summaryrefslogtreecommitdiffstats
path: root/toolkit/crashreporter/nsExceptionHandler.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'toolkit/crashreporter/nsExceptionHandler.cpp')
-rw-r--r--toolkit/crashreporter/nsExceptionHandler.cpp3863
1 files changed, 3863 insertions, 0 deletions
diff --git a/toolkit/crashreporter/nsExceptionHandler.cpp b/toolkit/crashreporter/nsExceptionHandler.cpp
new file mode 100644
index 0000000000..534f5ab48c
--- /dev/null
+++ b/toolkit/crashreporter/nsExceptionHandler.cpp
@@ -0,0 +1,3863 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "nsExceptionHandler.h"
+#include "nsExceptionHandlerUtils.h"
+
+#include "nsAppDirectoryServiceDefs.h"
+#include "nsComponentManagerUtils.h"
+#include "nsDirectoryServiceDefs.h"
+#include "nsDirectoryService.h"
+#include "nsString.h"
+#include "nsTHashMap.h"
+#include "mozilla/ArrayUtils.h"
+#include "mozilla/DebugOnly.h"
+#include "mozilla/EnumeratedRange.h"
+#include "mozilla/Services.h"
+#include "nsIObserverService.h"
+#include "mozilla/Unused.h"
+#include "mozilla/UniquePtr.h"
+#include "mozilla/Printf.h"
+#include "mozilla/RuntimeExceptionModule.h"
+#include "mozilla/ScopeExit.h"
+#include "mozilla/Sprintf.h"
+#include "mozilla/StaticMutex.h"
+#include "mozilla/SyncRunnable.h"
+#include "mozilla/TimeStamp.h"
+
+#include "nsPrintfCString.h"
+#include "nsThreadUtils.h"
+#include "nsThread.h"
+#include "jsfriendapi.h"
+#include "private/pprio.h"
+#include "base/process_util.h"
+#include "common/basictypes.h"
+
+#if defined(XP_WIN)
+# ifdef WIN32_LEAN_AND_MEAN
+# undef WIN32_LEAN_AND_MEAN
+# endif
+
+# include "nsXULAppAPI.h"
+# include "nsIXULAppInfo.h"
+# include "nsIWindowsRegKey.h"
+# include "breakpad-client/windows/crash_generation/client_info.h"
+# include "breakpad-client/windows/crash_generation/crash_generation_server.h"
+# include "breakpad-client/windows/handler/exception_handler.h"
+# include <dbghelp.h>
+# include <string.h>
+# include "nsDirectoryServiceUtils.h"
+
+# include "nsWindowsDllInterceptor.h"
+# include "mozilla/WindowsDllBlocklist.h"
+# include "mozilla/WindowsVersion.h"
+# include "psapi.h" // For PERFORMANCE_INFORMATION and K32GetPerformanceInfo()
+#elif defined(XP_MACOSX)
+# include "breakpad-client/mac/crash_generation/client_info.h"
+# include "breakpad-client/mac/crash_generation/crash_generation_server.h"
+# include "breakpad-client/mac/handler/exception_handler.h"
+# include <string>
+# include <Carbon/Carbon.h>
+# include <CoreFoundation/CoreFoundation.h>
+# include <crt_externs.h>
+# include <fcntl.h>
+# include <mach/mach.h>
+# include <mach/vm_statistics.h>
+# include <sys/sysctl.h>
+# include <sys/types.h>
+# include <spawn.h>
+# include <unistd.h>
+# include "mac_utils.h"
+#elif defined(XP_LINUX)
+# include "nsIINIParser.h"
+# include "common/linux/linux_libc_support.h"
+# include "third_party/lss/linux_syscall_support.h"
+# include "breakpad-client/linux/crash_generation/client_info.h"
+# include "breakpad-client/linux/crash_generation/crash_generation_server.h"
+# include "breakpad-client/linux/handler/exception_handler.h"
+# include "common/linux/eintr_wrapper.h"
+# include <fcntl.h>
+# include <sys/types.h>
+# include "sys/sysinfo.h"
+# include <sys/wait.h>
+# include <unistd.h>
+#else
+# error "Not yet implemented for this platform"
+#endif // defined(XP_WIN)
+
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+# include "InjectCrashReporter.h"
+using mozilla::InjectCrashRunnable;
+#endif
+
+#include <stdlib.h>
+#include <time.h>
+#include <prenv.h>
+#include <prio.h>
+#include "mozilla/Mutex.h"
+#include "nsDebug.h"
+#include "nsCRT.h"
+#include "nsIFile.h"
+#include <map>
+#include <vector>
+
+#include "mozilla/IOInterposer.h"
+#include "mozilla/mozalloc_oom.h"
+
+#if defined(XP_MACOSX)
+CFStringRef reporterClientAppID = CFSTR("org.mozilla.crashreporter");
+#endif
+#if defined(MOZ_WIDGET_ANDROID)
+# include "common/linux/file_id.h"
+#endif
+
+using google_breakpad::ClientInfo;
+using google_breakpad::CrashGenerationServer;
+#ifdef XP_LINUX
+using google_breakpad::MinidumpDescriptor;
+#elif defined(XP_WIN)
+using google_breakpad::ExceptionHandler;
+#endif
+#if defined(MOZ_WIDGET_ANDROID)
+using google_breakpad::auto_wasteful_vector;
+using google_breakpad::FileID;
+using google_breakpad::kDefaultBuildIdSize;
+using google_breakpad::PageAllocator;
+#endif
+using namespace mozilla;
+
+namespace CrashReporter {
+
+#ifdef XP_WIN
+typedef wchar_t XP_CHAR;
+typedef std::wstring xpstring;
+# define XP_TEXT(x) L##x
+# define CONVERT_XP_CHAR_TO_UTF16(x) x
+# define XP_STRLEN(x) wcslen(x)
+# define my_strlen strlen
+# define my_memchr memchr
+# define CRASH_REPORTER_FILENAME u"crashreporter.exe"_ns
+# define XP_PATH_SEPARATOR L"\\"
+# define XP_PATH_SEPARATOR_CHAR L'\\'
+# define XP_PATH_MAX (MAX_PATH + 1)
+// "<reporter path>" "<minidump path>"
+# define CMDLINE_SIZE ((XP_PATH_MAX * 2) + 6)
+# define XP_TTOA(time, buffer) _i64toa((time), (buffer), 10)
+# define XP_STOA(size, buffer) _ui64toa((size), (buffer), 10)
+#else
+typedef char XP_CHAR;
+typedef std::string xpstring;
+# define XP_TEXT(x) x
+# define CONVERT_XP_CHAR_TO_UTF16(x) NS_ConvertUTF8toUTF16(x)
+# define CRASH_REPORTER_FILENAME u"crashreporter"_ns
+# define XP_PATH_SEPARATOR "/"
+# define XP_PATH_SEPARATOR_CHAR '/'
+# define XP_PATH_MAX PATH_MAX
+# ifdef XP_LINUX
+# define XP_STRLEN(x) my_strlen(x)
+# define XP_TTOA(time, buffer) \
+ my_u64tostring(uint64_t(time), (buffer), sizeof(buffer))
+# define XP_STOA(size, buffer) \
+ my_u64tostring((size), (buffer), sizeof(buffer))
+# else
+# define XP_STRLEN(x) strlen(x)
+# define XP_TTOA(time, buffer) sprintf(buffer, "%" PRIu64, uint64_t(time))
+# define XP_STOA(size, buffer) sprintf(buffer, "%zu", size_t(size))
+# define my_strlen strlen
+# define my_memchr memchr
+# define sys_close close
+# define sys_fork fork
+# define sys_open open
+# define sys_read read
+# define sys_write write
+# endif
+#endif // XP_WIN
+
+#if defined(__GNUC__)
+# define MAYBE_UNUSED __attribute__((unused))
+#else
+# define MAYBE_UNUSED
+#endif // defined(__GNUC__)
+
+#ifndef XP_LINUX
+static const XP_CHAR dumpFileExtension[] = XP_TEXT(".dmp");
+#endif
+
+static const XP_CHAR extraFileExtension[] = XP_TEXT(".extra");
+static const XP_CHAR memoryReportExtension[] = XP_TEXT(".memory.json.gz");
+static xpstring* defaultMemoryReportPath = nullptr;
+
+static const char kCrashMainID[] = "crash.main.3\n";
+
+static google_breakpad::ExceptionHandler* gExceptionHandler = nullptr;
+static mozilla::Atomic<bool> gEncounteredChildException(false);
+
+static xpstring pendingDirectory;
+static xpstring crashReporterPath;
+static xpstring memoryReportPath;
+
+// Where crash events should go.
+static xpstring eventsDirectory;
+
+// If this is false, we don't launch the crash reporter
+static bool doReport = true;
+
+// if this is true, we pass the exception on to the OS crash reporter
+static bool showOSCrashReporter = false;
+
+// The time of the last recorded crash, as a time_t value.
+static time_t lastCrashTime = 0;
+// The pathname of a file to store the crash time in
+static XP_CHAR lastCrashTimeFilename[XP_PATH_MAX] = {0};
+
+#if defined(MOZ_WIDGET_ANDROID)
+// on Android 4.2 and above there is a user serial number associated
+// with the current process that gets lost when we fork so we need to
+// explicitly pass it to am
+static char* androidUserSerial = nullptr;
+
+// Before Android 8 we needed to use "startservice" to start the crash reporting
+// service. After Android 8 we need to use "start-foreground-service"
+static const char* androidStartServiceCommand = nullptr;
+#endif
+
+// this holds additional data sent via the API
+static Mutex* crashReporterAPILock;
+static Mutex* notesFieldLock;
+static AnnotationTable crashReporterAPIData_Table;
+static nsCString* notesField = nullptr;
+static bool isGarbageCollecting;
+static uint32_t eventloopNestingLevel = 0;
+static time_t inactiveStateStart = 0;
+
+static
+#if defined(XP_UNIX)
+ pthread_t
+#elif defined(XP_WIN) // defined(XP_UNIX)
+ DWORD
+#endif // defined(XP_WIN)
+ gMainThreadId = 0;
+
+// Avoid a race during application termination.
+static Mutex* dumpSafetyLock;
+static bool isSafeToDump = false;
+
+// Whether to include heap regions of the crash context.
+static bool sIncludeContextHeap = false;
+
+// OOP crash reporting
+static CrashGenerationServer* crashServer; // chrome process has this
+static StaticMutex processMapLock MOZ_UNANNOTATED;
+static std::map<ProcessId, PRFileDesc*> processToCrashFd;
+
+static std::terminate_handler oldTerminateHandler = nullptr;
+
+#if defined(XP_WIN) || defined(XP_MACOSX)
+// If crash reporting is disabled, we hand out this "null" pipe to the
+// child process and don't attempt to connect to a parent server.
+static const char kNullNotifyPipe[] = "-";
+static char* childCrashNotifyPipe;
+
+#elif defined(XP_LINUX)
+static int serverSocketFd = -1;
+static int clientSocketFd = -1;
+
+// On Linux these file descriptors are created in the parent process and
+// remapped in the child ones. See PosixProcessLauncher::DoSetup() for more
+// details.
+static FileHandle gMagicChildCrashReportFd =
+# if defined(MOZ_WIDGET_ANDROID)
+ // On android the fd is set at the time of child creation.
+ kInvalidFileHandle
+# else
+ 4
+# endif // defined(MOZ_WIDGET_ANDROID)
+ ;
+#endif
+
+static FileHandle gChildCrashAnnotationReportFd =
+#if (defined(XP_LINUX) || defined(XP_MACOSX)) && !defined(MOZ_WIDGET_ANDROID)
+ 7
+#else
+ kInvalidFileHandle
+#endif
+ ;
+
+// |dumpMapLock| must protect all access to |pidToMinidump|.
+static Mutex* dumpMapLock;
+struct ChildProcessData : public nsUint32HashKey {
+ explicit ChildProcessData(KeyTypePointer aKey)
+ : nsUint32HashKey(aKey),
+ sequence(0),
+ annotations(nullptr),
+ minidumpOnly(false)
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+ ,
+ callback(nullptr)
+#endif
+ {
+ }
+
+ nsCOMPtr<nsIFile> minidump;
+ // Each crashing process is assigned an increasing sequence number to
+ // indicate which process crashed first.
+ uint32_t sequence;
+ UniquePtr<AnnotationTable> annotations;
+ bool minidumpOnly; // If true then no annotations are present
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+ InjectorCrashCallback* callback;
+#endif
+};
+
+typedef nsTHashtable<ChildProcessData> ChildMinidumpMap;
+static ChildMinidumpMap* pidToMinidump;
+static uint32_t crashSequence;
+static bool OOPInitialized();
+
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+static nsIThread* sInjectorThread;
+
+class ReportInjectedCrash : public Runnable {
+ public:
+ explicit ReportInjectedCrash(uint32_t pid)
+ : Runnable("ReportInjectedCrash"), mPID(pid) {}
+
+ NS_IMETHOD Run() override;
+
+ private:
+ uint32_t mPID;
+};
+#endif // MOZ_CRASHREPORTER_INJECTOR
+
+void RecordMainThreadId() {
+ gMainThreadId =
+#if defined(XP_UNIX)
+ pthread_self()
+#elif defined(XP_WIN) // defined(XP_UNIX)
+ GetCurrentThreadId()
+#endif // defined(XP_WIN)
+ ;
+}
+
+bool SignalSafeIsMainThread() {
+ // We can't rely on NS_IsMainThread() because we are in a signal handler, and
+ // sTLSIsMainThread is a thread local variable and it can be lazy allocated
+ // i.e., we could hit code path where this variable has not been accessed
+ // before and needs to be allocated right now, which will lead to spinlock
+ // deadlock effectively hanging the process, as in bug 1756407.
+
+#if defined(XP_UNIX)
+ pthread_t th = pthread_self();
+ return pthread_equal(th, gMainThreadId);
+#elif defined(XP_WIN) // defined(XP_UNIX)
+ DWORD th = GetCurrentThreadId();
+ return th == gMainThreadId;
+#endif // defined(XP_WIN)
+}
+
+#if defined(XP_WIN)
+// the following are used to prevent other DLLs reverting the last chance
+// exception handler to the windows default. Any attempt to change the
+// unhandled exception filter or to reset it is ignored and our crash
+// reporter is loaded instead (in case it became unloaded somehow)
+typedef LPTOP_LEVEL_EXCEPTION_FILTER(WINAPI* SetUnhandledExceptionFilter_func)(
+ LPTOP_LEVEL_EXCEPTION_FILTER lpTopLevelExceptionFilter);
+static WindowsDllInterceptor::FuncHookType<SetUnhandledExceptionFilter_func>
+ stub_SetUnhandledExceptionFilter;
+static LPTOP_LEVEL_EXCEPTION_FILTER previousUnhandledExceptionFilter = nullptr;
+static WindowsDllInterceptor gKernel32Intercept;
+static bool gBlockUnhandledExceptionFilter = true;
+
+static LPTOP_LEVEL_EXCEPTION_FILTER GetUnhandledExceptionFilter() {
+ // Set a dummy value to get the current filter, then restore
+ LPTOP_LEVEL_EXCEPTION_FILTER current = SetUnhandledExceptionFilter(nullptr);
+ SetUnhandledExceptionFilter(current);
+ return current;
+}
+
+static LPTOP_LEVEL_EXCEPTION_FILTER WINAPI patched_SetUnhandledExceptionFilter(
+ LPTOP_LEVEL_EXCEPTION_FILTER lpTopLevelExceptionFilter) {
+ if (!gBlockUnhandledExceptionFilter) {
+ // don't intercept
+ return stub_SetUnhandledExceptionFilter(lpTopLevelExceptionFilter);
+ }
+
+ if (lpTopLevelExceptionFilter == previousUnhandledExceptionFilter) {
+ // OK to swap back and forth between the previous filter
+ previousUnhandledExceptionFilter =
+ stub_SetUnhandledExceptionFilter(lpTopLevelExceptionFilter);
+ return previousUnhandledExceptionFilter;
+ }
+
+ // intercept attempts to change the filter
+ return nullptr;
+}
+
+# if defined(HAVE_64BIT_BUILD)
+static LPTOP_LEVEL_EXCEPTION_FILTER sUnhandledExceptionFilter = nullptr;
+
+static long JitExceptionHandler(void* exceptionRecord, void* context) {
+ EXCEPTION_POINTERS pointers = {(PEXCEPTION_RECORD)exceptionRecord,
+ (PCONTEXT)context};
+ return sUnhandledExceptionFilter(&pointers);
+}
+
+static void SetJitExceptionHandler() {
+ sUnhandledExceptionFilter = GetUnhandledExceptionFilter();
+ if (sUnhandledExceptionFilter)
+ js::SetJitExceptionHandler(JitExceptionHandler);
+}
+# endif
+
+/**
+ * Reserve some VM space. In the event that we crash because VM space is
+ * being leaked without leaking memory, freeing this space before taking
+ * the minidump will allow us to collect a minidump.
+ *
+ * This size is bigger than xul.dll plus some extra for MinidumpWriteDump
+ * allocations.
+ */
+static const SIZE_T kReserveSize = 0x5000000; // 80 MB
+static void* gBreakpadReservedVM;
+#endif
+
+#ifdef XP_LINUX
+static inline void my_u64tostring(uint64_t aValue, char* aBuffer,
+ size_t aBufferLength) {
+ my_memset(aBuffer, 0, aBufferLength);
+ my_uitos(aBuffer, aValue, my_uint_len(aValue));
+}
+#endif
+
+#ifdef XP_WIN
+static void CreateFileFromPath(const xpstring& path, nsIFile** file) {
+ NS_NewLocalFile(nsDependentString(path.c_str()), false, file);
+}
+
+static xpstring* CreatePathFromFile(nsIFile* file) {
+ nsAutoString path;
+ nsresult rv = file->GetPath(path);
+ if (NS_FAILED(rv)) {
+ return nullptr;
+ }
+ return new xpstring(static_cast<wchar_t*>(path.get()), path.Length());
+}
+#else
+static void CreateFileFromPath(const xpstring& path, nsIFile** file) {
+ NS_NewNativeLocalFile(nsDependentCString(path.c_str()), false, file);
+}
+
+MAYBE_UNUSED static xpstring* CreatePathFromFile(nsIFile* file) {
+ nsAutoCString path;
+ nsresult rv = file->GetNativePath(path);
+ if (NS_FAILED(rv)) {
+ return nullptr;
+ }
+ return new xpstring(path.get(), path.Length());
+}
+#endif
+
+static time_t GetCurrentTimeForCrashTime() {
+#ifdef XP_LINUX
+ struct kernel_timeval tv;
+ sys_gettimeofday(&tv, nullptr);
+ return tv.tv_sec;
+#else
+ return time(nullptr);
+#endif
+}
+
+static XP_CHAR* Concat(XP_CHAR* str, const XP_CHAR* toAppend, size_t* size) {
+ size_t appendLen = XP_STRLEN(toAppend);
+ if (appendLen >= *size) {
+ appendLen = *size - 1;
+ }
+
+ memcpy(str, toAppend, appendLen * sizeof(XP_CHAR));
+ str += appendLen;
+ *str = '\0';
+ *size -= appendLen;
+
+ return str;
+}
+
+void AnnotateOOMAllocationSize(size_t size) { gOOMAllocationSize = size; }
+
+static size_t gTexturesSize = 0;
+
+void AnnotateTexturesSize(size_t size) { gTexturesSize = size; }
+
+#ifndef XP_WIN
+// Like Windows CopyFile for *nix
+//
+// This function is not declared static even though it's not used outside of
+// this file because of an issue in Fennec which prevents breakpad's exception
+// handler from invoking the MinidumpCallback function. See bug 1424304.
+bool copy_file(const char* from, const char* to) {
+ const int kBufSize = 4096;
+ int fdfrom = sys_open(from, O_RDONLY, 0);
+ if (fdfrom < 0) {
+ return false;
+ }
+
+ bool ok = false;
+
+ int fdto = sys_open(to, O_WRONLY | O_CREAT, 0666);
+ if (fdto < 0) {
+ sys_close(fdfrom);
+ return false;
+ }
+
+ char buf[kBufSize];
+ while (true) {
+ int r = sys_read(fdfrom, buf, kBufSize);
+ if (r == 0) {
+ ok = true;
+ break;
+ }
+ if (r < 0) {
+ break;
+ }
+ char* wbuf = buf;
+ while (r) {
+ int w = sys_write(fdto, wbuf, r);
+ if (w > 0) {
+ r -= w;
+ wbuf += w;
+ } else if (errno != EINTR) {
+ break;
+ }
+ }
+ if (r) {
+ break;
+ }
+ }
+
+ sys_close(fdfrom);
+ sys_close(fdto);
+
+ return ok;
+}
+#endif
+
+/**
+ * The PlatformWriter class provides a tool to create and write to a file that
+ * is safe to call from within an exception handler. To use it this way the
+ * file path needs to be provided as a bare C string.
+ */
+class PlatformWriter {
+ public:
+ PlatformWriter() : mBuffer{}, mPos(0), mFD(kInvalidFileHandle) {}
+ explicit PlatformWriter(const XP_CHAR* aPath) : PlatformWriter() {
+ Open(aPath);
+ }
+
+ ~PlatformWriter() {
+ if (Valid()) {
+ Flush();
+#ifdef XP_WIN
+ CloseHandle(mFD);
+#elif defined(XP_UNIX)
+ sys_close(mFD);
+#endif
+ }
+ }
+
+ void Open(const XP_CHAR* aPath) {
+#ifdef XP_WIN
+ mFD = CreateFile(aPath, GENERIC_WRITE, 0, nullptr, CREATE_ALWAYS,
+ FILE_ATTRIBUTE_NORMAL, nullptr);
+#elif defined(XP_UNIX)
+ mFD = sys_open(aPath, O_WRONLY | O_CREAT | O_TRUNC, 0600);
+#endif
+ }
+
+ void OpenHandle(FileHandle aFD) { mFD = aFD; }
+ bool Valid() { return mFD != kInvalidFileHandle; }
+
+ void WriteBuffer(const char* aBuffer, size_t aLen) {
+ if (!Valid()) {
+ return;
+ }
+
+ while (aLen-- > 0) {
+ WriteChar(*aBuffer++);
+ }
+ }
+
+ void WriteString(const char* aStr) { WriteBuffer(aStr, my_strlen(aStr)); }
+
+ template <int N>
+ void WriteLiteral(const char (&aStr)[N]) {
+ WriteBuffer(aStr, N - 1);
+ }
+
+ FileHandle FileDesc() { return mFD; }
+
+ private:
+ PlatformWriter(const PlatformWriter&) = delete;
+
+ const PlatformWriter& operator=(const PlatformWriter&) = delete;
+
+ void WriteChar(char aChar) {
+ if (mPos == kBufferSize) {
+ Flush();
+ }
+
+ mBuffer[mPos++] = aChar;
+ }
+
+ void Flush() {
+ if (mPos > 0) {
+ char* buffer = mBuffer;
+ size_t length = mPos;
+ while (length > 0) {
+#ifdef XP_WIN
+ DWORD written_bytes = 0;
+ if (!WriteFile(mFD, buffer, length, &written_bytes, nullptr)) {
+ break;
+ }
+#elif defined(XP_UNIX)
+ ssize_t written_bytes = sys_write(mFD, buffer, length);
+ if (written_bytes < 0) {
+ if (errno == EAGAIN) {
+ continue;
+ }
+
+ break;
+ }
+#endif
+ buffer += written_bytes;
+ length -= written_bytes;
+ }
+
+ mPos = 0;
+ }
+ }
+
+ static const size_t kBufferSize = 512;
+
+ char mBuffer[kBufferSize];
+ size_t mPos;
+ FileHandle mFD;
+};
+
+class JSONAnnotationWriter : public AnnotationWriter {
+ public:
+ explicit JSONAnnotationWriter(PlatformWriter& aPlatformWriter)
+ : mWriter(aPlatformWriter), mEmpty(true) {
+ mWriter.WriteBuffer("{", 1);
+ }
+
+ ~JSONAnnotationWriter() { mWriter.WriteBuffer("}", 1); }
+
+ void Write(Annotation aAnnotation, const char* aValue,
+ size_t aLen = 0) override {
+ size_t len = aLen ? aLen : my_strlen(aValue);
+ const char* annotationStr = AnnotationToString(aAnnotation);
+
+ WritePrefix();
+ mWriter.WriteBuffer(annotationStr, my_strlen(annotationStr));
+ WriteSeparator();
+ WriteEscapedString(aValue, len);
+ WriteSuffix();
+ };
+
+ void Write(Annotation aAnnotation, uint64_t aValue) override {
+ char buffer[32] = {};
+ XP_STOA(aValue, buffer);
+ Write(aAnnotation, buffer);
+ };
+
+ private:
+ void WritePrefix() {
+ if (mEmpty) {
+ mWriter.WriteBuffer("\"", 1);
+ mEmpty = false;
+ } else {
+ mWriter.WriteBuffer(",\"", 2);
+ }
+ }
+
+ void WriteSeparator() { mWriter.WriteBuffer("\":\"", 3); }
+ void WriteSuffix() { mWriter.WriteBuffer("\"", 1); }
+ void WriteEscapedString(const char* aStr, size_t aLen) {
+ for (size_t i = 0; i < aLen; i++) {
+ uint8_t c = aStr[i];
+ if (c <= 0x1f || c == '\\' || c == '\"') {
+ mWriter.WriteBuffer("\\u00", 4);
+ WriteHexDigitAsAsciiChar((c & 0x00f0) >> 4);
+ WriteHexDigitAsAsciiChar(c & 0x000f);
+ } else {
+ mWriter.WriteBuffer(aStr + i, 1);
+ }
+ }
+ }
+
+ void WriteHexDigitAsAsciiChar(uint8_t u) {
+ char buf[1];
+ buf[0] = static_cast<unsigned>((u < 10) ? '0' + u : 'a' + (u - 10));
+ mWriter.WriteBuffer(buf, 1);
+ }
+
+ PlatformWriter& mWriter;
+ bool mEmpty;
+};
+
+class BinaryAnnotationWriter : public AnnotationWriter {
+ public:
+ explicit BinaryAnnotationWriter(PlatformWriter& aPlatformWriter)
+ : mPlatformWriter(aPlatformWriter) {}
+
+ void Write(Annotation aAnnotation, const char* aValue,
+ size_t aLen = 0) override {
+ uint64_t len = aLen ? aLen : my_strlen(aValue);
+ mPlatformWriter.WriteBuffer((const char*)&aAnnotation, sizeof(aAnnotation));
+ mPlatformWriter.WriteBuffer((const char*)&len, sizeof(len));
+ mPlatformWriter.WriteBuffer(aValue, len);
+ };
+
+ void Write(Annotation aAnnotation, uint64_t aValue) override {
+ char buffer[32] = {};
+ XP_STOA(aValue, buffer);
+ Write(aAnnotation, buffer);
+ };
+
+ private:
+ PlatformWriter& mPlatformWriter;
+};
+
+#ifdef MOZ_PHC
+// The stack traces are encoded as a comma-separated list of decimal
+// (not hexadecimal!) addresses, e.g. "12345678,12345679,12345680".
+static void WritePHCStackTrace(AnnotationWriter& aWriter,
+ const Annotation aName,
+ const Maybe<phc::StackTrace>& aStack) {
+ if (aStack.isNothing()) {
+ return;
+ }
+
+ // 21 is the max length of a 64-bit decimal address entry, including the
+ // trailing comma or '\0'. And then we add another 32 just to be safe.
+ char addrsString[mozilla::phc::StackTrace::kMaxFrames * 21 + 32];
+ char addrString[32];
+ char* p = addrsString;
+ *p = 0;
+ for (size_t i = 0; i < aStack->mLength; i++) {
+ if (i != 0) {
+ strcat(addrsString, ",");
+ p++;
+ }
+ XP_STOA(uintptr_t(aStack->mPcs[i]), addrString);
+ strcat(addrsString, addrString);
+ }
+ aWriter.Write(aName, addrsString);
+}
+
+static void WritePHCAddrInfo(AnnotationWriter& writer,
+ const phc::AddrInfo* aAddrInfo) {
+ // Is this a PHC allocation needing special treatment?
+ if (aAddrInfo && aAddrInfo->mKind != phc::AddrInfo::Kind::Unknown) {
+ const char* kindString;
+ switch (aAddrInfo->mKind) {
+ case phc::AddrInfo::Kind::Unknown:
+ kindString = "Unknown(?!)";
+ break;
+ case phc::AddrInfo::Kind::NeverAllocatedPage:
+ kindString = "NeverAllocatedPage";
+ break;
+ case phc::AddrInfo::Kind::InUsePage:
+ kindString = "InUsePage(?!)";
+ break;
+ case phc::AddrInfo::Kind::FreedPage:
+ kindString = "FreedPage";
+ break;
+ case phc::AddrInfo::Kind::GuardPage:
+ kindString = "GuardPage";
+ break;
+ default:
+ kindString = "Unmatched(?!)";
+ break;
+ }
+ writer.Write(Annotation::PHCKind, kindString);
+ writer.Write(Annotation::PHCBaseAddress, uintptr_t(aAddrInfo->mBaseAddr));
+ writer.Write(Annotation::PHCUsableSize, aAddrInfo->mUsableSize);
+
+ WritePHCStackTrace(writer, Annotation::PHCAllocStack,
+ aAddrInfo->mAllocStack);
+ WritePHCStackTrace(writer, Annotation::PHCFreeStack, aAddrInfo->mFreeStack);
+ }
+}
+#endif
+
+/**
+ * If minidump_id is null, we assume that dump_path contains the full
+ * dump file path.
+ */
+static void OpenAPIData(PlatformWriter& aWriter, const XP_CHAR* dump_path,
+ const XP_CHAR* minidump_id = nullptr) {
+ static XP_CHAR extraDataPath[XP_PATH_MAX];
+ size_t size = XP_PATH_MAX;
+ XP_CHAR* p;
+ if (minidump_id) {
+ p = Concat(extraDataPath, dump_path, &size);
+ p = Concat(p, XP_PATH_SEPARATOR, &size);
+ p = Concat(p, minidump_id, &size);
+ } else {
+ p = Concat(extraDataPath, dump_path, &size);
+ // Skip back past the .dmp extension, if any.
+ if (*(p - 4) == XP_TEXT('.')) {
+ p -= 4;
+ size += 4;
+ }
+ }
+ Concat(p, extraFileExtension, &size);
+ aWriter.Open(extraDataPath);
+}
+
+#ifdef XP_WIN
+static void AnnotateMemoryStatus(AnnotationWriter& aWriter) {
+ MEMORYSTATUSEX statex;
+ statex.dwLength = sizeof(statex);
+ if (GlobalMemoryStatusEx(&statex)) {
+ aWriter.Write(Annotation::SystemMemoryUsePercentage, statex.dwMemoryLoad);
+ aWriter.Write(Annotation::TotalVirtualMemory, statex.ullTotalVirtual);
+ aWriter.Write(Annotation::AvailableVirtualMemory, statex.ullAvailVirtual);
+ aWriter.Write(Annotation::TotalPhysicalMemory, statex.ullTotalPhys);
+ aWriter.Write(Annotation::AvailablePhysicalMemory, statex.ullAvailPhys);
+ }
+
+ PERFORMANCE_INFORMATION info;
+ if (K32GetPerformanceInfo(&info, sizeof(info))) {
+ aWriter.Write(Annotation::TotalPageFile, info.CommitLimit * info.PageSize);
+ aWriter.Write(Annotation::AvailablePageFile,
+ (info.CommitLimit - info.CommitTotal) * info.PageSize);
+ }
+}
+#elif XP_MACOSX
+// Extract the total physical memory of the system.
+static void WritePhysicalMemoryStatus(AnnotationWriter& aWriter) {
+ uint64_t physicalMemoryByteSize = 0;
+ const size_t NAME_LEN = 2;
+ int name[NAME_LEN] = {/* Hardware */ CTL_HW,
+ /* 64-bit physical memory size */ HW_MEMSIZE};
+ size_t infoByteSize = sizeof(physicalMemoryByteSize);
+ if (sysctl(name, NAME_LEN, &physicalMemoryByteSize, &infoByteSize,
+ /* We do not replace data */ nullptr,
+ /* We do not replace data */ 0) != -1) {
+ aWriter.Write(Annotation::TotalPhysicalMemory, physicalMemoryByteSize);
+ }
+}
+
+// Extract available and purgeable physical memory.
+static void WriteAvailableMemoryStatus(AnnotationWriter& aWriter) {
+ auto host = mach_host_self();
+ vm_statistics64_data_t stats;
+ unsigned int count = HOST_VM_INFO64_COUNT;
+ if (host_statistics64(host, HOST_VM_INFO64, (host_info64_t)&stats, &count) ==
+ KERN_SUCCESS) {
+ aWriter.Write(Annotation::AvailablePhysicalMemory,
+ stats.free_count * vm_page_size);
+ aWriter.Write(Annotation::PurgeablePhysicalMemory,
+ stats.purgeable_count * vm_page_size);
+ }
+}
+
+// Extract the status of the swap.
+static void WriteSwapFileStatus(AnnotationWriter& aWriter) {
+ const size_t NAME_LEN = 2;
+ int name[] = {/* Hardware */ CTL_VM,
+ /* 64-bit physical memory size */ VM_SWAPUSAGE};
+ struct xsw_usage swapUsage;
+ size_t infoByteSize = sizeof(swapUsage);
+ if (sysctl(name, NAME_LEN, &swapUsage, &infoByteSize,
+ /* We do not replace data */ nullptr,
+ /* We do not replace data */ 0) != -1) {
+ aWriter.Write(Annotation::AvailableSwapMemory, swapUsage.xsu_avail);
+ }
+}
+static void AnnotateMemoryStatus(AnnotationWriter& aWriter) {
+ WritePhysicalMemoryStatus(aWriter);
+ WriteAvailableMemoryStatus(aWriter);
+ WriteSwapFileStatus(aWriter);
+}
+
+#elif XP_LINUX
+
+static void AnnotateMemoryStatus(AnnotationWriter& aWriter) {
+ // We can't simply call `sysinfo` as this requires libc.
+ // So we need to parse /proc/meminfo.
+
+ // We read the entire file to memory prior to parsing
+ // as it makes the parser code a little bit simpler.
+ // As /proc/meminfo is synchronized via `proc_create_single`,
+ // there's no risk of race condition regardless of how we
+ // read it.
+
+ // The buffer in which we're going to load the entire file.
+ // A typical size for /proc/meminfo is 1KiB, so 4KiB should
+ // be large enough until further notice.
+ const size_t BUFFER_SIZE_BYTES = 4096;
+ char buffer[BUFFER_SIZE_BYTES];
+
+ size_t bufferLen = 0;
+ {
+ // Read and load into memory.
+ int fd = sys_open("/proc/meminfo", O_RDONLY, /* chmod */ 0);
+ if (fd == -1) {
+ // No /proc/meminfo? Well, fail silently.
+ return;
+ }
+ auto Guard = MakeScopeExit([fd]() { mozilla::Unused << sys_close(fd); });
+
+ ssize_t bytesRead = 0;
+ do {
+ if ((bytesRead = sys_read(fd, buffer + bufferLen,
+ BUFFER_SIZE_BYTES - bufferLen)) < 0) {
+ if ((errno == EAGAIN) || (errno == EINTR)) {
+ continue;
+ }
+
+ // Cannot read for some reason. Let's give up.
+ return;
+ }
+
+ bufferLen += bytesRead;
+
+ if (bufferLen == BUFFER_SIZE_BYTES) {
+ // The file is too large, bail out
+ return;
+ }
+ } while (bytesRead != 0);
+ }
+
+ // Each line of /proc/meminfo looks like
+ // SomeLabel: number unit
+ // The last line is empty.
+ // Let's write a parser.
+ // Note that we don't care about writing a normative parser, so
+ // we happily skip whitespaces without checking that it's necessary.
+
+ // A stack-allocated structure containing a 0-terminated string.
+ // We could avoid the memory copies and make it a slice at the cost
+ // of a slightly more complicated parser. Since we're not in a
+ // performance-critical section, we didn't.
+ struct DataBuffer {
+ DataBuffer() : data{0}, pos(0) {}
+ // Clear the buffer.
+ void reset() {
+ pos = 0;
+ data[0] = 0;
+ }
+ // Append a character.
+ //
+ // In case of error (if c is '\0' or the buffer is full), does nothing.
+ void append(char c) {
+ if (c == 0 || pos >= sizeof(data) - 1) {
+ return;
+ }
+ data[pos++] = c;
+ data[pos] = 0;
+ }
+ // Compare the buffer against a nul-terminated string.
+ bool operator==(const char* s) const {
+ for (size_t i = 0; i < pos; ++i) {
+ if (s[i] != data[i]) {
+ // Note: Since `data` never contains a '0' in positions [0,pos)
+ // this will bailout once we have reached the end of `s`.
+ return false;
+ }
+ }
+ return true;
+ }
+
+ // A NUL-terminated string of `pos + 1` chars (the +1 is for the 0).
+ char data[256];
+
+ // Invariant: < 256.
+ size_t pos;
+ };
+
+ // A DataBuffer holding the string representation of a non-negative number.
+ struct NumberBuffer : DataBuffer {
+ // If possible, convert the string into a number.
+ // Returns `true` in case of success, `false` in case of failure.
+ bool asNumber(size_t* number) {
+ int result;
+ if (!my_strtoui(&result, data)) {
+ return false;
+ }
+ *number = result;
+ return true;
+ }
+ };
+
+ // A DataBuffer holding the string representation of a unit. As of this
+ // writing, we only support unit `kB`, which seems to be the only unit used in
+ // `/proc/meminfo`.
+ struct UnitBuffer : DataBuffer {
+ // If possible, convert the string into a multiplier, e.g. `kB => 1024`.
+ // Return `true` in case of success, `false` in case of failure.
+ bool asMultiplier(size_t* multiplier) {
+ if (*this == "kB") {
+ *multiplier = 1024;
+ return true;
+ }
+ // Other units don't seem to be specified/used.
+ return false;
+ }
+ };
+
+ // The state of the mini-parser.
+ enum class State {
+ // Reading the label, including the trailing ':'.
+ Label,
+ // Reading the number, ignoring any whitespace.
+ Number,
+ // Reading the unit, ignoring any whitespace.
+ Unit,
+ };
+
+ // A single measure being read from /proc/meminfo, e.g.
+ // the total physical memory available on the system.
+ struct Measure {
+ Measure() : state(State::Label) {}
+ // Reset the measure for a new read.
+ void reset() {
+ state = State::Label;
+ label.reset();
+ number.reset();
+ unit.reset();
+ }
+ // Attempt to convert the measure into a number.
+ // Return `true` if both the number and the multiplier could be
+ // converted, `false` otherwise.
+ // In case of overflow, produces the maximal possible `size_t`.
+ bool asValue(size_t* result) {
+ size_t numberAsSize = 0;
+ if (!number.asNumber(&numberAsSize)) {
+ return false;
+ }
+ size_t unitAsMultiplier = 0;
+ if (!unit.asMultiplier(&unitAsMultiplier)) {
+ return false;
+ }
+ if (numberAsSize * unitAsMultiplier >= numberAsSize) {
+ *result = numberAsSize * unitAsMultiplier;
+ } else {
+ // Overflow. Unlikely, but just in case, let's return
+ // the maximal possible value.
+ *result = size_t(-1);
+ }
+ return true;
+ }
+
+ // The label being read, e.g. `MemFree`. Does not include the trailing ':'.
+ DataBuffer label;
+
+ // The number being read, e.g. "1024".
+ NumberBuffer number;
+
+ // The unit being read, e.g. "kB".
+ UnitBuffer unit;
+
+ // What we're reading at the moment.
+ State state;
+ };
+
+ // A value we wish to store for later processing.
+ // e.g. to compute `AvailablePageFile`, we need to
+ // store `CommitLimit` and `Committed_AS`.
+ struct ValueStore {
+ ValueStore() : value(0), found(false) {}
+ size_t value;
+ bool found;
+ };
+ ValueStore commitLimit;
+ ValueStore committedAS;
+ ValueStore memTotal;
+ ValueStore swapTotal;
+
+ // The current measure.
+ Measure measure;
+
+ for (size_t pos = 0; pos < size_t(bufferLen); ++pos) {
+ const char c = buffer[pos];
+ switch (measure.state) {
+ case State::Label:
+ if (c == ':') {
+ // We have finished reading the label.
+ measure.state = State::Number;
+ } else {
+ measure.label.append(c);
+ }
+ break;
+ case State::Number:
+ if (c == ' ') {
+ // Ignore whitespace
+ } else if ('0' <= c && c <= '9') {
+ // Accumulate numbers.
+ measure.number.append(c);
+ } else {
+ // We have jumped to the unit.
+ measure.unit.append(c);
+ measure.state = State::Unit;
+ }
+ break;
+ case State::Unit:
+ if (c == ' ') {
+ // Ignore whitespace
+ } else if (c == '\n') {
+ // Flush line.
+ // - If this one of the measures we're interested in, write it.
+ // - Once we're done, reset the parser.
+ auto Guard = MakeScopeExit([&measure]() { measure.reset(); });
+
+ struct PointOfInterest {
+ // The label we're looking for, e.g. "MemTotal".
+ const char* label;
+ // If non-nullptr, store the value at this address.
+ ValueStore* dest;
+ // If other than Annotation::Count, write the value for this
+ // annotation.
+ Annotation annotation;
+ };
+ const PointOfInterest POINTS_OF_INTEREST[] = {
+ {"MemTotal", &memTotal, Annotation::TotalPhysicalMemory},
+ {"MemFree", nullptr, Annotation::AvailablePhysicalMemory},
+ {"MemAvailable", nullptr, Annotation::AvailableVirtualMemory},
+ {"SwapFree", nullptr, Annotation::AvailableSwapMemory},
+ {"SwapTotal", &swapTotal, Annotation::Count},
+ {"CommitLimit", &commitLimit, Annotation::Count},
+ {"Committed_AS", &committedAS, Annotation::Count},
+ };
+ for (const auto& pointOfInterest : POINTS_OF_INTEREST) {
+ if (measure.label == pointOfInterest.label) {
+ size_t value;
+ if (measure.asValue(&value)) {
+ if (pointOfInterest.dest != nullptr) {
+ pointOfInterest.dest->found = true;
+ pointOfInterest.dest->value = value;
+ }
+ if (pointOfInterest.annotation != Annotation::Count) {
+ aWriter.Write(pointOfInterest.annotation, value);
+ }
+ }
+ break;
+ }
+ }
+ // Otherwise, ignore.
+ } else {
+ measure.unit.append(c);
+ }
+ break;
+ }
+ }
+
+ if (commitLimit.found && committedAS.found) {
+ // If available, attempt to determine the available virtual memory.
+ // As `commitLimit` is not guaranteed to be larger than `committedAS`,
+ // we return `0` in case the commit limit has already been exceeded.
+ uint64_t availablePageFile = (committedAS.value <= commitLimit.value)
+ ? (commitLimit.value - committedAS.value)
+ : 0;
+ aWriter.Write(Annotation::AvailablePageFile, availablePageFile);
+ }
+ if (memTotal.found && swapTotal.found) {
+ // If available, attempt to determine the available virtual memory.
+ aWriter.Write(Annotation::TotalPageFile, memTotal.value + swapTotal.value);
+ }
+}
+
+#else
+
+static void AnnotateMemoryStatus(AnnotationTable&) {
+ // No memory data for other platforms yet.
+}
+
+#endif // XP_WIN || XP_MACOSX || XP_LINUX || else
+
+#if !defined(MOZ_WIDGET_ANDROID)
+
+/**
+ * Launches the program specified in aProgramPath with aMinidumpPath as its
+ * sole argument.
+ *
+ * @param aProgramPath The path of the program to be launched
+ * @param aMinidumpPath The path of the minidump file, passed as an argument
+ * to the launched program
+ */
+static bool LaunchProgram(const XP_CHAR* aProgramPath,
+ const XP_CHAR* aMinidumpPath) {
+# ifdef XP_WIN
+ XP_CHAR cmdLine[CMDLINE_SIZE];
+ XP_CHAR* p;
+
+ size_t size = CMDLINE_SIZE;
+ p = Concat(cmdLine, L"\"", &size);
+ p = Concat(p, aProgramPath, &size);
+ p = Concat(p, L"\" \"", &size);
+ p = Concat(p, aMinidumpPath, &size);
+ Concat(p, L"\"", &size);
+
+ PROCESS_INFORMATION pi = {};
+ STARTUPINFO si = {};
+ si.cb = sizeof(si);
+
+ // If CreateProcess() fails don't do anything.
+ if (CreateProcess(
+ /* lpApplicationName */ nullptr, (LPWSTR)cmdLine,
+ /* lpProcessAttributes */ nullptr, /* lpThreadAttributes */ nullptr,
+ /* bInheritHandles */ FALSE,
+ NORMAL_PRIORITY_CLASS | CREATE_NO_WINDOW | CREATE_BREAKAWAY_FROM_JOB,
+ /* lpEnvironment */ nullptr, /* lpCurrentDirectory */ nullptr, &si,
+ &pi)) {
+ CloseHandle(pi.hProcess);
+ CloseHandle(pi.hThread);
+ }
+# elif defined(XP_MACOSX)
+ pid_t pid = 0;
+ char* const my_argv[] = {const_cast<char*>(aProgramPath),
+ const_cast<char*>(aMinidumpPath), nullptr};
+
+ char** env = nullptr;
+ char*** nsEnv = _NSGetEnviron();
+ if (nsEnv) {
+ env = *nsEnv;
+ }
+
+ int rv = posix_spawnp(&pid, my_argv[0], nullptr, nullptr, my_argv, env);
+
+ if (rv != 0) {
+ return false;
+ }
+# else // !XP_MACOSX
+ pid_t pid = sys_fork();
+
+ if (pid == -1) {
+ return false;
+ } else if (pid == 0) {
+ Unused << execl(aProgramPath, aProgramPath, aMinidumpPath, nullptr);
+ _exit(1);
+ }
+# endif // XP_MACOSX
+
+ return true;
+}
+
+#else
+
+/**
+ * Launch the crash reporter activity on Android
+ *
+ * @param aProgramPath The path of the program to be launched
+ * @param aMinidumpPath The path to the crash minidump file
+ */
+
+static bool LaunchCrashHandlerService(const XP_CHAR* aProgramPath,
+ const XP_CHAR* aMinidumpPath) {
+ static XP_CHAR extrasPath[XP_PATH_MAX];
+ size_t size = XP_PATH_MAX;
+
+ XP_CHAR* p = Concat(extrasPath, aMinidumpPath, &size);
+ p = Concat(p - 3, "extra", &size);
+
+ pid_t pid = sys_fork();
+
+ if (pid == -1)
+ return false;
+ else if (pid == 0) {
+ // Invoke the crash handler service using am
+ if (androidUserSerial) {
+ Unused << execlp("/system/bin/am", "/system/bin/am",
+ androidStartServiceCommand, "--user", androidUserSerial,
+ "-a", "org.mozilla.gecko.ACTION_CRASHED", "-n",
+ aProgramPath, "--es", "minidumpPath", aMinidumpPath,
+ "--es", "extrasPath", extrasPath, "--ez", "fatal",
+ "true", "--es", "processType", "MAIN", (char*)0);
+ } else {
+ Unused << execlp(
+ "/system/bin/am", "/system/bin/am", androidStartServiceCommand, "-a",
+ "org.mozilla.gecko.ACTION_CRASHED", "-n", aProgramPath, "--es",
+ "minidumpPath", aMinidumpPath, "--es", "extrasPath", extrasPath,
+ "--ez", "fatal", "true", "--es", "processType", "MAIN", (char*)0);
+ }
+ _exit(1);
+
+ } else {
+ // We need to wait on the 'am start' command above to finish, otherwise
+ // everything will be killed by the ActivityManager as soon as the signal
+ // handler exits
+ int status;
+ Unused << HANDLE_EINTR(sys_waitpid(pid, &status, __WALL));
+ }
+
+ return true;
+}
+
+#endif
+
+static void WriteMainThreadRunnableName(AnnotationWriter& aWriter) {
+#ifdef MOZ_COLLECTING_RUNNABLE_TELEMETRY
+ // Only try to collect this information if the main thread is crashing.
+ if (!SignalSafeIsMainThread()) {
+ return;
+ }
+
+ // NOTE: Use `my_memchr` over `strlen` to ensure we don't run off the end of
+ // the buffer if it contains no null bytes. This is used instead of `strnlen`,
+ // as breakpad's linux support library doesn't export a `my_strnlen` function.
+ const char* buf = nsThread::sMainThreadRunnableName.begin();
+ size_t len = nsThread::kRunnableNameBufSize;
+ if (const void* end = my_memchr(buf, '\0', len)) {
+ len = static_cast<const char*>(end) - buf;
+ }
+
+ if (len > 0) {
+ aWriter.Write(Annotation::MainThreadRunnableName, buf, len);
+ }
+#endif
+}
+
+static void WriteOOMAllocationSize(AnnotationWriter& aWriter) {
+ if (gOOMAllocationSize) {
+ aWriter.Write(Annotation::OOMAllocationSize, gOOMAllocationSize);
+ }
+}
+
+static void WriteMozCrashReason(AnnotationWriter& aWriter) {
+ if (gMozCrashReason != nullptr) {
+ aWriter.Write(Annotation::MozCrashReason, gMozCrashReason);
+ }
+}
+
+static void WriteAnnotations(AnnotationWriter& aWriter,
+ const AnnotationTable& aAnnotations) {
+ for (auto key : MakeEnumeratedRange(Annotation::Count)) {
+ const nsCString& value = aAnnotations[key];
+ if (!value.IsEmpty()) {
+ aWriter.Write(key, value.get(), value.Length());
+ }
+ }
+}
+
+static void WriteSynthesizedAnnotations(AnnotationWriter& aWriter) {
+ AnnotateMemoryStatus(aWriter);
+}
+
+static void WriteAnnotationsForMainProcessCrash(PlatformWriter& pw,
+ const phc::AddrInfo* addrInfo,
+ time_t crashTime) {
+ JSONAnnotationWriter writer(pw);
+ WriteAnnotations(writer, crashReporterAPIData_Table);
+ WriteSynthesizedAnnotations(writer);
+ writer.Write(Annotation::CrashTime, uint64_t(crashTime));
+
+ if (inactiveStateStart) {
+ writer.Write(Annotation::LastInteractionDuration,
+ crashTime - inactiveStateStart);
+ }
+
+ double uptimeTS = (TimeStamp::NowLoRes() - TimeStamp::ProcessCreation())
+ .ToSecondsSigDigits();
+ char uptimeTSString[64] = {};
+ SimpleNoCLibDtoA(uptimeTS, uptimeTSString, sizeof(uptimeTSString));
+ writer.Write(Annotation::UptimeTS, uptimeTSString);
+
+ // calculate time since last crash (if possible).
+ if (lastCrashTime != 0) {
+ uint64_t timeSinceLastCrash = crashTime - lastCrashTime;
+
+ if (timeSinceLastCrash != 0) {
+ writer.Write(Annotation::SecondsSinceLastCrash, timeSinceLastCrash);
+ }
+ }
+
+ if (isGarbageCollecting) {
+ writer.Write(Annotation::IsGarbageCollecting, "1");
+ }
+
+ if (eventloopNestingLevel > 0) {
+ writer.Write(Annotation::EventLoopNestingLevel, eventloopNestingLevel);
+ }
+
+#if defined(XP_WIN) && defined(HAS_DLL_BLOCKLIST)
+ // HACK: The DLL blocklist code will manually write its annotations as JSON
+ DllBlocklist_WriteNotes(writer);
+#endif // defined(XP_WIN) && defined(HAS_DLL_BLOCKLIST)
+
+ WriteMozCrashReason(writer);
+
+ WriteMainThreadRunnableName(writer);
+
+ WriteOOMAllocationSize(writer);
+
+ if (gTexturesSize) {
+ writer.Write(Annotation::TextureUsage, gTexturesSize);
+ }
+
+#ifdef MOZ_PHC
+ WritePHCAddrInfo(writer, addrInfo);
+#endif
+}
+
+static void WriteCrashEventFile(time_t crashTime, const char* crashTimeString,
+ const phc::AddrInfo* addrInfo,
+#ifdef XP_LINUX
+ const MinidumpDescriptor& descriptor
+#else
+ const XP_CHAR* minidump_id
+#endif
+) {
+ // Minidump IDs are UUIDs (36) + NULL.
+ static char id_ascii[37] = {};
+#ifdef XP_LINUX
+ const char* index = strrchr(descriptor.path(), '/');
+ MOZ_ASSERT(index);
+ MOZ_ASSERT(strlen(index) == 1 + 36 + 4); // "/" + UUID + ".dmp"
+ for (uint32_t i = 0; i < 36; i++) {
+ id_ascii[i] = *(index + 1 + i);
+ }
+#else
+ MOZ_ASSERT(XP_STRLEN(minidump_id) == 36);
+ for (uint32_t i = 0; i < 36; i++) {
+ id_ascii[i] = *((char*)(minidump_id + i));
+ }
+#endif
+
+ PlatformWriter eventFile;
+
+ if (!eventsDirectory.empty()) {
+ static XP_CHAR crashEventPath[XP_PATH_MAX];
+ size_t size = XP_PATH_MAX;
+ XP_CHAR* p;
+ p = Concat(crashEventPath, eventsDirectory.c_str(), &size);
+ p = Concat(p, XP_PATH_SEPARATOR, &size);
+#ifdef XP_LINUX
+ Concat(p, id_ascii, &size);
+#else
+ Concat(p, minidump_id, &size);
+#endif
+
+ eventFile.Open(crashEventPath);
+ eventFile.WriteLiteral(kCrashMainID);
+ eventFile.WriteString(crashTimeString);
+ eventFile.WriteLiteral("\n");
+ eventFile.WriteString(id_ascii);
+ eventFile.WriteLiteral("\n");
+ WriteAnnotationsForMainProcessCrash(eventFile, addrInfo, crashTime);
+ }
+}
+
+// Callback invoked from breakpad's exception handler, this writes out the
+// last annotations after a crash occurs and launches the crash reporter client.
+//
+// This function is not declared static even though it's not used outside of
+// this file because of an issue in Fennec which prevents breakpad's exception
+// handler from invoking it. See bug 1424304.
+bool MinidumpCallback(
+#ifdef XP_LINUX
+ const MinidumpDescriptor& descriptor,
+#else
+ const XP_CHAR* dump_path, const XP_CHAR* minidump_id,
+#endif
+ void* context,
+#ifdef XP_WIN
+ EXCEPTION_POINTERS* exinfo, MDRawAssertionInfo* assertion,
+#endif
+ const phc::AddrInfo* addrInfo, bool succeeded) {
+ bool returnValue = showOSCrashReporter ? false : succeeded;
+
+ static XP_CHAR minidumpPath[XP_PATH_MAX];
+ size_t size = XP_PATH_MAX;
+ XP_CHAR* p;
+#ifndef XP_LINUX
+ p = Concat(minidumpPath, dump_path, &size);
+ p = Concat(p, XP_PATH_SEPARATOR, &size);
+ p = Concat(p, minidump_id, &size);
+ Concat(p, dumpFileExtension, &size);
+#else
+ Concat(minidumpPath, descriptor.path(), &size);
+#endif
+
+ static XP_CHAR memoryReportLocalPath[XP_PATH_MAX];
+ size = XP_PATH_MAX;
+#ifndef XP_LINUX
+ p = Concat(memoryReportLocalPath, dump_path, &size);
+ p = Concat(p, XP_PATH_SEPARATOR, &size);
+ p = Concat(p, minidump_id, &size);
+#else
+ p = Concat(memoryReportLocalPath, descriptor.path(), &size);
+ // Skip back past the .dmp extension
+ p -= 4;
+#endif
+ Concat(p, memoryReportExtension, &size);
+
+ if (!memoryReportPath.empty()) {
+#ifdef XP_WIN
+ CopyFile(memoryReportPath.c_str(), memoryReportLocalPath, false);
+#else
+ copy_file(memoryReportPath.c_str(), memoryReportLocalPath);
+#endif
+ }
+
+ time_t crashTime = GetCurrentTimeForCrashTime();
+ char crashTimeString[32];
+ XP_TTOA(crashTime, crashTimeString);
+
+ // write crash time to file
+ if (lastCrashTimeFilename[0] != 0) {
+ PlatformWriter lastCrashFile(lastCrashTimeFilename);
+ lastCrashFile.WriteString(crashTimeString);
+ }
+
+ WriteCrashEventFile(crashTime, crashTimeString, addrInfo,
+#ifdef XP_LINUX
+ descriptor
+#else
+ minidump_id
+#endif
+ );
+
+ {
+ PlatformWriter apiData;
+#ifdef XP_LINUX
+ OpenAPIData(apiData, descriptor.path());
+#else
+ OpenAPIData(apiData, dump_path, minidump_id);
+#endif
+ WriteAnnotationsForMainProcessCrash(apiData, addrInfo, crashTime);
+ }
+
+ if (doReport && isSafeToDump) {
+ // We launch the crash reporter client/dialog only if we've been explicitly
+ // asked to report crashes and if we weren't already trying to unset the
+ // exception handler (which is indicated by isSafeToDump being false).
+#if defined(MOZ_WIDGET_ANDROID) // Android
+ returnValue =
+ LaunchCrashHandlerService(crashReporterPath.c_str(), minidumpPath);
+#else // Windows, Mac, Linux, etc...
+ returnValue = LaunchProgram(crashReporterPath.c_str(), minidumpPath);
+#endif
+ }
+
+#ifdef XP_WIN
+ TerminateProcess(GetCurrentProcess(), 1);
+#endif
+
+ return returnValue;
+}
+
+#if defined(XP_MACOSX) || defined(__ANDROID__) || defined(XP_LINUX)
+static size_t EnsureTrailingSlash(XP_CHAR* aBuf, size_t aBufLen) {
+ size_t len = XP_STRLEN(aBuf);
+ if ((len + 1) < aBufLen && len > 0 &&
+ aBuf[len - 1] != XP_PATH_SEPARATOR_CHAR) {
+ aBuf[len] = XP_PATH_SEPARATOR_CHAR;
+ ++len;
+ aBuf[len] = 0;
+ }
+ return len;
+}
+#endif
+
+#if defined(XP_WIN)
+
+static size_t BuildTempPath(wchar_t* aBuf, size_t aBufLen) {
+ // first figure out buffer size
+ DWORD pathLen = GetTempPath(0, nullptr);
+ if (pathLen == 0 || pathLen >= aBufLen) {
+ return 0;
+ }
+
+ return GetTempPath(pathLen, aBuf);
+}
+
+static size_t BuildTempPath(char16_t* aBuf, size_t aBufLen) {
+ return BuildTempPath(reinterpret_cast<wchar_t*>(aBuf), aBufLen);
+}
+
+#elif defined(XP_MACOSX)
+
+static size_t BuildTempPath(char* aBuf, size_t aBufLen) {
+ if (aBufLen < PATH_MAX) {
+ return 0;
+ }
+
+ FSRef fsRef;
+ OSErr err =
+ FSFindFolder(kUserDomain, kTemporaryFolderType, kCreateFolder, &fsRef);
+ if (err != noErr) {
+ return 0;
+ }
+
+ OSStatus status = FSRefMakePath(&fsRef, (UInt8*)aBuf, PATH_MAX);
+ if (status != noErr) {
+ return 0;
+ }
+
+ return EnsureTrailingSlash(aBuf, aBufLen);
+}
+
+#elif defined(__ANDROID__)
+
+static size_t BuildTempPath(char* aBuf, size_t aBufLen) {
+ // GeckoAppShell sets this in the environment
+ const char* tempenv = PR_GetEnv("TMPDIR");
+ if (!tempenv) {
+ return false;
+ }
+ size_t size = aBufLen;
+ Concat(aBuf, tempenv, &size);
+ return EnsureTrailingSlash(aBuf, aBufLen);
+}
+
+#elif defined(XP_UNIX)
+
+static size_t BuildTempPath(char* aBuf, size_t aBufLen) {
+ const char* tempenv = PR_GetEnv("TMPDIR");
+ const char* tmpPath = "/tmp/";
+ if (!tempenv) {
+ tempenv = tmpPath;
+ }
+ size_t size = aBufLen;
+ Concat(aBuf, tempenv, &size);
+ return EnsureTrailingSlash(aBuf, aBufLen);
+}
+
+#else
+# error "Implement this for your platform"
+#endif
+
+template <typename CharT, size_t N>
+static size_t BuildTempPath(CharT (&aBuf)[N]) {
+ static_assert(N >= XP_PATH_MAX, "char array length is too small");
+ return BuildTempPath(&aBuf[0], N);
+}
+
+template <typename PathStringT>
+static bool BuildTempPath(PathStringT& aResult) {
+ aResult.SetLength(XP_PATH_MAX);
+ size_t actualLen = BuildTempPath(aResult.BeginWriting(), XP_PATH_MAX);
+ if (!actualLen) {
+ return false;
+ }
+ aResult.SetLength(actualLen);
+ return true;
+}
+
+FileHandle GetAnnotationTimeCrashFd() { return gChildCrashAnnotationReportFd; }
+
+static void PrepareChildExceptionTimeAnnotations(
+ const phc::AddrInfo* addrInfo) {
+ MOZ_ASSERT(!XRE_IsParentProcess());
+
+ PlatformWriter apiData;
+ apiData.OpenHandle(GetAnnotationTimeCrashFd());
+ BinaryAnnotationWriter writer(apiData);
+
+ WriteMozCrashReason(writer);
+
+ WriteMainThreadRunnableName(writer);
+
+ WriteOOMAllocationSize(writer);
+
+#ifdef MOZ_PHC
+ WritePHCAddrInfo(writer, addrInfo);
+#endif
+
+ WriteAnnotations(writer, crashReporterAPIData_Table);
+}
+
+#ifdef XP_WIN
+
+static void ReserveBreakpadVM() {
+ if (!gBreakpadReservedVM) {
+ gBreakpadReservedVM =
+ VirtualAlloc(nullptr, kReserveSize, MEM_RESERVE, PAGE_NOACCESS);
+ }
+}
+
+static void FreeBreakpadVM() {
+ if (gBreakpadReservedVM) {
+ VirtualFree(gBreakpadReservedVM, 0, MEM_RELEASE);
+ }
+}
+
+static bool IsCrashingException(EXCEPTION_POINTERS* exinfo) {
+ if (!exinfo) {
+ return true;
+ }
+
+ PEXCEPTION_RECORD e = (PEXCEPTION_RECORD)exinfo->ExceptionRecord;
+ switch (e->ExceptionCode) {
+ case STATUS_FLOAT_DENORMAL_OPERAND:
+ case STATUS_FLOAT_DIVIDE_BY_ZERO:
+ case STATUS_FLOAT_INEXACT_RESULT:
+ case STATUS_FLOAT_INVALID_OPERATION:
+ case STATUS_FLOAT_OVERFLOW:
+ case STATUS_FLOAT_STACK_CHECK:
+ case STATUS_FLOAT_UNDERFLOW:
+ case STATUS_FLOAT_MULTIPLE_FAULTS:
+ case STATUS_FLOAT_MULTIPLE_TRAPS:
+ return false; // Don't write minidump, continue exception search
+ default:
+ return true;
+ }
+}
+
+#endif // XP_WIN
+
+// Do various actions to prepare the child process for minidump generation.
+// This includes disabling the I/O interposer and DLL blocklist which both
+// would get in the way. We also free the address space we had reserved in
+// 32-bit builds to free room for the minidump generation to do its work.
+static void PrepareForMinidump() {
+ mozilla::IOInterposer::Disable();
+#if defined(XP_WIN)
+# if defined(DEBUG) && defined(HAS_DLL_BLOCKLIST)
+ DllBlocklist_Shutdown();
+# endif
+ FreeBreakpadVM();
+#endif // XP_WIN
+}
+
+#ifdef XP_WIN
+
+/**
+ * Filters out floating point exceptions which are handled by nsSigHandlers.cpp
+ * and should not be handled as crashes.
+ */
+static ExceptionHandler::FilterResult Filter(void* context,
+ EXCEPTION_POINTERS* exinfo,
+ MDRawAssertionInfo* assertion) {
+ if (!IsCrashingException(exinfo)) {
+ return ExceptionHandler::FilterResult::ContinueSearch;
+ }
+
+ PrepareForMinidump();
+ return ExceptionHandler::FilterResult::HandleException;
+}
+
+static ExceptionHandler::FilterResult ChildFilter(
+ void* context, EXCEPTION_POINTERS* exinfo, MDRawAssertionInfo* assertion) {
+ if (!IsCrashingException(exinfo)) {
+ return ExceptionHandler::FilterResult::ContinueSearch;
+ }
+
+ if (gEncounteredChildException.exchange(true)) {
+ return ExceptionHandler::FilterResult::AbortWithoutMinidump;
+ }
+
+ PrepareForMinidump();
+ return ExceptionHandler::FilterResult::HandleException;
+}
+
+static MINIDUMP_TYPE GetMinidumpType() {
+ MINIDUMP_TYPE minidump_type = static_cast<MINIDUMP_TYPE>(
+ MiniDumpWithFullMemoryInfo | MiniDumpWithUnloadedModules);
+
+# ifdef NIGHTLY_BUILD
+ // This is Nightly only because this doubles the size of minidumps based
+ // on the experimental data.
+ minidump_type =
+ static_cast<MINIDUMP_TYPE>(minidump_type | MiniDumpWithProcessThreadData);
+
+ // dbghelp.dll on Win7 can't handle overlapping memory regions so we only
+ // enable this feature on Win8 or later.
+ if (IsWin8OrLater()) {
+ minidump_type = static_cast<MINIDUMP_TYPE>(
+ minidump_type |
+ // This allows us to examine heap objects referenced from stack objects
+ // at the cost of further doubling the size of minidumps.
+ MiniDumpWithIndirectlyReferencedMemory);
+ }
+# endif
+
+ const char* e = PR_GetEnv("MOZ_CRASHREPORTER_FULLDUMP");
+ if (e && *e) {
+ minidump_type = MiniDumpWithFullMemory;
+ }
+
+ return minidump_type;
+}
+
+#else
+
+static bool Filter(void* context) {
+ PrepareForMinidump();
+ return true;
+}
+
+static bool ChildFilter(void* context) {
+ if (gEncounteredChildException.exchange(true)) {
+ return false;
+ }
+
+ PrepareForMinidump();
+ return true;
+}
+
+#endif // !defined(XP_WIN)
+
+static bool ChildMinidumpCallback(
+#if defined(XP_WIN)
+ const wchar_t* dump_path, const wchar_t* minidump_id,
+#elif defined(XP_LINUX)
+ const MinidumpDescriptor& descriptor,
+#else // defined(XP_MACOSX)
+ const char* dump_dir, const char* minidump_id,
+#endif
+ void* context,
+#if defined(XP_WIN)
+ EXCEPTION_POINTERS* exinfo, MDRawAssertionInfo* assertion,
+#endif // defined(XP_WIN)
+ const mozilla::phc::AddrInfo* addr_info, bool succeeded) {
+
+ PrepareChildExceptionTimeAnnotations(addr_info);
+ return succeeded;
+}
+
+static bool ShouldReport() {
+ // this environment variable prevents us from launching
+ // the crash reporter client
+ const char* envvar = PR_GetEnv("MOZ_CRASHREPORTER_NO_REPORT");
+ if (envvar && *envvar) {
+ return false;
+ }
+
+ envvar = PR_GetEnv("MOZ_CRASHREPORTER_FULLDUMP");
+ if (envvar && *envvar) {
+ return false;
+ }
+
+ return true;
+}
+
+static void TerminateHandler() { MOZ_CRASH("Unhandled exception"); }
+
+#if !defined(MOZ_WIDGET_ANDROID)
+
+// Locate the specified executable and store its path as a native string in
+// the |aPath| so we can later invoke it from within the exception handler.
+static nsresult LocateExecutable(nsIFile* aXREDirectory, const nsAString& aName,
+ PathString& aPath) {
+ nsCOMPtr<nsIFile> exePath;
+ nsresult rv = aXREDirectory->Clone(getter_AddRefs(exePath));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+# ifdef XP_MACOSX
+ exePath->SetNativeLeafName("MacOS"_ns);
+ exePath->Append(u"crashreporter.app"_ns);
+ exePath->Append(u"Contents"_ns);
+ exePath->Append(u"MacOS"_ns);
+# endif
+
+ exePath->Append(aName);
+ aPath = exePath->NativePath();
+ return NS_OK;
+}
+
+#endif // !defined(MOZ_WIDGET_ANDROID)
+
+#if defined(XP_WIN)
+
+DWORD WINAPI FlushContentProcessAnnotationsThreadFunc(LPVOID aContext) {
+ PrepareChildExceptionTimeAnnotations(nullptr);
+ return 0;
+}
+
+#else
+
+static const int kAnnotationSignal = SIGUSR2;
+
+static void AnnotationSignalHandler(int aSignal, siginfo_t* aInfo,
+ void* aContext) {
+ PrepareChildExceptionTimeAnnotations(nullptr);
+}
+
+#endif // defined(XP_WIN)
+
+static void InitChildAnnotationsFlusher() {
+#if !defined(XP_WIN)
+ struct sigaction oldSigAction = {};
+ struct sigaction sigAction = {};
+ sigAction.sa_sigaction = AnnotationSignalHandler;
+ sigAction.sa_flags = SA_RESTART | SA_SIGINFO;
+ sigemptyset(&sigAction.sa_mask);
+ mozilla::DebugOnly<int> rv =
+ sigaction(kAnnotationSignal, &sigAction, &oldSigAction);
+ MOZ_ASSERT(rv == 0, "Failed to install the crash reporter's SIGUSR2 handler");
+ MOZ_ASSERT(oldSigAction.sa_sigaction == nullptr,
+ "A SIGUSR2 handler was already present");
+#endif // !defined(XP_WIN)
+}
+
+static bool FlushContentProcessAnnotations(ProcessHandle aTargetPid) {
+#if defined(XP_WIN)
+ nsAutoHandle hThread(CreateRemoteThread(
+ aTargetPid, nullptr, 0, FlushContentProcessAnnotationsThreadFunc, nullptr,
+ 0, nullptr));
+ return !!hThread;
+#else // POSIX platforms
+ return kill(aTargetPid, kAnnotationSignal) == 0;
+#endif
+}
+
+static void InitializeAnnotationFacilities() {
+ crashReporterAPILock = new Mutex("crashReporterAPILock");
+ notesFieldLock = new Mutex("notesFieldLock");
+ notesField = new nsCString();
+ if (!XRE_IsParentProcess()) {
+ InitChildAnnotationsFlusher();
+ }
+}
+
+static void TeardownAnnotationFacilities() {
+ std::fill(crashReporterAPIData_Table.begin(),
+ crashReporterAPIData_Table.end(), ""_ns);
+
+ delete crashReporterAPILock;
+ crashReporterAPILock = nullptr;
+
+ delete notesFieldLock;
+ notesFieldLock = nullptr;
+
+ delete notesField;
+ notesField = nullptr;
+}
+
+nsresult SetExceptionHandler(nsIFile* aXREDirectory, bool force /*=false*/) {
+ if (gExceptionHandler) return NS_ERROR_ALREADY_INITIALIZED;
+
+#if defined(DEBUG)
+ // In debug builds, disable the crash reporter by default, and allow to
+ // enable it with the MOZ_CRASHREPORTER environment variable.
+ const char* envvar = PR_GetEnv("MOZ_CRASHREPORTER");
+ if ((!envvar || !*envvar) && !force) return NS_OK;
+#else
+ // In other builds, enable the crash reporter by default, and allow
+ // disabling it with the MOZ_CRASHREPORTER_DISABLE environment variable.
+ const char* envvar = PR_GetEnv("MOZ_CRASHREPORTER_DISABLE");
+ if (envvar && *envvar && !force) return NS_OK;
+#endif
+
+ // this environment variable prevents us from launching
+ // the crash reporter client
+ doReport = ShouldReport();
+
+ RegisterRuntimeExceptionModule();
+ InitializeAnnotationFacilities();
+
+#if !defined(MOZ_WIDGET_ANDROID)
+ // Locate the crash reporter executable
+ PathString crashReporterPath_temp;
+ nsresult rv = LocateExecutable(aXREDirectory, CRASH_REPORTER_FILENAME,
+ crashReporterPath_temp);
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ crashReporterPath = crashReporterPath_temp.get();
+#else
+ // On Android, we launch a service defined via MOZ_ANDROID_CRASH_HANDLER
+ const char* androidCrashHandler = PR_GetEnv("MOZ_ANDROID_CRASH_HANDLER");
+ if (androidCrashHandler) {
+ crashReporterPath = xpstring(androidCrashHandler);
+ } else {
+ NS_WARNING("No Android crash handler set");
+ }
+
+ const char* deviceAndroidVersion =
+ PR_GetEnv("MOZ_ANDROID_DEVICE_SDK_VERSION");
+ if (deviceAndroidVersion != nullptr) {
+ const int deviceSdkVersion = atol(deviceAndroidVersion);
+ if (deviceSdkVersion >= 26) {
+ androidStartServiceCommand = (char*)"start-foreground-service";
+ } else {
+ androidStartServiceCommand = (char*)"startservice";
+ }
+ }
+#endif // !defined(MOZ_WIDGET_ANDROID)
+
+ // get temp path to use for minidump path
+ PathString tempPath;
+ if (!BuildTempPath(tempPath)) {
+ return NS_ERROR_FAILURE;
+ }
+
+#ifdef XP_WIN
+ ReserveBreakpadVM();
+
+ // Pre-load psapi.dll to prevent it from being loaded during exception
+ // handling.
+ ::LoadLibraryW(L"psapi.dll");
+#endif // XP_WIN
+
+#ifdef MOZ_WIDGET_ANDROID
+ androidUserSerial = getenv("MOZ_ANDROID_USER_SERIAL_NUMBER");
+#endif
+
+ // Initialize the flag and mutex used to avoid dump processing
+ // once browser termination has begun.
+ NS_ASSERTION(!dumpSafetyLock, "Shouldn't have a lock yet");
+ // Do not deallocate this lock while it is still possible for
+ // isSafeToDump to be tested on another thread.
+ dumpSafetyLock = new Mutex("dumpSafetyLock");
+ MutexAutoLock lock(*dumpSafetyLock);
+ isSafeToDump = true;
+
+ // now set the exception handler
+#ifdef XP_LINUX
+ MinidumpDescriptor descriptor(tempPath.get());
+#endif
+
+#ifdef XP_WIN
+ previousUnhandledExceptionFilter = GetUnhandledExceptionFilter();
+#endif
+
+ gExceptionHandler = new google_breakpad::ExceptionHandler(
+#ifdef XP_LINUX
+ descriptor,
+#elif defined(XP_WIN)
+ std::wstring(tempPath.get()),
+#else
+ tempPath.get(),
+#endif
+
+ Filter, MinidumpCallback, nullptr,
+#ifdef XP_WIN
+ google_breakpad::ExceptionHandler::HANDLER_ALL, GetMinidumpType(),
+ (const wchar_t*)nullptr, nullptr);
+#else
+ true
+# ifdef XP_MACOSX
+ ,
+ nullptr
+# endif
+# ifdef XP_LINUX
+ ,
+ -1
+# endif
+ );
+#endif // XP_WIN
+
+ if (!gExceptionHandler) return NS_ERROR_OUT_OF_MEMORY;
+
+#ifdef XP_WIN
+ gExceptionHandler->set_handle_debug_exceptions(true);
+
+ // Initially set sIncludeContextHeap to true for debugging startup crashes
+ // even if the controlling pref value is false.
+ SetIncludeContextHeap(true);
+# if defined(HAVE_64BIT_BUILD)
+ // Tell JS about the new filter before we disable SetUnhandledExceptionFilter
+ SetJitExceptionHandler();
+# endif
+
+ RecordMainThreadId();
+
+ // protect the crash reporter from being unloaded
+ gBlockUnhandledExceptionFilter = true;
+ gKernel32Intercept.Init("kernel32.dll");
+ DebugOnly<bool> ok = stub_SetUnhandledExceptionFilter.Set(
+ gKernel32Intercept, "SetUnhandledExceptionFilter",
+ &patched_SetUnhandledExceptionFilter);
+
+# ifdef DEBUG
+ if (!ok)
+ printf_stderr(
+ "SetUnhandledExceptionFilter hook failed; crash reporter is "
+ "vulnerable.\n");
+# endif
+#endif
+
+ // store application start time
+ char timeString[32];
+ time_t startupTime = time(nullptr);
+ XP_TTOA(startupTime, timeString);
+ AnnotateCrashReport(Annotation::StartupTime, nsDependentCString(timeString));
+
+#if defined(XP_MACOSX)
+ // On OS X, many testers like to see the OS crash reporting dialog
+ // since it offers immediate stack traces. We allow them to set
+ // a default to pass exceptions to the OS handler.
+ Boolean keyExistsAndHasValidFormat = false;
+ Boolean prefValue = ::CFPreferencesGetAppBooleanValue(
+ CFSTR("OSCrashReporter"), kCFPreferencesCurrentApplication,
+ &keyExistsAndHasValidFormat);
+ if (keyExistsAndHasValidFormat) showOSCrashReporter = prefValue;
+#endif
+
+ oldTerminateHandler = std::set_terminate(&TerminateHandler);
+
+ return NS_OK;
+}
+
+bool GetEnabled() { return gExceptionHandler != nullptr; }
+
+bool GetMinidumpPath(nsAString& aPath) {
+ if (!gExceptionHandler) return false;
+
+#ifndef XP_LINUX
+ aPath = CONVERT_XP_CHAR_TO_UTF16(gExceptionHandler->dump_path().c_str());
+#else
+ aPath = CONVERT_XP_CHAR_TO_UTF16(
+ gExceptionHandler->minidump_descriptor().directory().c_str());
+#endif
+ return true;
+}
+
+nsresult SetMinidumpPath(const nsAString& aPath) {
+ if (!gExceptionHandler) return NS_ERROR_NOT_INITIALIZED;
+
+#ifdef XP_WIN
+ gExceptionHandler->set_dump_path(
+ std::wstring(char16ptr_t(aPath.BeginReading())));
+#elif defined(XP_LINUX)
+ gExceptionHandler->set_minidump_descriptor(
+ MinidumpDescriptor(NS_ConvertUTF16toUTF8(aPath).BeginReading()));
+#else
+ gExceptionHandler->set_dump_path(NS_ConvertUTF16toUTF8(aPath).BeginReading());
+#endif
+ return NS_OK;
+}
+
+static nsresult WriteDataToFile(nsIFile* aFile, const nsACString& data) {
+ PRFileDesc* fd;
+ nsresult rv = aFile->OpenNSPRFileDesc(PR_WRONLY | PR_CREATE_FILE, 00600, &fd);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ rv = NS_OK;
+ if (PR_Write(fd, data.Data(), data.Length()) == -1) {
+ rv = NS_ERROR_FAILURE;
+ }
+ PR_Close(fd);
+ return rv;
+}
+
+static nsresult GetFileContents(nsIFile* aFile, nsACString& data) {
+ PRFileDesc* fd;
+ nsresult rv = aFile->OpenNSPRFileDesc(PR_RDONLY, 0, &fd);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ rv = NS_OK;
+ int32_t filesize = PR_Available(fd);
+ if (filesize <= 0) {
+ rv = NS_ERROR_FILE_NOT_FOUND;
+ } else {
+ data.SetLength(filesize);
+ if (PR_Read(fd, data.BeginWriting(), filesize) == -1) {
+ rv = NS_ERROR_FAILURE;
+ }
+ }
+ PR_Close(fd);
+ return rv;
+}
+
+// Function typedef for initializing a piece of data that we
+// don't already have.
+typedef nsresult (*InitDataFunc)(nsACString&);
+
+// Attempt to read aFile's contents into aContents, if aFile
+// does not exist, create it and initialize its contents
+// by calling aInitFunc for the data.
+static nsresult GetOrInit(nsIFile* aDir, const nsACString& filename,
+ nsACString& aContents, InitDataFunc aInitFunc) {
+ bool exists;
+
+ nsCOMPtr<nsIFile> dataFile;
+ nsresult rv = aDir->Clone(getter_AddRefs(dataFile));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ rv = dataFile->AppendNative(filename);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ rv = dataFile->Exists(&exists);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ if (!exists) {
+ if (aInitFunc) {
+ // get the initial value and write it to the file
+ rv = aInitFunc(aContents);
+ NS_ENSURE_SUCCESS(rv, rv);
+ rv = WriteDataToFile(dataFile, aContents);
+ } else {
+ // didn't pass in an init func
+ rv = NS_ERROR_FAILURE;
+ }
+ } else {
+ // just get the file's contents
+ rv = GetFileContents(dataFile, aContents);
+ }
+
+ return rv;
+}
+
+// Init the "install time" data. We're taking an easy way out here
+// and just setting this to "the time when this version was first run".
+static nsresult InitInstallTime(nsACString& aInstallTime) {
+ time_t t = time(nullptr);
+ aInstallTime = nsPrintfCString("%" PRIu64, static_cast<uint64_t>(t));
+
+ return NS_OK;
+}
+
+// Ensure a directory exists and create it if missing.
+static nsresult EnsureDirectoryExists(nsIFile* dir) {
+ nsresult rv = dir->Create(nsIFile::DIRECTORY_TYPE, 0700);
+
+ if (NS_WARN_IF(NS_FAILED(rv) && rv != NS_ERROR_FILE_ALREADY_EXISTS)) {
+ return rv;
+ }
+
+ return NS_OK;
+}
+
+// Creates a directory that will be accessible by the crash reporter. The
+// directory will live under Firefox default data directory and will use the
+// specified name. The directory path will be passed to the crashreporter via
+// the specified environment variable.
+static nsresult SetupCrashReporterDirectory(nsIFile* aAppDataDirectory,
+ const char* aDirName,
+ const XP_CHAR* aEnvVarName,
+ nsIFile** aDirectory = nullptr) {
+ nsCOMPtr<nsIFile> directory;
+ nsresult rv = aAppDataDirectory->Clone(getter_AddRefs(directory));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ rv = directory->AppendNative(nsDependentCString(aDirName));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ EnsureDirectoryExists(directory);
+ xpstring* directoryPath = CreatePathFromFile(directory);
+
+ if (!directoryPath) {
+ return NS_ERROR_FAILURE;
+ }
+
+#if defined(XP_WIN)
+ SetEnvironmentVariableW(aEnvVarName, directoryPath->c_str());
+#else
+ setenv(aEnvVarName, directoryPath->c_str(), /* overwrite */ 1);
+#endif
+
+ delete directoryPath;
+
+ if (aDirectory) {
+ directory.forget(aDirectory);
+ }
+
+ return NS_OK;
+}
+
+// Annotate the crash report with a Unique User ID and time
+// since install. Also do some prep work for recording
+// time since last crash, which must be calculated at
+// crash time.
+// If any piece of data doesn't exist, initialize it first.
+nsresult SetupExtraData(nsIFile* aAppDataDirectory,
+ const nsACString& aBuildID) {
+ nsCOMPtr<nsIFile> dataDirectory;
+ nsresult rv =
+ SetupCrashReporterDirectory(aAppDataDirectory, "Crash Reports",
+ XP_TEXT("MOZ_CRASHREPORTER_DATA_DIRECTORY"),
+ getter_AddRefs(dataDirectory));
+
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ rv = SetupCrashReporterDirectory(aAppDataDirectory, "Pending Pings",
+ XP_TEXT("MOZ_CRASHREPORTER_PING_DIRECTORY"));
+
+ if (NS_WARN_IF(NS_FAILED(rv))) {
+ return rv;
+ }
+
+ nsAutoCString data;
+ if (NS_SUCCEEDED(GetOrInit(dataDirectory, "InstallTime"_ns + aBuildID, data,
+ InitInstallTime)))
+ AnnotateCrashReport(Annotation::InstallTime, data);
+
+ // this is a little different, since we can't init it with anything,
+ // since it's stored at crash time, and we can't annotate the
+ // crash report with the stored value, since we really want
+ // (now - LastCrash), so we just get a value if it exists,
+ // and store it in a time_t value.
+ if (NS_SUCCEEDED(GetOrInit(dataDirectory, "LastCrash"_ns, data, nullptr))) {
+ lastCrashTime = (time_t)atol(data.get());
+ }
+
+ // not really the best place to init this, but I have the path I need here
+ nsCOMPtr<nsIFile> lastCrashFile;
+ rv = dataDirectory->Clone(getter_AddRefs(lastCrashFile));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ rv = lastCrashFile->AppendNative("LastCrash"_ns);
+ NS_ENSURE_SUCCESS(rv, rv);
+ memset(lastCrashTimeFilename, 0, sizeof(lastCrashTimeFilename));
+
+ PathString filename;
+#if defined(XP_WIN)
+ rv = lastCrashFile->GetPath(filename);
+#else
+ rv = lastCrashFile->GetNativePath(filename);
+#endif
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ if (filename.Length() < XP_PATH_MAX) {
+#if defined(XP_WIN)
+ wcsncpy(lastCrashTimeFilename, filename.get(), filename.Length());
+#else
+ strncpy(lastCrashTimeFilename, filename.get(), filename.Length());
+#endif
+ }
+
+ return NS_OK;
+}
+
+static void OOPDeinit();
+
+nsresult UnsetExceptionHandler() {
+ if (isSafeToDump) {
+ MutexAutoLock lock(*dumpSafetyLock);
+ isSafeToDump = false;
+ }
+
+#ifdef XP_WIN
+ // allow SetUnhandledExceptionFilter
+ gBlockUnhandledExceptionFilter = false;
+#endif
+
+ delete gExceptionHandler;
+
+ TeardownAnnotationFacilities();
+
+ if (!gExceptionHandler) return NS_ERROR_NOT_INITIALIZED;
+
+ gExceptionHandler = nullptr;
+
+ OOPDeinit();
+
+ delete dumpSafetyLock;
+ dumpSafetyLock = nullptr;
+
+ std::set_terminate(oldTerminateHandler);
+
+ return NS_OK;
+}
+
+nsresult AnnotateCrashReport(Annotation key, bool data) {
+ return AnnotateCrashReport(key, data ? "1"_ns : "0"_ns);
+}
+
+nsresult AnnotateCrashReport(Annotation key, int data) {
+ nsAutoCString dataString;
+ dataString.AppendInt(data);
+
+ return AnnotateCrashReport(key, dataString);
+}
+
+nsresult AnnotateCrashReport(Annotation key, unsigned int data) {
+ nsAutoCString dataString;
+ dataString.AppendInt(data);
+
+ return AnnotateCrashReport(key, dataString);
+}
+
+nsresult AnnotateCrashReport(Annotation key, const nsACString& data) {
+ if (!GetEnabled()) return NS_ERROR_NOT_INITIALIZED;
+
+ MutexAutoLock lock(*crashReporterAPILock);
+ crashReporterAPIData_Table[key] = data;
+
+ return NS_OK;
+}
+
+nsresult AppendToCrashReportAnnotation(Annotation key, const nsACString& data) {
+ if (!GetEnabled()) return NS_ERROR_NOT_INITIALIZED;
+
+ MutexAutoLock lock(*crashReporterAPILock);
+ nsAutoCString newString(crashReporterAPIData_Table[key]);
+ newString.Append(" - "_ns);
+ newString.Append(data);
+ crashReporterAPIData_Table[key] = newString;
+
+ return NS_OK;
+}
+
+nsresult RemoveCrashReportAnnotation(Annotation key) {
+ return AnnotateCrashReport(key, ""_ns);
+}
+
+AutoAnnotateCrashReport::AutoAnnotateCrashReport(Annotation key, bool data)
+ : AutoAnnotateCrashReport(key, data ? "1"_ns : "0"_ns) {}
+
+AutoAnnotateCrashReport::AutoAnnotateCrashReport(Annotation key, int data)
+ : AutoAnnotateCrashReport(key, nsPrintfCString("%d", data)) {}
+
+AutoAnnotateCrashReport::AutoAnnotateCrashReport(Annotation key, unsigned data)
+ : AutoAnnotateCrashReport(key, nsPrintfCString("%u", data)) {}
+
+AutoAnnotateCrashReport::AutoAnnotateCrashReport(Annotation key,
+ const nsACString& data)
+ : mKey(key) {
+ if (GetEnabled()) {
+ MutexAutoLock lock(*crashReporterAPILock);
+ auto& entry = crashReporterAPIData_Table[mKey];
+ mPrevious = std::move(entry);
+ entry = data;
+ }
+}
+
+AutoAnnotateCrashReport::~AutoAnnotateCrashReport() {
+ if (GetEnabled()) {
+ MutexAutoLock lock(*crashReporterAPILock);
+ crashReporterAPIData_Table[mKey] = std::move(mPrevious);
+ }
+}
+
+void MergeCrashAnnotations(AnnotationTable& aDst, const AnnotationTable& aSrc) {
+ for (auto key : MakeEnumeratedRange(Annotation::Count)) {
+ const nsCString& value = aSrc[key];
+ if (!value.IsEmpty()) {
+ aDst[key] = value;
+ }
+ }
+}
+
+static void MergeContentCrashAnnotations(AnnotationTable& aDst) {
+ MutexAutoLock lock(*crashReporterAPILock);
+ MergeCrashAnnotations(aDst, crashReporterAPIData_Table);
+}
+
+// Adds crash time, uptime and memory report annotations
+static void AddCommonAnnotations(AnnotationTable& aAnnotations) {
+ const time_t crashTime = time(nullptr);
+ nsAutoCString crashTimeStr;
+ crashTimeStr.AppendInt(static_cast<uint64_t>(crashTime));
+ aAnnotations[Annotation::CrashTime] = crashTimeStr;
+
+ if (inactiveStateStart) {
+ nsAutoCString inactiveDuration;
+ inactiveDuration.AppendInt(
+ static_cast<uint64_t>(crashTime - inactiveStateStart));
+ aAnnotations[Annotation::LastInteractionDuration] = inactiveDuration;
+ }
+
+ double uptimeTS = (TimeStamp::NowLoRes() - TimeStamp::ProcessCreation())
+ .ToSecondsSigDigits();
+ nsAutoCString uptimeStr;
+ uptimeStr.AppendFloat(uptimeTS);
+ aAnnotations[Annotation::UptimeTS] = uptimeStr;
+}
+
+nsresult SetGarbageCollecting(bool collecting) {
+ if (!GetEnabled()) return NS_ERROR_NOT_INITIALIZED;
+
+ isGarbageCollecting = collecting;
+
+ return NS_OK;
+}
+
+void SetEventloopNestingLevel(uint32_t level) { eventloopNestingLevel = level; }
+
+void ClearInactiveStateStart() { inactiveStateStart = 0; }
+void SetInactiveStateStart() {
+ if (!inactiveStateStart) {
+ inactiveStateStart = GetCurrentTimeForCrashTime();
+ }
+}
+
+void SetMinidumpAnalysisAllThreads() {
+ char* env = strdup("MOZ_CRASHREPORTER_DUMP_ALL_THREADS=1");
+ PR_SetEnv(env);
+}
+
+nsresult AppendAppNotesToCrashReport(const nsACString& data) {
+ if (!GetEnabled()) return NS_ERROR_NOT_INITIALIZED;
+
+ MutexAutoLock lock(*notesFieldLock);
+
+ notesField->Append(data);
+ return AnnotateCrashReport(Annotation::Notes, *notesField);
+}
+
+// Returns true if found, false if not found.
+static bool GetAnnotation(CrashReporter::Annotation key, nsACString& data) {
+ if (!gExceptionHandler) return false;
+
+ MutexAutoLock lock(*crashReporterAPILock);
+ const nsCString& entry = crashReporterAPIData_Table[key];
+ if (entry.IsEmpty()) {
+ return false;
+ }
+
+ data = entry;
+ return true;
+}
+
+nsresult RegisterAppMemory(void* ptr, size_t length) {
+ if (!GetEnabled()) return NS_ERROR_NOT_INITIALIZED;
+
+#if defined(XP_LINUX) || defined(XP_WIN)
+ gExceptionHandler->RegisterAppMemory(ptr, length);
+ return NS_OK;
+#else
+ return NS_ERROR_NOT_IMPLEMENTED;
+#endif
+}
+
+nsresult UnregisterAppMemory(void* ptr) {
+ if (!GetEnabled()) return NS_ERROR_NOT_INITIALIZED;
+
+#if defined(XP_LINUX) || defined(XP_WIN)
+ gExceptionHandler->UnregisterAppMemory(ptr);
+ return NS_OK;
+#else
+ return NS_ERROR_NOT_IMPLEMENTED;
+#endif
+}
+
+void SetIncludeContextHeap(bool aValue) {
+ sIncludeContextHeap = aValue;
+
+#ifdef XP_WIN
+ if (gExceptionHandler) {
+ gExceptionHandler->set_include_context_heap(sIncludeContextHeap);
+ }
+#endif
+}
+
+bool GetServerURL(nsACString& aServerURL) {
+ if (!gExceptionHandler) return false;
+
+ return GetAnnotation(CrashReporter::Annotation::ServerURL, aServerURL);
+}
+
+nsresult SetServerURL(const nsACString& aServerURL) {
+ // store server URL with the API data
+ // the client knows to handle this specially
+ return AnnotateCrashReport(Annotation::ServerURL, aServerURL);
+}
+
+nsresult SetRestartArgs(int argc, char** argv) {
+ if (!gExceptionHandler) return NS_OK;
+
+ int i;
+ nsAutoCString envVar;
+ char* env;
+ char* argv0 = getenv("MOZ_APP_LAUNCHER");
+ for (i = 0; i < argc; i++) {
+ envVar = "MOZ_CRASHREPORTER_RESTART_ARG_";
+ envVar.AppendInt(i);
+ envVar += "=";
+ if (argv0 && i == 0) {
+ // Is there a request to suppress default binary launcher?
+ envVar += argv0;
+ } else {
+ envVar += argv[i];
+ }
+
+ // PR_SetEnv() wants the string to be available for the lifetime
+ // of the app, so dup it here. This conversion is not lossy.
+ env = ToNewCString(envVar, mozilla::fallible);
+ if (!env) return NS_ERROR_OUT_OF_MEMORY;
+
+ PR_SetEnv(env);
+ }
+
+ // make sure the arg list is terminated
+ envVar = "MOZ_CRASHREPORTER_RESTART_ARG_";
+ envVar.AppendInt(i);
+ envVar += "=";
+
+ // PR_SetEnv() wants the string to be available for the lifetime
+ // of the app, so dup it here. This conversion is not lossy.
+ env = ToNewCString(envVar, mozilla::fallible);
+ if (!env) return NS_ERROR_OUT_OF_MEMORY;
+
+ PR_SetEnv(env);
+
+ // make sure we save the info in XUL_APP_FILE for the reporter
+ const char* appfile = PR_GetEnv("XUL_APP_FILE");
+ if (appfile && *appfile) {
+ envVar = "MOZ_CRASHREPORTER_RESTART_XUL_APP_FILE=";
+ envVar += appfile;
+
+ // PR_SetEnv() wants the string to be available for the lifetime
+ // of the app, so dup it here. This conversion is not lossy.
+ env = ToNewCString(envVar);
+ PR_SetEnv(env);
+ }
+
+ return NS_OK;
+}
+
+#ifdef XP_WIN
+nsresult WriteMinidumpForException(EXCEPTION_POINTERS* aExceptionInfo) {
+ if (!gExceptionHandler) return NS_ERROR_NOT_INITIALIZED;
+
+ return gExceptionHandler->WriteMinidumpForException(aExceptionInfo)
+ ? NS_OK
+ : NS_ERROR_FAILURE;
+}
+#endif
+
+#ifdef XP_LINUX
+bool WriteMinidumpForSigInfo(int signo, siginfo_t* info, void* uc) {
+ if (!gExceptionHandler) {
+ // Crash reporting is disabled.
+ return false;
+ }
+ return gExceptionHandler->HandleSignal(signo, info, uc);
+}
+#endif
+
+#ifdef XP_MACOSX
+nsresult AppendObjCExceptionInfoToAppNotes(void* inException) {
+ nsAutoCString excString;
+ GetObjCExceptionInfo(inException, excString);
+ AppendAppNotesToCrashReport(excString);
+ return NS_OK;
+}
+#endif
+
+/*
+ * Combined code to get/set the crash reporter submission pref on
+ * different platforms.
+ */
+static nsresult PrefSubmitReports(bool* aSubmitReports, bool writePref) {
+ nsresult rv;
+#if defined(XP_WIN)
+ /*
+ * NOTE! This needs to stay in sync with the preference checking code
+ * in toolkit/crashreporter/client/crashreporter_win.cpp
+ */
+ nsCOMPtr<nsIXULAppInfo> appinfo =
+ do_GetService("@mozilla.org/xre/app-info;1", &rv);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ nsAutoCString appVendor, appName;
+ rv = appinfo->GetVendor(appVendor);
+ NS_ENSURE_SUCCESS(rv, rv);
+ rv = appinfo->GetName(appName);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ nsCOMPtr<nsIWindowsRegKey> regKey(
+ do_CreateInstance("@mozilla.org/windows-registry-key;1", &rv));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ nsAutoCString regPath;
+
+ regPath.AppendLiteral("Software\\");
+
+ // We need to ensure the registry keys are created so we can properly
+ // write values to it
+
+ // Create appVendor key
+ if (!appVendor.IsEmpty()) {
+ regPath.Append(appVendor);
+ regKey->Create(nsIWindowsRegKey::ROOT_KEY_CURRENT_USER,
+ NS_ConvertUTF8toUTF16(regPath),
+ nsIWindowsRegKey::ACCESS_SET_VALUE);
+ regPath.Append('\\');
+ }
+
+ // Create appName key
+ regPath.Append(appName);
+ regKey->Create(nsIWindowsRegKey::ROOT_KEY_CURRENT_USER,
+ NS_ConvertUTF8toUTF16(regPath),
+ nsIWindowsRegKey::ACCESS_SET_VALUE);
+ regPath.Append('\\');
+
+ // Create Crash Reporter key
+ regPath.AppendLiteral("Crash Reporter");
+ regKey->Create(nsIWindowsRegKey::ROOT_KEY_CURRENT_USER,
+ NS_ConvertUTF8toUTF16(regPath),
+ nsIWindowsRegKey::ACCESS_SET_VALUE);
+
+ // If we're saving the pref value, just write it to ROOT_KEY_CURRENT_USER
+ // and we're done.
+ if (writePref) {
+ rv = regKey->Open(nsIWindowsRegKey::ROOT_KEY_CURRENT_USER,
+ NS_ConvertUTF8toUTF16(regPath),
+ nsIWindowsRegKey::ACCESS_SET_VALUE);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ uint32_t value = *aSubmitReports ? 1 : 0;
+ rv = regKey->WriteIntValue(u"SubmitCrashReport"_ns, value);
+ regKey->Close();
+ return rv;
+ }
+
+ // We're reading the pref value, so we need to first look under
+ // ROOT_KEY_LOCAL_MACHINE to see if it's set there, and then fall back to
+ // ROOT_KEY_CURRENT_USER. If it's not set in either place, the pref defaults
+ // to "true".
+ uint32_t value;
+ rv = regKey->Open(nsIWindowsRegKey::ROOT_KEY_LOCAL_MACHINE,
+ NS_ConvertUTF8toUTF16(regPath),
+ nsIWindowsRegKey::ACCESS_QUERY_VALUE);
+ if (NS_SUCCEEDED(rv)) {
+ rv = regKey->ReadIntValue(u"SubmitCrashReport"_ns, &value);
+ regKey->Close();
+ if (NS_SUCCEEDED(rv)) {
+ *aSubmitReports = !!value;
+ return NS_OK;
+ }
+ }
+
+ rv = regKey->Open(nsIWindowsRegKey::ROOT_KEY_CURRENT_USER,
+ NS_ConvertUTF8toUTF16(regPath),
+ nsIWindowsRegKey::ACCESS_QUERY_VALUE);
+ if (NS_FAILED(rv)) {
+ *aSubmitReports = true;
+ return NS_OK;
+ }
+
+ rv = regKey->ReadIntValue(u"SubmitCrashReport"_ns, &value);
+ // default to true on failure
+ if (NS_FAILED(rv)) {
+ value = 1;
+ rv = NS_OK;
+ }
+ regKey->Close();
+
+ *aSubmitReports = !!value;
+ return NS_OK;
+#elif defined(XP_MACOSX)
+ rv = NS_OK;
+ if (writePref) {
+ CFPropertyListRef cfValue =
+ (CFPropertyListRef)(*aSubmitReports ? kCFBooleanTrue : kCFBooleanFalse);
+ ::CFPreferencesSetAppValue(CFSTR("submitReport"), cfValue,
+ reporterClientAppID);
+ if (!::CFPreferencesAppSynchronize(reporterClientAppID))
+ rv = NS_ERROR_FAILURE;
+ } else {
+ *aSubmitReports = true;
+ Boolean keyExistsAndHasValidFormat = false;
+ Boolean prefValue = ::CFPreferencesGetAppBooleanValue(
+ CFSTR("submitReport"), reporterClientAppID,
+ &keyExistsAndHasValidFormat);
+ if (keyExistsAndHasValidFormat) *aSubmitReports = !!prefValue;
+ }
+ return rv;
+#elif defined(XP_UNIX)
+ /*
+ * NOTE! This needs to stay in sync with the preference checking code
+ * in toolkit/crashreporter/client/crashreporter_linux.cpp
+ */
+ nsCOMPtr<nsIFile> reporterINI;
+ rv = NS_GetSpecialDirectory("UAppData", getter_AddRefs(reporterINI));
+ NS_ENSURE_SUCCESS(rv, rv);
+ reporterINI->AppendNative("Crash Reports"_ns);
+ reporterINI->AppendNative("crashreporter.ini"_ns);
+
+ bool exists;
+ rv = reporterINI->Exists(&exists);
+ NS_ENSURE_SUCCESS(rv, rv);
+ if (!exists) {
+ if (!writePref) {
+ // If reading the pref, default to true if .ini doesn't exist.
+ *aSubmitReports = true;
+ return NS_OK;
+ }
+ // Create the file so the INI processor can write to it.
+ rv = reporterINI->Create(nsIFile::NORMAL_FILE_TYPE, 0600);
+ NS_ENSURE_SUCCESS(rv, rv);
+ }
+
+ nsCOMPtr<nsIINIParserFactory> iniFactory =
+ do_GetService("@mozilla.org/xpcom/ini-parser-factory;1", &rv);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ nsCOMPtr<nsIINIParser> iniParser;
+ rv = iniFactory->CreateINIParser(reporterINI, getter_AddRefs(iniParser));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ // If we're writing the pref, just set and we're done.
+ if (writePref) {
+ nsCOMPtr<nsIINIParserWriter> iniWriter = do_QueryInterface(iniParser);
+ NS_ENSURE_TRUE(iniWriter, NS_ERROR_FAILURE);
+
+ rv = iniWriter->SetString("Crash Reporter"_ns, "SubmitReport"_ns,
+ *aSubmitReports ? "1"_ns : "0"_ns);
+ NS_ENSURE_SUCCESS(rv, rv);
+ rv = iniWriter->WriteFile(reporterINI);
+ return rv;
+ }
+
+ nsAutoCString submitReportValue;
+ rv = iniParser->GetString("Crash Reporter"_ns, "SubmitReport"_ns,
+ submitReportValue);
+
+ // Default to "true" if the pref can't be found.
+ if (NS_FAILED(rv))
+ *aSubmitReports = true;
+ else if (submitReportValue.EqualsASCII("0"))
+ *aSubmitReports = false;
+ else
+ *aSubmitReports = true;
+
+ return NS_OK;
+#else
+ return NS_ERROR_NOT_IMPLEMENTED;
+#endif
+}
+
+nsresult GetSubmitReports(bool* aSubmitReports) {
+ return PrefSubmitReports(aSubmitReports, false);
+}
+
+nsresult SetSubmitReports(bool aSubmitReports) {
+ nsresult rv;
+
+ nsCOMPtr<nsIObserverService> obsServ =
+ mozilla::services::GetObserverService();
+ if (!obsServ) {
+ return NS_ERROR_FAILURE;
+ }
+
+ rv = PrefSubmitReports(&aSubmitReports, true);
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+
+ obsServ->NotifyObservers(nullptr, "submit-reports-pref-changed", nullptr);
+ return NS_OK;
+}
+
+static void SetCrashEventsDir(nsIFile* aDir) {
+ static const XP_CHAR eventsDirectoryEnv[] =
+ XP_TEXT("MOZ_CRASHREPORTER_EVENTS_DIRECTORY");
+
+ nsCOMPtr<nsIFile> eventsDir = aDir;
+
+ const char* env = PR_GetEnv("CRASHES_EVENTS_DIR");
+ if (env && *env) {
+ NS_NewNativeLocalFile(nsDependentCString(env), false,
+ getter_AddRefs(eventsDir));
+ EnsureDirectoryExists(eventsDir);
+ }
+
+ xpstring* path = CreatePathFromFile(eventsDir);
+ if (!path) {
+ return; // There's no clean failure from this
+ }
+
+ eventsDirectory = xpstring(*path);
+#ifdef XP_WIN
+ SetEnvironmentVariableW(eventsDirectoryEnv, path->c_str());
+#else
+ setenv(eventsDirectoryEnv, path->c_str(), /* overwrite */ 1);
+#endif
+
+ delete path;
+}
+
+void SetProfileDirectory(nsIFile* aDir) {
+ nsCOMPtr<nsIFile> dir;
+ aDir->Clone(getter_AddRefs(dir));
+
+ dir->Append(u"crashes"_ns);
+ EnsureDirectoryExists(dir);
+ dir->Append(u"events"_ns);
+ EnsureDirectoryExists(dir);
+ SetCrashEventsDir(dir);
+}
+
+void SetUserAppDataDirectory(nsIFile* aDir) {
+ nsCOMPtr<nsIFile> dir;
+ aDir->Clone(getter_AddRefs(dir));
+
+ dir->Append(u"Crash Reports"_ns);
+ EnsureDirectoryExists(dir);
+ dir->Append(u"events"_ns);
+ EnsureDirectoryExists(dir);
+ SetCrashEventsDir(dir);
+}
+
+void UpdateCrashEventsDir() {
+ const char* env = PR_GetEnv("CRASHES_EVENTS_DIR");
+ if (env && *env) {
+ SetCrashEventsDir(nullptr);
+ }
+
+ nsCOMPtr<nsIFile> eventsDir;
+ nsresult rv = NS_GetSpecialDirectory("ProfD", getter_AddRefs(eventsDir));
+ if (NS_SUCCEEDED(rv)) {
+ SetProfileDirectory(eventsDir);
+ return;
+ }
+
+ rv = NS_GetSpecialDirectory("UAppData", getter_AddRefs(eventsDir));
+ if (NS_SUCCEEDED(rv)) {
+ SetUserAppDataDirectory(eventsDir);
+ return;
+ }
+
+ NS_WARNING(
+ "Couldn't get the user appdata directory. Crash events may not be "
+ "produced.");
+}
+
+bool GetCrashEventsDir(nsAString& aPath) {
+ if (eventsDirectory.empty()) {
+ return false;
+ }
+ aPath = CONVERT_XP_CHAR_TO_UTF16(eventsDirectory.c_str());
+ return true;
+}
+
+void SetMemoryReportFile(nsIFile* aFile) {
+ if (!gExceptionHandler) {
+ return;
+ }
+
+ PathString path;
+#ifdef XP_WIN
+ aFile->GetPath(path);
+#else
+ aFile->GetNativePath(path);
+#endif
+ memoryReportPath = xpstring(path.get());
+}
+
+nsresult GetDefaultMemoryReportFile(nsIFile** aFile) {
+ nsCOMPtr<nsIFile> defaultMemoryReportFile;
+ if (!defaultMemoryReportPath) {
+ nsresult rv = NS_GetSpecialDirectory(
+ NS_APP_PROFILE_DIR_STARTUP, getter_AddRefs(defaultMemoryReportFile));
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+ defaultMemoryReportFile->AppendNative("memory-report.json.gz"_ns);
+ defaultMemoryReportPath = CreatePathFromFile(defaultMemoryReportFile);
+ if (!defaultMemoryReportPath) {
+ return NS_ERROR_FAILURE;
+ }
+ } else {
+ CreateFileFromPath(*defaultMemoryReportPath,
+ getter_AddRefs(defaultMemoryReportFile));
+ if (!defaultMemoryReportFile) {
+ return NS_ERROR_FAILURE;
+ }
+ }
+ defaultMemoryReportFile.forget(aFile);
+ return NS_OK;
+}
+
+static void FindPendingDir() {
+ if (!pendingDirectory.empty()) {
+ return;
+ }
+ nsCOMPtr<nsIFile> pendingDir;
+ nsresult rv = NS_GetSpecialDirectory("UAppData", getter_AddRefs(pendingDir));
+ if (NS_FAILED(rv)) {
+ NS_WARNING(
+ "Couldn't get the user appdata directory, crash dumps will go in an "
+ "unusual location");
+ } else {
+ pendingDir->Append(u"Crash Reports"_ns);
+ pendingDir->Append(u"pending"_ns);
+
+ PathString path;
+#ifdef XP_WIN
+ pendingDir->GetPath(path);
+#else
+ pendingDir->GetNativePath(path);
+#endif
+ pendingDirectory = xpstring(path.get());
+ }
+}
+
+// The "pending" dir is Crash Reports/pending, from which minidumps
+// can be submitted. Because this method may be called off the main thread,
+// we store the pending directory as a path.
+static bool GetPendingDir(nsIFile** dir) {
+ // MOZ_ASSERT(OOPInitialized());
+ if (pendingDirectory.empty()) {
+ return false;
+ }
+
+ nsCOMPtr<nsIFile> pending = do_CreateInstance(NS_LOCAL_FILE_CONTRACTID);
+ if (!pending) {
+ NS_WARNING("Can't set up pending directory during shutdown.");
+ return false;
+ }
+#ifdef XP_WIN
+ pending->InitWithPath(nsDependentString(pendingDirectory.c_str()));
+#else
+ pending->InitWithNativePath(nsDependentCString(pendingDirectory.c_str()));
+#endif
+ pending.swap(*dir);
+ return true;
+}
+
+// The "limbo" dir is where minidumps go to wait for something else to
+// use them. If we're |ShouldReport()|, then the "something else" is
+// a minidump submitter, and they're coming from the
+// Crash Reports/pending/ dir. Otherwise, we don't know what the
+// "somthing else" is, but the minidumps stay in [profile]/minidumps/
+// limbo.
+static bool GetMinidumpLimboDir(nsIFile** dir) {
+ if (ShouldReport()) {
+ return GetPendingDir(dir);
+ } else {
+#ifndef XP_LINUX
+ CreateFileFromPath(gExceptionHandler->dump_path(), dir);
+#else
+ CreateFileFromPath(gExceptionHandler->minidump_descriptor().directory(),
+ dir);
+#endif
+ return nullptr != *dir;
+ }
+}
+
+void DeleteMinidumpFilesForID(const nsAString& aId,
+ const Maybe<nsString>& aAdditionalMinidump) {
+ nsCOMPtr<nsIFile> minidumpFile;
+ if (GetMinidumpForID(aId, getter_AddRefs(minidumpFile))) {
+ minidumpFile->Remove(false);
+ }
+
+ nsCOMPtr<nsIFile> extraFile;
+ if (GetExtraFileForID(aId, getter_AddRefs(extraFile))) {
+ extraFile->Remove(false);
+ }
+
+ if (aAdditionalMinidump && GetMinidumpForID(aId, getter_AddRefs(minidumpFile),
+ aAdditionalMinidump)) {
+ minidumpFile->Remove(false);
+ }
+}
+
+bool GetMinidumpForID(const nsAString& id, nsIFile** minidump,
+ const Maybe<nsString>& aAdditionalMinidump) {
+ if (!GetMinidumpLimboDir(minidump)) {
+ return false;
+ }
+
+ nsAutoString fileName(id);
+
+ if (aAdditionalMinidump) {
+ fileName.Append('-');
+ fileName.Append(*aAdditionalMinidump);
+ }
+
+ fileName.Append(u".dmp"_ns);
+ (*minidump)->Append(fileName);
+
+ bool exists;
+ if (NS_FAILED((*minidump)->Exists(&exists)) || !exists) {
+ return false;
+ }
+
+ return true;
+}
+
+bool GetIDFromMinidump(nsIFile* minidump, nsAString& id) {
+ if (minidump && NS_SUCCEEDED(minidump->GetLeafName(id))) {
+ id.ReplaceLiteral(id.Length() - 4, 4, u"");
+ return true;
+ }
+ return false;
+}
+
+bool GetExtraFileForID(const nsAString& id, nsIFile** extraFile) {
+ if (!GetMinidumpLimboDir(extraFile)) {
+ return false;
+ }
+
+ (*extraFile)->Append(id + u".extra"_ns);
+
+ bool exists;
+ if (NS_FAILED((*extraFile)->Exists(&exists)) || !exists) {
+ return false;
+ }
+
+ return true;
+}
+
+bool GetExtraFileForMinidump(nsIFile* minidump, nsIFile** extraFile) {
+ nsAutoString leafName;
+ nsresult rv = minidump->GetLeafName(leafName);
+ if (NS_FAILED(rv)) return false;
+
+ nsCOMPtr<nsIFile> extraF;
+ rv = minidump->Clone(getter_AddRefs(extraF));
+ if (NS_FAILED(rv)) return false;
+
+ leafName.Replace(leafName.Length() - 3, 3, u"extra"_ns);
+ rv = extraF->SetLeafName(leafName);
+ if (NS_FAILED(rv)) return false;
+
+ *extraFile = nullptr;
+ extraF.swap(*extraFile);
+ return true;
+}
+
+static void ReadAndValidateExceptionTimeAnnotations(
+ PRFileDesc* aFd, AnnotationTable& aAnnotations) {
+ PRInt32 res;
+ do {
+ uint32_t rawAnnotation;
+ res = PR_Read(aFd, &rawAnnotation, sizeof(rawAnnotation));
+ if ((res != sizeof(rawAnnotation)) ||
+ (rawAnnotation >= static_cast<uint32_t>(Annotation::Count))) {
+ return;
+ }
+
+ uint64_t len;
+ res = PR_Read(aFd, &len, sizeof(len));
+ if (res != sizeof(len) || (len == 0)) {
+ return;
+ }
+
+ char c;
+ nsAutoCString value;
+ do {
+ res = PR_Read(aFd, &c, 1);
+ if (res != 1) {
+ return;
+ }
+
+ len--;
+ value.Append(c);
+ } while (len > 0);
+
+ // Looks good, save the (annotation, value) pair
+ aAnnotations[static_cast<Annotation>(rawAnnotation)] = value;
+ } while (res > 0);
+}
+
+static bool WriteExtraFile(PlatformWriter& pw,
+ const AnnotationTable& aAnnotations) {
+ if (!pw.Valid()) {
+ return false;
+ }
+
+ JSONAnnotationWriter writer(pw);
+ WriteAnnotations(writer, aAnnotations);
+ WriteSynthesizedAnnotations(writer);
+
+ return true;
+}
+
+bool WriteExtraFile(const nsAString& id, const AnnotationTable& annotations) {
+ nsCOMPtr<nsIFile> extra;
+ if (!GetMinidumpLimboDir(getter_AddRefs(extra))) {
+ return false;
+ }
+
+ extra->Append(id + u".extra"_ns);
+ PathString path;
+#ifdef XP_WIN
+ NS_ENSURE_SUCCESS(extra->GetPath(path), false);
+#elif defined(XP_UNIX)
+ NS_ENSURE_SUCCESS(extra->GetNativePath(path), false);
+#endif
+
+ PlatformWriter pw(path.get());
+ return WriteExtraFile(pw, annotations);
+}
+
+static void ReadExceptionTimeAnnotations(AnnotationTable& aAnnotations,
+ ProcessId aPid) {
+ // Read exception-time annotations
+ StaticMutexAutoLock pidMapLock(processMapLock);
+ if (aPid && processToCrashFd.count(aPid)) {
+ PRFileDesc* prFd = processToCrashFd[aPid];
+ processToCrashFd.erase(aPid);
+ ReadAndValidateExceptionTimeAnnotations(prFd, aAnnotations);
+ PR_Close(prFd);
+ }
+}
+
+static void PopulateContentProcessAnnotations(AnnotationTable& aAnnotations) {
+ MergeContentCrashAnnotations(aAnnotations);
+ AddCommonAnnotations(aAnnotations);
+}
+
+// It really only makes sense to call this function when
+// ShouldReport() is true.
+// Uses dumpFile's filename to generate memoryReport's filename (same name with
+// a different extension)
+static bool MoveToPending(nsIFile* dumpFile, nsIFile* extraFile,
+ nsIFile* memoryReport) {
+ nsCOMPtr<nsIFile> pendingDir;
+ if (!GetPendingDir(getter_AddRefs(pendingDir))) return false;
+
+ if (NS_FAILED(dumpFile->MoveTo(pendingDir, u""_ns))) {
+ return false;
+ }
+
+ if (extraFile && NS_FAILED(extraFile->MoveTo(pendingDir, u""_ns))) {
+ return false;
+ }
+
+ if (memoryReport) {
+ nsAutoString leafName;
+ nsresult rv = dumpFile->GetLeafName(leafName);
+ if (NS_FAILED(rv)) {
+ return false;
+ }
+ // Generate the correct memory report filename from the dumpFile's name
+ leafName.Replace(
+ leafName.Length() - 4, 4,
+ static_cast<nsString>(CONVERT_XP_CHAR_TO_UTF16(memoryReportExtension)));
+ if (NS_FAILED(memoryReport->MoveTo(pendingDir, leafName))) {
+ return false;
+ }
+ }
+
+ return true;
+}
+
+static void MaybeAnnotateDumperError(const ClientInfo& aClientInfo,
+ AnnotationTable& aAnnotations) {
+#if defined(MOZ_OXIDIZED_BREAKPAD)
+ if (aClientInfo.had_error()) {
+ aAnnotations[Annotation::DumperError] = *aClientInfo.error_msg();
+ }
+#endif
+}
+
+static void OnChildProcessDumpRequested(
+ void* aContext, const ClientInfo& aClientInfo,
+ const xpstring& aFilePath) MOZ_NO_THREAD_SAFETY_ANALYSIS {
+ nsCOMPtr<nsIFile> minidump;
+
+ // Hold the mutex until the current dump request is complete, to
+ // prevent UnsetExceptionHandler() from pulling the rug out from
+ // under us.
+ MutexAutoLock lock(*dumpSafetyLock);
+ if (!isSafeToDump) return;
+
+ CreateFileFromPath(aFilePath, getter_AddRefs(minidump));
+
+ ProcessId pid = aClientInfo.pid();
+ if (ShouldReport()) {
+ nsCOMPtr<nsIFile> memoryReport;
+ if (!memoryReportPath.empty()) {
+ CreateFileFromPath(memoryReportPath, getter_AddRefs(memoryReport));
+ MOZ_ASSERT(memoryReport);
+ }
+ MoveToPending(minidump, nullptr, memoryReport);
+ }
+
+ {
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+ bool runCallback;
+#endif
+ {
+ dumpMapLock->Lock();
+ ChildProcessData* pd = pidToMinidump->PutEntry(pid);
+ MOZ_ASSERT(!pd->minidump);
+ pd->minidump = minidump;
+ pd->sequence = ++crashSequence;
+ pd->annotations = MakeUnique<AnnotationTable>();
+ PopulateContentProcessAnnotations(*(pd->annotations));
+ MaybeAnnotateDumperError(aClientInfo, *(pd->annotations));
+
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+ runCallback = nullptr != pd->callback;
+#endif
+ }
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+ if (runCallback) NS_DispatchToMainThread(new ReportInjectedCrash(pid));
+#endif
+ }
+}
+
+static void OnChildProcessDumpWritten(void* aContext,
+ const ClientInfo& aClientInfo)
+ MOZ_NO_THREAD_SAFETY_ANALYSIS {
+ ProcessId pid = aClientInfo.pid();
+ ChildProcessData* pd = pidToMinidump->GetEntry(pid);
+ MOZ_ASSERT(pd);
+ if (!pd->minidumpOnly) {
+ ReadExceptionTimeAnnotations(*(pd->annotations), pid);
+ }
+ dumpMapLock->Unlock();
+}
+
+static bool OOPInitialized() { return pidToMinidump != nullptr; }
+
+void OOPInit() {
+ class ProxyToMainThread : public Runnable {
+ public:
+ ProxyToMainThread() : Runnable("nsExceptionHandler::ProxyToMainThread") {}
+ NS_IMETHOD Run() override {
+ OOPInit();
+ return NS_OK;
+ }
+ };
+ if (!NS_IsMainThread()) {
+ // This logic needs to run on the main thread
+ nsCOMPtr<nsIThread> mainThread = do_GetMainThread();
+ mozilla::SyncRunnable::DispatchToThread(mainThread,
+ new ProxyToMainThread());
+ return;
+ }
+
+ if (OOPInitialized()) return;
+
+ MOZ_ASSERT(NS_IsMainThread());
+
+ MOZ_ASSERT(gExceptionHandler != nullptr,
+ "attempt to initialize OOP crash reporter before in-process "
+ "crashreporter!");
+
+#if defined(XP_WIN)
+ childCrashNotifyPipe =
+ mozilla::Smprintf("\\\\.\\pipe\\gecko-crash-server-pipe.%i",
+ static_cast<int>(::GetCurrentProcessId()))
+ .release();
+
+ const std::wstring dumpPath = gExceptionHandler->dump_path();
+ crashServer = new CrashGenerationServer(
+ std::wstring(NS_ConvertASCIItoUTF16(childCrashNotifyPipe).get()),
+ nullptr, // default security attributes
+ nullptr, nullptr, // we don't care about process connect here
+ OnChildProcessDumpRequested, nullptr, OnChildProcessDumpWritten, nullptr,
+ nullptr, // we don't care about process exit here
+ nullptr, nullptr, // we don't care about upload request here
+ true, // automatically generate dumps
+ &dumpPath);
+
+ if (sIncludeContextHeap) {
+ crashServer->set_include_context_heap(sIncludeContextHeap);
+ }
+
+#elif defined(XP_LINUX)
+ if (!CrashGenerationServer::CreateReportChannel(&serverSocketFd,
+ &clientSocketFd))
+ MOZ_CRASH("can't create crash reporter socketpair()");
+
+ const std::string dumpPath =
+ gExceptionHandler->minidump_descriptor().directory();
+ crashServer = new CrashGenerationServer(
+ serverSocketFd, OnChildProcessDumpRequested, nullptr,
+ OnChildProcessDumpWritten, nullptr, true, &dumpPath);
+
+#elif defined(XP_MACOSX)
+ childCrashNotifyPipe = mozilla::Smprintf("gecko-crash-server-pipe.%i",
+ static_cast<int>(getpid()))
+ .release();
+ const std::string dumpPath = gExceptionHandler->dump_path();
+
+ crashServer = new CrashGenerationServer(
+ childCrashNotifyPipe, nullptr, nullptr, OnChildProcessDumpRequested,
+ nullptr, OnChildProcessDumpWritten, nullptr,
+ true, // automatically generate dumps
+ dumpPath);
+#endif
+
+ if (!crashServer->Start()) MOZ_CRASH("can't start crash reporter server()");
+
+ pidToMinidump = new ChildMinidumpMap();
+
+ dumpMapLock = new Mutex("CrashReporter::dumpMapLock");
+
+ FindPendingDir();
+ UpdateCrashEventsDir();
+}
+
+static void OOPDeinit() {
+ if (!OOPInitialized()) {
+ NS_WARNING("OOPDeinit() without successful OOPInit()");
+ return;
+ }
+
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+ if (sInjectorThread) {
+ sInjectorThread->Shutdown();
+ NS_RELEASE(sInjectorThread);
+ }
+#endif
+
+ delete crashServer;
+ crashServer = nullptr;
+
+ delete dumpMapLock;
+ dumpMapLock = nullptr;
+
+ delete pidToMinidump;
+ pidToMinidump = nullptr;
+
+#if defined(XP_WIN) || defined(XP_MACOSX)
+ free(childCrashNotifyPipe);
+ childCrashNotifyPipe = nullptr;
+#endif
+}
+
+#if defined(XP_WIN) || defined(XP_MACOSX)
+// Parent-side API for children
+const char* GetChildNotificationPipe() {
+ if (!GetEnabled()) return kNullNotifyPipe;
+
+ MOZ_ASSERT(OOPInitialized());
+
+ return childCrashNotifyPipe;
+}
+#endif
+
+#ifdef MOZ_CRASHREPORTER_INJECTOR
+void InjectCrashReporterIntoProcess(DWORD processID,
+ InjectorCrashCallback* cb) {
+ if (!GetEnabled()) return;
+
+ if (!OOPInitialized()) OOPInit();
+
+ if (!sInjectorThread) {
+ if (NS_FAILED(NS_NewNamedThread("CrashRep Inject", &sInjectorThread)))
+ return;
+ }
+
+ {
+ MutexAutoLock lock(*dumpMapLock);
+ ChildProcessData* pd = pidToMinidump->PutEntry(processID);
+ MOZ_ASSERT(!pd->minidump && !pd->callback);
+ pd->callback = cb;
+ pd->minidumpOnly = true;
+ }
+
+ nsCOMPtr<nsIRunnable> r = new InjectCrashRunnable(processID);
+ sInjectorThread->Dispatch(r, nsIEventTarget::DISPATCH_NORMAL);
+}
+
+NS_IMETHODIMP
+ReportInjectedCrash::Run() {
+ // Crash reporting may have been disabled after this method was dispatched
+ if (!OOPInitialized()) return NS_OK;
+
+ InjectorCrashCallback* cb;
+ {
+ MutexAutoLock lock(*dumpMapLock);
+ ChildProcessData* pd = pidToMinidump->GetEntry(mPID);
+ if (!pd || !pd->callback) return NS_OK;
+
+ MOZ_ASSERT(pd->minidump);
+
+ cb = pd->callback;
+ }
+
+ cb->OnCrash(mPID);
+ return NS_OK;
+}
+
+void UnregisterInjectorCallback(DWORD processID) {
+ if (!OOPInitialized()) return;
+
+ MutexAutoLock lock(*dumpMapLock);
+ pidToMinidump->RemoveEntry(processID);
+}
+
+#endif // MOZ_CRASHREPORTER_INJECTOR
+
+void RegisterChildCrashAnnotationFileDescriptor(ProcessId aProcess,
+ PRFileDesc* aFd) {
+ StaticMutexAutoLock pidMapLock(processMapLock);
+ processToCrashFd[aProcess] = aFd;
+}
+
+void DeregisterChildCrashAnnotationFileDescriptor(ProcessId aProcess) {
+ StaticMutexAutoLock pidMapLock(processMapLock);
+ auto it = processToCrashFd.find(aProcess);
+ if (it != processToCrashFd.end()) {
+ PR_Close(it->second);
+ processToCrashFd.erase(it);
+ }
+}
+
+#if defined(XP_LINUX)
+
+// Parent-side API for children
+bool CreateNotificationPipeForChild(int* childCrashFd, int* childCrashRemapFd) {
+ if (!GetEnabled()) {
+ *childCrashFd = -1;
+ *childCrashRemapFd = -1;
+ return true;
+ }
+
+ MOZ_ASSERT(OOPInitialized());
+
+ *childCrashFd = clientSocketFd;
+ *childCrashRemapFd = gMagicChildCrashReportFd;
+
+ return true;
+}
+
+#endif // defined(XP_LINUX)
+
+bool SetRemoteExceptionHandler(const char* aCrashPipe,
+ FileHandle aCrashTimeAnnotationFile) {
+ MOZ_ASSERT(!gExceptionHandler, "crash client already init'd");
+ RegisterRuntimeExceptionModule();
+ InitializeAnnotationFacilities();
+
+#if defined(XP_WIN)
+ gChildCrashAnnotationReportFd = aCrashTimeAnnotationFile;
+ gExceptionHandler = new google_breakpad::ExceptionHandler(
+ L"", ChildFilter, ChildMinidumpCallback,
+ nullptr, // no callback context
+ google_breakpad::ExceptionHandler::HANDLER_ALL, GetMinidumpType(),
+ NS_ConvertASCIItoUTF16(aCrashPipe).get(), nullptr);
+ gExceptionHandler->set_handle_debug_exceptions(true);
+
+# if defined(HAVE_64BIT_BUILD)
+ SetJitExceptionHandler();
+# endif
+#elif defined(XP_LINUX)
+ // MinidumpDescriptor requires a non-empty path.
+ google_breakpad::MinidumpDescriptor path(".");
+
+ gExceptionHandler = new google_breakpad::ExceptionHandler(
+ path, ChildFilter, ChildMinidumpCallback,
+ nullptr, // no callback context
+ true, // install signal handlers
+ gMagicChildCrashReportFd);
+#elif defined(XP_MACOSX)
+ gExceptionHandler = new google_breakpad::ExceptionHandler(
+ "", ChildFilter, ChildMinidumpCallback,
+ nullptr, // no callback context
+ true, // install signal handlers
+ aCrashPipe);
+#endif
+
+ RecordMainThreadId();
+
+ oldTerminateHandler = std::set_terminate(&TerminateHandler);
+
+ // we either do remote or nothing, no fallback to regular crash reporting
+ return gExceptionHandler->IsOutOfProcess();
+}
+
+void GetAnnotation(uint32_t childPid, Annotation annotation,
+ nsACString& outStr) {
+ if (!GetEnabled()) {
+ return;
+ }
+
+ MutexAutoLock lock(*dumpMapLock);
+
+ ChildProcessData* pd = pidToMinidump->GetEntry(childPid);
+ if (!pd) {
+ return;
+ }
+
+ outStr = (*pd->annotations)[annotation];
+}
+
+bool TakeMinidumpForChild(uint32_t childPid, nsIFile** dump,
+ AnnotationTable& aAnnotations, uint32_t* aSequence) {
+ if (!GetEnabled()) return false;
+
+ MutexAutoLock lock(*dumpMapLock);
+
+ ChildProcessData* pd = pidToMinidump->GetEntry(childPid);
+ if (!pd) return false;
+
+ NS_IF_ADDREF(*dump = pd->minidump);
+ // Only plugin process minidumps taken using the injector don't have
+ // annotations.
+ if (!pd->minidumpOnly) {
+ aAnnotations = *(pd->annotations);
+ }
+ if (aSequence) {
+ *aSequence = pd->sequence;
+ }
+
+ pidToMinidump->RemoveEntry(pd);
+
+ return !!*dump;
+}
+
+bool FinalizeOrphanedMinidump(uint32_t aChildPid, GeckoProcessType aType,
+ nsString* aDumpId) {
+ AnnotationTable annotations;
+ nsCOMPtr<nsIFile> minidump;
+
+ if (!TakeMinidumpForChild(aChildPid, getter_AddRefs(minidump), annotations)) {
+ return false;
+ }
+
+ nsAutoString id;
+ if (!GetIDFromMinidump(minidump, id)) {
+ return false;
+ }
+
+ if (aDumpId) {
+ *aDumpId = id;
+ }
+
+ annotations[Annotation::ProcessType] =
+ XRE_ChildProcessTypeToAnnotation(aType);
+
+ return WriteExtraFile(id, annotations);
+}
+
+#ifdef XP_WIN
+
+// Function invoked by the WER runtime exception handler running in an
+// external process. This function isn't used anywhere inside Gecko directly
+// but rather invoked via CreateRemoteThread() in the main process.
+DWORD WINAPI WerNotifyProc(LPVOID aParameter) {
+ const WindowsErrorReportingData* werData =
+ static_cast<const WindowsErrorReportingData*>(aParameter);
+
+ // Hold the mutex until the current dump request is complete, to
+ // prevent UnsetExceptionHandler() from pulling the rug out from
+ // under us.
+ MutexAutoLock safetyLock(*dumpSafetyLock);
+ if (!isSafeToDump || !ShouldReport()) {
+ return S_OK;
+ }
+
+ ProcessId pid = werData->mChildPid;
+ nsCOMPtr<nsIFile> minidump;
+ if (!GetPendingDir(getter_AddRefs(minidump))) {
+ return S_OK;
+ }
+ xpstring minidump_native_name(werData->mMinidumpFile,
+ werData->mMinidumpFile + 40);
+ nsString minidump_name(minidump_native_name.c_str());
+ minidump->Append(minidump_name);
+
+ {
+ MutexAutoLock lock(*dumpMapLock);
+ ChildProcessData* pd = pidToMinidump->PutEntry(pid);
+ MOZ_ASSERT(!pd->minidump);
+ pd->minidump = minidump;
+ pd->sequence = ++crashSequence;
+ pd->annotations = MakeUnique<AnnotationTable>();
+ (*pd->annotations)[Annotation::WindowsErrorReporting] = "1"_ns;
+ if (werData->mOOMAllocationSize > 0) {
+ char buffer[32] = {};
+ XP_STOA(werData->mOOMAllocationSize, buffer);
+ (*pd->annotations)[Annotation::OOMAllocationSize] = buffer;
+ }
+
+ PopulateContentProcessAnnotations(*(pd->annotations));
+ }
+
+ return S_OK;
+}
+
+#endif // XP_WIN
+
+//-----------------------------------------------------------------------------
+// CreateMinidumpsAndPair() and helpers
+//
+
+/*
+ * Renames the stand alone dump file aDumpFile to:
+ * |aOwnerDumpFile-aDumpFileProcessType.dmp|
+ * and moves it into the same directory as aOwnerDumpFile. Does not
+ * modify aOwnerDumpFile in any way.
+ *
+ * @param aDumpFile - the dump file to associate with aOwnerDumpFile.
+ * @param aOwnerDumpFile - the new owner of aDumpFile.
+ * @param aDumpFileProcessType - process name associated with aDumpFile.
+ */
+static void RenameAdditionalHangMinidump(nsIFile* minidump,
+ nsIFile* childMinidump,
+ const nsACString& name) {
+ nsCOMPtr<nsIFile> directory;
+ childMinidump->GetParent(getter_AddRefs(directory));
+ if (!directory) return;
+
+ nsAutoCString leafName;
+ childMinidump->GetNativeLeafName(leafName);
+
+ // turn "<id>.dmp" into "<id>-<name>.dmp
+ leafName.Insert("-"_ns + name, leafName.Length() - 4);
+
+ if (NS_FAILED(minidump->MoveToNative(directory, leafName))) {
+ NS_WARNING("RenameAdditionalHangMinidump failed to move minidump.");
+ }
+}
+
+// Stores the minidump in the nsIFile pointed by the |context| parameter.
+static bool PairedDumpCallback(
+#ifdef XP_LINUX
+ const MinidumpDescriptor& descriptor,
+#else
+ const XP_CHAR* dump_path, const XP_CHAR* minidump_id,
+#endif
+ void* context,
+#ifdef XP_WIN
+ EXCEPTION_POINTERS* /*unused*/, MDRawAssertionInfo* /*unused*/,
+#endif
+ const phc::AddrInfo* addrInfo, bool succeeded) {
+ XP_CHAR* path = static_cast<XP_CHAR*>(context);
+ size_t size = XP_PATH_MAX;
+
+#ifdef XP_LINUX
+ Concat(path, descriptor.path(), &size);
+#else
+ path = Concat(path, dump_path, &size);
+ path = Concat(path, XP_PATH_SEPARATOR, &size);
+ path = Concat(path, minidump_id, &size);
+ Concat(path, dumpFileExtension, &size);
+#endif
+
+ return true;
+}
+
+ThreadId CurrentThreadId() {
+#if defined(XP_WIN)
+ return ::GetCurrentThreadId();
+#elif defined(XP_LINUX)
+ return sys_gettid();
+#elif defined(XP_MACOSX)
+ // Just return an index, since Mach ports can't be directly serialized
+ thread_act_port_array_t threads_for_task;
+ mach_msg_type_number_t thread_count;
+
+ if (task_threads(mach_task_self(), &threads_for_task, &thread_count))
+ return -1;
+
+ for (unsigned int i = 0; i < thread_count; ++i) {
+ if (threads_for_task[i] == mach_thread_self()) return i;
+ }
+ abort();
+#else
+# error "Unsupported platform"
+#endif
+}
+
+#ifdef XP_MACOSX
+static mach_port_t GetChildThread(ProcessHandle childPid,
+ ThreadId childBlamedThread) {
+ mach_port_t childThread = MACH_PORT_NULL;
+ thread_act_port_array_t threads_for_task;
+ mach_msg_type_number_t thread_count;
+
+ if (task_threads(childPid, &threads_for_task, &thread_count) ==
+ KERN_SUCCESS &&
+ childBlamedThread < thread_count) {
+ childThread = threads_for_task[childBlamedThread];
+ }
+
+ return childThread;
+}
+#endif
+
+bool CreateMinidumpsAndPair(ProcessHandle aTargetHandle,
+ ThreadId aTargetBlamedThread,
+ const nsACString& aIncomingPairName,
+ AnnotationTable& aTargetAnnotations,
+ nsIFile** aMainDumpOut) {
+ if (!GetEnabled()) {
+ return false;
+ }
+
+ AutoIOInterposerDisable disableIOInterposition;
+
+#ifdef XP_MACOSX
+ mach_port_t targetThread = GetChildThread(aTargetHandle, aTargetBlamedThread);
+#else
+ ThreadId targetThread = aTargetBlamedThread;
+#endif
+
+ xpstring dump_path;
+#ifndef XP_LINUX
+ dump_path = gExceptionHandler->dump_path();
+#else
+ dump_path = gExceptionHandler->minidump_descriptor().directory();
+#endif
+
+ // Ugly, but due to Breakpad limitations we can't allocate memory in the
+ // callback when generating a dump of the calling process.
+ XP_CHAR minidumpPath[XP_PATH_MAX] = {};
+
+ // dump the target
+ if (!google_breakpad::ExceptionHandler::WriteMinidumpForChild(
+ aTargetHandle, targetThread, dump_path, PairedDumpCallback,
+ static_cast<void*>(minidumpPath)
+#ifdef XP_WIN
+ ,
+ GetMinidumpType()
+#endif
+ )) {
+ return false;
+ }
+
+ nsCOMPtr<nsIFile> targetMinidump;
+ CreateFileFromPath(xpstring(minidumpPath), getter_AddRefs(targetMinidump));
+
+ // Create a dump of this process.
+ if (!google_breakpad::ExceptionHandler::WriteMinidump(
+ dump_path,
+#ifdef XP_MACOSX
+ true,
+#endif
+ PairedDumpCallback, static_cast<void*>(minidumpPath)
+#ifdef XP_WIN
+ ,
+ GetMinidumpType()
+#endif
+ )) {
+ targetMinidump->Remove(false);
+ return false;
+ }
+
+ nsCOMPtr<nsIFile> incomingDump;
+ CreateFileFromPath(xpstring(minidumpPath), getter_AddRefs(incomingDump));
+
+ RenameAdditionalHangMinidump(incomingDump, targetMinidump, aIncomingPairName);
+
+ if (ShouldReport()) {
+ MoveToPending(targetMinidump, nullptr, nullptr);
+ MoveToPending(incomingDump, nullptr, nullptr);
+ }
+#if defined(DEBUG) && defined(HAS_DLL_BLOCKLIST)
+ DllBlocklist_Shutdown();
+#endif
+
+ PopulateContentProcessAnnotations(aTargetAnnotations);
+ if (FlushContentProcessAnnotations(aTargetHandle)) {
+ ProcessId targetPid = base::GetProcId(aTargetHandle);
+ ReadExceptionTimeAnnotations(aTargetAnnotations, targetPid);
+ }
+
+ targetMinidump.forget(aMainDumpOut);
+
+ return true;
+}
+
+bool UnsetRemoteExceptionHandler(bool wasSet) {
+ // On Linux we don't unset breakpad's exception handler if the sandbox is
+ // enabled because it requires invoking `sigaltstack` and we don't want to
+ // allow that syscall in the sandbox. See bug 1622452.
+#if !defined(XP_LINUX) || !defined(MOZ_SANDBOX)
+ if (wasSet) {
+ std::set_terminate(oldTerminateHandler);
+ delete gExceptionHandler;
+ gExceptionHandler = nullptr;
+ }
+#endif
+ TeardownAnnotationFacilities();
+
+ return true;
+}
+
+#if defined(MOZ_WIDGET_ANDROID)
+void SetNotificationPipeForChild(int childCrashFd) {
+ gMagicChildCrashReportFd = childCrashFd;
+}
+
+void SetCrashAnnotationPipeForChild(int childCrashAnnotationFd) {
+ gChildCrashAnnotationReportFd = childCrashAnnotationFd;
+}
+#endif
+
+} // namespace CrashReporter