-11-23 12:26:47 +00:00
|
|
|
|
2019-01-21 18:26:33 +00:00
|
|
|
int retry_round = base::size(kSleepSchedule) - 1;
|
2013-11-23 12:26:47 +00:00
|
|
|
|
|
|
|
do {
|
|
|
|
::Sleep(kSleepSchedule[retry_round]);
|
|
|
|
{
|
|
|
|
// Take the server lock while sending. This also prevent early
|
|
|
|
// termination of the service object.
|
|
|
|
base::AutoLock lock(info->self->sending_);
|
|
|
|
VLOG(1) << "trying to send report for pid = " << info->pid;
|
2016-05-22 12:56:39 +00:00
|
|
|
std::map<std::wstring, std::wstring> file_map;
|
|
|
|
file_map[L"upload_file_minidump"] = info->dump_path;
|
2018-04-18 01:55:30 +00:00
|
|
|
google_breakpad::ReportResult send_result =
|
|
|
|
info->self->sender_->SendCrashReport(info->self->reporter_url_,
|
|
|
|
info->map, file_map, &report_id);
|
2013-11-23 12:26:47 +00:00
|
|
|
switch (send_result) {
|
|
|
|
case google_breakpad::RESULT_FAILED:
|
|
|
|
report_id = L"<network issue>";
|
|
|
|
break;
|
|
|
|
case google_breakpad::RESULT_REJECTED:
|
|
|
|
report_id = L"<rejected>";
|
|
|
|
++info->self->requests_handled_;
|
|
|
|
retry_round = 0;
|
|
|
|
break;
|
|
|
|
case google_breakpad::RESULT_SUCCEEDED:
|
|
|
|
++info->self->requests_sent_;
|
|
|
|
++info->self->requests_handled_;
|
|
|
|
retry_round = 0;
|
2014-11-11 08:38:16 +00:00
|
|
|
WriteReportIDToFile(info->dump_path, report_id);
|
2013-11-23 12:26:47 +00:00
|
|
|
break;
|
|
|
|
case google_breakpad::RESULT_THROTTLED:
|
|
|
|
report_id = L"<throttled>";
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
report_id = L"<unknown>";
|
|
|
|
break;
|
2014-12-16 01:15:56 +00:00
|
|
|
}
|
2013-11-23 12:26:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
VLOG(1) << "dump for pid =" << info->pid << " crash2 id =" << report_id;
|
|
|
|
--retry_round;
|
|
|
|
} while (retry_round >= 0);
|
|
|
|
|
|
|
|
if (!::DeleteFileW(info->dump_path.c_str()))
|
|
|
|
LOG(WARNING) << "could not delete " << info->dump_path;
|
|
|
|
|
|
|
|
delete info;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int CrashService::ProcessingLoop() {
|
|
|
|
MSG msg;
|
|
|
|
while (GetMessage(&msg, NULL, 0, 0)) {
|
|
|
|
TranslateMessage(&msg);
|
|
|
|
DispatchMessage(&msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
VLOG(1) << "session ending..";
|
|
|
|
while (ProcessingLock::IsWorking()) {
|
|
|
|
::Sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
VLOG(1) << "clients connected :" << clients_connected_
|
|
|
|
<< "\nclients terminated :" << clients_terminated_
|
|
|
|
<< "\ndumps serviced :" << requests_handled_
|
|
|
|
<< "\ndumps reported :" << requests_sent_;
|
|
|
|
|
|
|
|
return static_cast<int>(msg.wParam);
|
|
|
|
}
|
|
|
|
|
|
|
|
PSECURITY_DESCRIPTOR CrashService::GetSecurityDescriptorForLowIntegrity() {
|
|
|
|
// Build the SDDL string for the label.
|
|
|
|
std::wstring sddl = L"S:(ML;;NW;;;S-1-16-4096)";
|
|
|
|
|
|
|
|
PSECURITY_DESCRIPTOR sec_desc = NULL;
|
|
|
|
|
|
|
|
PACL sacl = NULL;
|
|
|
|
BOOL sacl_present = FALSE;
|
|
|
|
BOOL sacl_defaulted = FALSE;
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
if (::ConvertStringSecurityDescriptorToSecurityDescriptorW(
|
|
|
|
sddl.c_str(), SDDL_REVISION, &sec_desc, NULL)) {
|
2013-11-23 12:26:47 +00:00
|
|
|
if (::GetSecurityDescriptorSacl(sec_desc, &sacl_present, &sacl,
|
|
|
|
&sacl_defaulted)) {
|
|
|
|
return sec_desc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace breakpad
|