ipc/chromium/src/base/debug_util_win.cc

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved.
     2 // Use of this source code is governed by a BSD-style license that can be
     3 // found in the LICENSE file.
     5 #include "base/debug_util.h"
     7 #include <windows.h>
     8 #include <dbghelp.h>
     9 #include <iostream>
    11 #include "base/basictypes.h"
    12 #include "base/lock.h"
    13 #include "base/logging.h"
    14 #include "base/singleton.h"
    16 namespace {
    18 // Minimalist key reader.
    19 // Note: Does not use the CRT.
    20 bool RegReadString(HKEY root, const wchar_t* subkey,
    21                    const wchar_t* value_name, wchar_t* buffer, int* len) {
    22   HKEY key = NULL;
    23   DWORD res = RegOpenKeyEx(root, subkey, 0, KEY_READ, &key);
    24   if (ERROR_SUCCESS != res || key == NULL)
    25     return false;
    27   DWORD type = 0;
    28   DWORD buffer_size = *len * sizeof(wchar_t);
    29   // We don't support REG_EXPAND_SZ.
    30   res = RegQueryValueEx(key, value_name, NULL, &type,
    31                         reinterpret_cast<BYTE*>(buffer), &buffer_size);
    32   if (ERROR_SUCCESS == res && buffer_size != 0 && type == REG_SZ) {
    33     // Make sure the buffer is NULL terminated.
    34     buffer[*len - 1] = 0;
    35     *len = lstrlen(buffer);
    36     RegCloseKey(key);
    37     return true;
    38   }
    39   RegCloseKey(key);
    40   return false;
    41 }
    43 // Replaces each "%ld" in input per a value. Not efficient but it works.
    44 // Note: Does not use the CRT.
    45 bool StringReplace(const wchar_t* input, int value, wchar_t* output,
    46                    int output_len) {
    47   memset(output, 0, output_len*sizeof(wchar_t));
    48   int input_len = lstrlen(input);
    50   for (int i = 0; i < input_len; ++i) {
    51     int current_output_len = lstrlen(output);
    53     if (input[i] == L'%' && input[i + 1] == L'l' && input[i + 2] == L'd') {
    54       // Make sure we have enough place left.
    55       if ((current_output_len + 12) >= output_len)
    56         return false;
    58       // Cheap _itow().
    59       wsprintf(output+current_output_len, L"%d", value);
    60       i += 2;
    61     } else {
    62       if (current_output_len >= output_len)
    63         return false;
    64       output[current_output_len] = input[i];
    65     }
    66   }
    67   return true;
    68 }
    70 // SymbolContext is a threadsafe singleton that wraps the DbgHelp Sym* family
    71 // of functions.  The Sym* family of functions may only be invoked by one
    72 // thread at a time.  SymbolContext code may access a symbol server over the
    73 // network while holding the lock for this singleton.  In the case of high
    74 // latency, this code will adversly affect performance.
    75 //
    76 // There is also a known issue where this backtrace code can interact
    77 // badly with breakpad if breakpad is invoked in a separate thread while
    78 // we are using the Sym* functions.  This is because breakpad does now
    79 // share a lock with this function.  See this related bug:
    80 //
    81 //   http://code.google.com/p/google-breakpad/issues/detail?id=311
    82 //
    83 // This is a very unlikely edge case, and the current solution is to
    84 // just ignore it.
    85 class SymbolContext {
    86  public:
    87   static SymbolContext* Get() {
    88     // We use a leaky singleton because code may call this during process
    89     // termination.
    90     return
    91       Singleton<SymbolContext, LeakySingletonTraits<SymbolContext> >::get();
    92   }
    94   // Initializes the symbols for the process if it hasn't been done yet.
    95   // Subsequent calls will not reinitialize the symbol, but instead return
    96   // the error code from the first call.
    97   bool Init() {
    98     AutoLock lock(lock_);
    99     if (!initialized_) {
   100       process_ = GetCurrentProcess();
   102       // Defer symbol load until they're needed, use undecorated names, and
   103       // get line numbers.
   104       SymSetOptions(SYMOPT_DEFERRED_LOADS |
   105                     SYMOPT_UNDNAME |
   106                     SYMOPT_LOAD_LINES);
   107       if (SymInitialize(process_, NULL, TRUE)) {
   108         init_error_ = ERROR_SUCCESS;
   109       } else {
   110         init_error_ = GetLastError();
   111       }
   112     }
   114     initialized_ = true;
   115     return init_error_ == ERROR_SUCCESS;
   116   }
   118   // Returns the error code of a failed initialization.  This should only be
   119   // called if Init() has been called.  We do not CHROMIUM_LOG(FATAL) here because
   120   // this code is called might be triggered by a CHROMIUM_LOG(FATAL) itself.  Instead,
   121   // we log an ERROR, and return ERROR_INVALID_DATA.
   122   DWORD init_error() {
   123     if (!initialized_) {
   124       CHROMIUM_LOG(ERROR) << "Calling GetInitError() before Init() was called.  "
   125                           << "Returning ERROR_INVALID_DATA.";
   126       return ERROR_INVALID_DATA;
   127     }
   129     return init_error_;
   130   }
   132   // Returns the process this was initialized for.  This should only be
   133   // called if Init() has been called.  We CHROMIUM_LOG(ERROR) in this situation.
   134   // CHROMIUM_LOG(FATAL) is not used because this code is might be triggered 
   135   // by a CHROMIUM_LOG(FATAL) itself.
   136   HANDLE process() {
   137     if (!initialized_) {
   138       CHROMIUM_LOG(ERROR) << "Calling process() before Init() was called. "
   139                           << "Returning NULL.";
   140       return NULL;
   141     }
   143     return process_;
   144   }
   146   // For the given trace, attempts to resolve the symbols, and output a trace
   147   // to the ostream os.  The format for each line of the backtrace is:
   148   //
   149   //    <tab>SymbolName[0xAddress+Offset] (FileName:LineNo)
   150   // 
   151   // This function should only be called if Init() has been called.  We do not
   152   // CHROMIUM_LOG(FATAL) here because this code is called might be triggered by a
   153   // CHROMIUM_LOG(FATAL) itself.
   154   void OutputTraceToStream(const std::vector<void*>& trace, std::ostream* os) {
   155     AutoLock lock(lock_);
   157     for (size_t i = 0; (i < trace.size()) && os->good(); ++i) {
   158       const int kMaxNameLength = 256;
   159       DWORD_PTR frame = reinterpret_cast<DWORD_PTR>(trace[i]);
   161       // Code adapted from MSDN example:
   162       // http://msdn.microsoft.com/en-us/library/ms680578(VS.85).aspx
   163       ULONG64 buffer[
   164         (sizeof(SYMBOL_INFO) +
   165           kMaxNameLength * sizeof(wchar_t) +
   166           sizeof(ULONG64) - 1) /
   167         sizeof(ULONG64)];
   169       // Initialize symbol information retrieval structures.
   170       DWORD64 sym_displacement = 0;
   171       PSYMBOL_INFO symbol = reinterpret_cast<PSYMBOL_INFO>(&buffer[0]);
   172       symbol->SizeOfStruct = sizeof(SYMBOL_INFO);
   173       symbol->MaxNameLen = kMaxNameLength;
   174       BOOL has_symbol = SymFromAddr(process(), frame,
   175                                     &sym_displacement, symbol);
   177       // Attempt to retrieve line number information.
   178       DWORD line_displacement = 0;
   179       IMAGEHLP_LINE64 line = {};
   180       line.SizeOfStruct = sizeof(IMAGEHLP_LINE64);
   181       BOOL has_line = SymGetLineFromAddr64(process(), frame,
   182                                            &line_displacement, &line);
   184       // Output the backtrace line.
   185       (*os) << "\t";
   186       if (has_symbol) {
   187         (*os) << symbol->Name << " [0x" << trace[i] << "+"
   188               << sym_displacement << "]";
   189       } else {
   190         // If there is no symbol informtion, add a spacer.
   191         (*os) << "(No symbol) [0x" << trace[i] << "]";
   192       }
   193       if (has_line) {
   194         (*os) << " (" << line.FileName << ":" << line.LineNumber << ")";
   195       }
   196       (*os) << "\n";
   197     }
   198   }
   200   SymbolContext()
   201     : initialized_(false),
   202       process_(NULL),
   203       init_error_(ERROR_SUCCESS) {
   204   }
   206  private:
   207   Lock lock_;
   208   bool initialized_;
   209   HANDLE process_;
   210   DWORD init_error_;
   212   DISALLOW_COPY_AND_ASSIGN(SymbolContext);
   213 };
   215 }  // namespace
   217 // Note: Does not use the CRT.
   218 bool DebugUtil::SpawnDebuggerOnProcess(unsigned process_id) {
   219   wchar_t reg_value[1026];
   220   int len = arraysize(reg_value);
   221   if (RegReadString(HKEY_LOCAL_MACHINE,
   222       L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug",
   223       L"Debugger", reg_value, &len)) {
   224     wchar_t command_line[1026];
   225     if (StringReplace(reg_value, process_id, command_line,
   226                       arraysize(command_line))) {
   227       // We don't mind if the debugger is present because it will simply fail
   228       // to attach to this process.
   229       STARTUPINFO startup_info = {0};
   230       startup_info.cb = sizeof(startup_info);
   231       PROCESS_INFORMATION process_info = {0};
   233       if (CreateProcess(NULL, command_line, NULL, NULL, FALSE, 0, NULL, NULL,
   234                         &startup_info, &process_info)) {
   235         CloseHandle(process_info.hThread);
   236         WaitForInputIdle(process_info.hProcess, 10000);
   237         CloseHandle(process_info.hProcess);
   238         return true;
   239       }
   240     }
   241   }
   242   return false;
   243 }
   245 // static
   246 bool DebugUtil::BeingDebugged() {
   247   return ::IsDebuggerPresent() != 0;
   248 }
   250 // static
   251 void DebugUtil::BreakDebugger() {
   252   __debugbreak();
   253 }
   255 StackTrace::StackTrace() {
   256   // From http://msdn.microsoft.com/en-us/library/bb204633(VS.85).aspx,
   257   // the sum of FramesToSkip and FramesToCapture must be less than 63,
   258   // so set it to 62.
   259   const int kMaxCallers = 62;
   261   void* callers[kMaxCallers];
   262   // TODO(ajwong): Migrate this to StackWalk64.
   263   int count = CaptureStackBackTrace(0, kMaxCallers, callers, NULL);
   264   if (count > 0) {
   265     trace_.resize(count);
   266     memcpy(&trace_[0], callers, sizeof(callers[0]) * count);
   267   } else {
   268     trace_.resize(0);
   269   }
   270 }
   272 void StackTrace::PrintBacktrace() {
   273   OutputToStream(&std::cerr);
   274 }
   276 void StackTrace::OutputToStream(std::ostream* os) {
   277   SymbolContext* context = SymbolContext::Get();
   279   if (context->Init() != ERROR_SUCCESS) {
   280     DWORD error = context->init_error();
   281     (*os) << "Error initializing symbols (" << error
   282           << ").  Dumping unresolved backtrace:\n";
   283     for (size_t i = 0; (i < trace_.size()) && os->good(); ++i) {
   284       (*os) << "\t" << trace_[i] << "\n";
   285     }
   286   } else {
   287     (*os) << "Backtrace:\n";
   288     context->OutputTraceToStream(trace_, os);
   289   }
   290 }

mercurial