summaryrefslogtreecommitdiffstats
path: root/toolkit/crashreporter/mozwer-rust/lib.rs
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--toolkit/crashreporter/mozwer-rust/lib.rs1005
1 files changed, 1005 insertions, 0 deletions
diff --git a/toolkit/crashreporter/mozwer-rust/lib.rs b/toolkit/crashreporter/mozwer-rust/lib.rs
new file mode 100644
index 0000000000..fab6c4f85c
--- /dev/null
+++ b/toolkit/crashreporter/mozwer-rust/lib.rs
@@ -0,0 +1,1005 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at https://mozilla.org/MPL/2.0/. */
+
+extern crate ini;
+extern crate winapi;
+
+use ini::Ini;
+use libc::time;
+use serde::Serialize;
+use serde_json::ser::to_writer;
+use std::convert::TryInto;
+use std::ffi::OsString;
+use std::fs::{read_to_string, File};
+use std::io::{BufRead, BufReader, Write};
+use std::mem::{size_of, zeroed};
+use std::os::windows::ffi::{OsStrExt, OsStringExt};
+use std::os::windows::io::AsRawHandle;
+use std::path::{Path, PathBuf};
+use std::ptr::{addr_of_mut, null, null_mut};
+use std::slice::from_raw_parts;
+use uuid::Uuid;
+use winapi::shared::basetsd::{SIZE_T, ULONG_PTR};
+use winapi::shared::minwindef::{
+ BOOL, BYTE, DWORD, FALSE, FILETIME, LPVOID, MAX_PATH, PBOOL, PDWORD, PULONG, TRUE, ULONG, WORD,
+};
+use winapi::shared::ntdef::{NTSTATUS, STRING, UNICODE_STRING};
+use winapi::shared::ntstatus::STATUS_SUCCESS;
+use winapi::shared::winerror::{E_UNEXPECTED, S_OK};
+use winapi::um::combaseapi::CoTaskMemFree;
+use winapi::um::handleapi::CloseHandle;
+use winapi::um::knownfolders::FOLDERID_RoamingAppData;
+use winapi::um::memoryapi::{ReadProcessMemory, WriteProcessMemory};
+use winapi::um::minwinbase::LPTHREAD_START_ROUTINE;
+use winapi::um::processthreadsapi::{
+ CreateProcessW, CreateRemoteThread, GetProcessId, GetProcessTimes, GetThreadId, OpenProcess,
+ TerminateProcess, PROCESS_INFORMATION, STARTUPINFOW,
+};
+use winapi::um::psapi::K32GetModuleFileNameExW;
+use winapi::um::shlobj::SHGetKnownFolderPath;
+use winapi::um::synchapi::WaitForSingleObject;
+use winapi::um::winbase::{
+ VerifyVersionInfoW, CREATE_NO_WINDOW, CREATE_UNICODE_ENVIRONMENT, NORMAL_PRIORITY_CLASS,
+ WAIT_OBJECT_0,
+};
+use winapi::um::winnt::{
+ VerSetConditionMask, CONTEXT, DWORDLONG, EXCEPTION_POINTERS, EXCEPTION_RECORD, HANDLE, HRESULT,
+ LIST_ENTRY, LPOSVERSIONINFOEXW, OSVERSIONINFOEXW, PCWSTR, PEXCEPTION_POINTERS,
+ PROCESS_ALL_ACCESS, PVOID, PWSTR, VER_GREATER_EQUAL, VER_MAJORVERSION, VER_MINORVERSION,
+ VER_SERVICEPACKMAJOR, VER_SERVICEPACKMINOR,
+};
+use winapi::STRUCT;
+
+/* The following struct must be kept in sync with the identically named one in
+ * nsExceptionHandler.h. There is one copy of this structure for every child
+ * process and they are all stored within the main process'. WER will use it to
+ * communicate with the main process when a child process is encountered. */
+#[repr(C)]
+struct WindowsErrorReportingData {
+ wer_notify_proc: LPTHREAD_START_ROUTINE,
+ child_pid: DWORD,
+ minidump_name: [u8; 40],
+ oom_allocation_size: usize,
+}
+
+/* The following struct must be kept in sync with the identically named one in
+ * nsExceptionHandler.h. A copy of this is stored in every process and a pointer
+ * to it is passed to the runtime exception module. We will read it to gather
+ * information about the crashed process. */
+#[repr(C)]
+struct InProcessWindowsErrorReportingData {
+ process_type: u32,
+ oom_allocation_size_ptr: *mut usize,
+}
+
+// This value comes from GeckoProcessTypes.h
+static MAIN_PROCESS_TYPE: u32 = 0;
+
+#[no_mangle]
+pub extern "C" fn OutOfProcessExceptionEventCallback(
+ context: PVOID,
+ exception_information: PWER_RUNTIME_EXCEPTION_INFORMATION,
+ b_ownership_claimed: PBOOL,
+ _wsz_event_name: PWSTR,
+ _pch_size: PDWORD,
+ _dw_signature_count: PDWORD,
+) -> HRESULT {
+ let result = out_of_process_exception_event_callback(context, exception_information);
+
+ match result {
+ Ok(_) => {
+ unsafe {
+ // Inform WER that we claim ownership of this crash
+ *b_ownership_claimed = TRUE;
+ // Make sure that the process shuts down
+ TerminateProcess((*exception_information).hProcess, 1);
+ }
+ S_OK
+ }
+ Err(_) => E_UNEXPECTED,
+ }
+}
+
+#[no_mangle]
+pub extern "C" fn OutOfProcessExceptionEventSignatureCallback(
+ _context: PVOID,
+ _exception_information: PWER_RUNTIME_EXCEPTION_INFORMATION,
+ _w_index: DWORD,
+ _wsz_name: PWSTR,
+ _ch_name: PDWORD,
+ _wsz_value: PWSTR,
+ _ch_value: PDWORD,
+) -> HRESULT {
+ S_OK
+}
+
+#[no_mangle]
+pub extern "C" fn OutOfProcessExceptionEventDebuggerLaunchCallback(
+ _context: PVOID,
+ _exception_information: PWER_RUNTIME_EXCEPTION_INFORMATION,
+ b_is_custom_debugger: PBOOL,
+ _wsz_debugger_launch: PWSTR,
+ _ch_debugger_launch: PDWORD,
+ _b_is_debugger_autolaunch: PBOOL,
+) -> HRESULT {
+ unsafe {
+ *b_is_custom_debugger = FALSE;
+ }
+
+ S_OK
+}
+
+fn out_of_process_exception_event_callback(
+ context: PVOID,
+ exception_information: PWER_RUNTIME_EXCEPTION_INFORMATION,
+) -> Result<(), ()> {
+ let is_fatal = unsafe { (*exception_information).bIsFatal } != FALSE;
+ if !is_fatal {
+ return Ok(());
+ }
+
+ let process = unsafe { (*exception_information).hProcess };
+ let application_info = ApplicationInformation::from_process(process)?;
+ let wer_data = read_from_process::<InProcessWindowsErrorReportingData>(
+ process,
+ context as *mut InProcessWindowsErrorReportingData,
+ )?;
+ let process = unsafe { (*exception_information).hProcess };
+ let startup_time = get_startup_time(process)?;
+ let oom_allocation_size = get_oom_allocation_size(process, &wer_data);
+ let crash_report = CrashReport::new(&application_info, startup_time, oom_allocation_size);
+ crash_report.write_minidump(exception_information)?;
+ if wer_data.process_type == MAIN_PROCESS_TYPE {
+ handle_main_process_crash(crash_report, process, &application_info)
+ } else {
+ handle_child_process_crash(crash_report, process)
+ }
+}
+
+fn handle_main_process_crash(
+ crash_report: CrashReport,
+ process: HANDLE,
+ application_information: &ApplicationInformation,
+) -> Result<(), ()> {
+ crash_report.write_extra_file()?;
+ crash_report.write_event_file()?;
+
+ let mut environment = read_environment_block(process)?;
+ launch_crash_reporter_client(
+ &application_information.install_path,
+ &mut environment,
+ &crash_report,
+ );
+
+ Ok(())
+}
+
+fn handle_child_process_crash(crash_report: CrashReport, child_process: HANDLE) -> Result<(), ()> {
+ let command_line = read_command_line(child_process)?;
+ let (parent_pid, data_ptr) = parse_child_data(&command_line)?;
+
+ let parent_process = get_process_handle(parent_pid)?;
+ let mut wer_data: WindowsErrorReportingData = read_from_process(parent_process, data_ptr)?;
+ wer_data.child_pid = get_process_id(child_process)?;
+ wer_data.minidump_name = crash_report.get_minidump_name();
+ wer_data.oom_allocation_size = crash_report.oom_allocation_size;
+ let wer_notify_proc = wer_data.wer_notify_proc;
+ write_to_process(parent_process, wer_data, data_ptr)?;
+ notify_main_process(parent_process, wer_notify_proc, data_ptr)
+}
+
+fn read_from_process<T>(process: HANDLE, data_ptr: *mut T) -> Result<T, ()> {
+ let mut data: T = unsafe { zeroed() };
+ let res = unsafe {
+ ReadProcessMemory(
+ process,
+ data_ptr as *mut _,
+ addr_of_mut!(data) as *mut _,
+ size_of::<T>() as SIZE_T,
+ null_mut(),
+ )
+ };
+
+ bool_ok_or_err(res, data)
+}
+
+fn read_array_from_process<T: Clone + Default>(
+ process: HANDLE,
+ data_ptr: LPVOID,
+ count: usize,
+) -> Result<Vec<T>, ()> {
+ let mut array = vec![Default::default(); count];
+ let size = size_of::<T>() as SIZE_T;
+ let size = size.checked_mul(count).ok_or(())?;
+ let res = unsafe {
+ ReadProcessMemory(
+ process,
+ data_ptr,
+ array.as_mut_ptr() as *mut _,
+ size,
+ null_mut(),
+ )
+ };
+
+ bool_ok_or_err(res, array)
+}
+
+fn write_to_process<T>(process: HANDLE, mut data: T, data_ptr: *mut T) -> Result<(), ()> {
+ let res = unsafe {
+ WriteProcessMemory(
+ process,
+ data_ptr as LPVOID,
+ addr_of_mut!(data) as *mut _,
+ size_of::<T>() as SIZE_T,
+ null_mut(),
+ )
+ };
+
+ bool_ok_or_err(res, ())
+}
+
+fn notify_main_process(
+ process: HANDLE,
+ wer_notify_proc: LPTHREAD_START_ROUTINE,
+ data_ptr: *mut WindowsErrorReportingData,
+) -> Result<(), ()> {
+ let thread = unsafe {
+ CreateRemoteThread(
+ process,
+ null_mut(),
+ 0,
+ wer_notify_proc,
+ data_ptr as LPVOID,
+ 0,
+ null_mut(),
+ )
+ };
+
+ if thread == null_mut() {
+ return Err(());
+ }
+
+ // Don't wait forever as we want the process to get killed eventually
+ let res = unsafe { WaitForSingleObject(thread, 5000) };
+ if res != WAIT_OBJECT_0 {
+ return Err(());
+ }
+
+ let res = unsafe { CloseHandle(thread) };
+ bool_ok_or_err(res, ())
+}
+
+fn get_startup_time(process: HANDLE) -> Result<u64, ()> {
+ let mut create_time: FILETIME = Default::default();
+ let mut exit_time: FILETIME = Default::default();
+ let mut kernel_time: FILETIME = Default::default();
+ let mut user_time: FILETIME = Default::default();
+ unsafe {
+ if GetProcessTimes(
+ process,
+ &mut create_time as *mut _,
+ &mut exit_time as *mut _,
+ &mut kernel_time as *mut _,
+ &mut user_time as *mut _,
+ ) == 0
+ {
+ return Err(());
+ }
+ }
+ let start_time_in_ticks =
+ ((create_time.dwHighDateTime as u64) << 32) + create_time.dwLowDateTime as u64;
+ let windows_tick: u64 = 10000000;
+ let sec_to_unix_epoch = 11644473600;
+ Ok((start_time_in_ticks / windows_tick) - sec_to_unix_epoch)
+}
+
+fn get_oom_allocation_size(
+ process: HANDLE,
+ wer_data: &InProcessWindowsErrorReportingData,
+) -> usize {
+ read_from_process(process, wer_data.oom_allocation_size_ptr).unwrap_or(0)
+}
+
+fn parse_child_data(command_line: &str) -> Result<(DWORD, *mut WindowsErrorReportingData), ()> {
+ let mut itr = command_line.rsplit(' ');
+ let address = itr.nth(1).ok_or(())?;
+ let address = usize::from_str_radix(address, 16).map_err(|_err| (()))?;
+ let address = address as *mut WindowsErrorReportingData;
+ let parent_pid = itr.nth(2).ok_or(())?;
+ let parent_pid = u32::from_str_radix(parent_pid, 10).map_err(|_err| (()))?;
+
+ Ok((parent_pid, address))
+}
+
+fn get_process_id(process: HANDLE) -> Result<DWORD, ()> {
+ match unsafe { GetProcessId(process) } {
+ 0 => Err(()),
+ pid => Ok(pid),
+ }
+}
+
+fn get_process_handle(pid: DWORD) -> Result<HANDLE, ()> {
+ let handle = unsafe { OpenProcess(PROCESS_ALL_ACCESS, FALSE, pid) };
+ if handle != null_mut() {
+ Ok(handle)
+ } else {
+ Err(())
+ }
+}
+
+fn launch_crash_reporter_client(
+ install_path: &Path,
+ environment: &mut Vec<u16>,
+ crash_report: &CrashReport,
+) {
+ // Prepare the command line
+ let client_path = install_path.join("crashreporter.exe");
+
+ let mut cmd_line = OsString::from("\"");
+ cmd_line.push(client_path);
+ cmd_line.push("\" \"");
+ cmd_line.push(crash_report.get_minidump_path());
+ cmd_line.push("\"\0");
+ let mut cmd_line: Vec<u16> = cmd_line.encode_wide().collect();
+
+ let mut pi: PROCESS_INFORMATION = Default::default();
+ let mut si = STARTUPINFOW {
+ cb: size_of::<STARTUPINFOW>().try_into().unwrap(),
+ ..Default::default()
+ };
+
+ unsafe {
+ if CreateProcessW(
+ null_mut(),
+ cmd_line.as_mut_ptr(),
+ null_mut(),
+ null_mut(),
+ FALSE,
+ NORMAL_PRIORITY_CLASS | CREATE_NO_WINDOW | CREATE_UNICODE_ENVIRONMENT,
+ environment.as_mut_ptr() as *mut _,
+ null_mut(),
+ &mut si,
+ &mut pi,
+ ) != 0
+ {
+ CloseHandle(pi.hProcess);
+ CloseHandle(pi.hThread);
+ }
+ }
+}
+
+#[derive(Debug)]
+struct ApplicationData {
+ vendor: Option<String>,
+ name: String,
+ version: String,
+ build_id: String,
+ product_id: String,
+ server_url: String,
+}
+
+impl ApplicationData {
+ fn load_from_disk(install_path: &Path) -> Result<ApplicationData, ()> {
+ let ini_path = ApplicationData::get_path(install_path);
+ let conf = Ini::load_from_file(ini_path).map_err(|_e| ())?;
+
+ // Parse the "App" section
+ let app_section = conf.section(Some("App")).ok_or(())?;
+ let vendor = app_section.get("Vendor").map(|s| s.to_owned());
+ let name = app_section.get("Name").ok_or(())?.to_owned();
+ let version = app_section.get("Version").ok_or(())?.to_owned();
+ let build_id = app_section.get("BuildID").ok_or(())?.to_owned();
+ let product_id = app_section.get("ID").ok_or(())?.to_owned();
+
+ // Parse the "Crash Reporter" section
+ let crash_reporter_section = conf.section(Some("Crash Reporter")).ok_or(())?;
+ let server_url = crash_reporter_section
+ .get("ServerURL")
+ .ok_or(())?
+ .to_owned();
+
+ // InstallTime<build_id>
+
+ Ok(ApplicationData {
+ vendor,
+ name,
+ version,
+ build_id,
+ product_id,
+ server_url,
+ })
+ }
+
+ fn get_path(install_path: &Path) -> PathBuf {
+ install_path.join("application.ini")
+ }
+}
+
+#[derive(Serialize)]
+#[allow(non_snake_case)]
+struct Annotations {
+ BuildID: String,
+ CrashTime: String,
+ InstallTime: String,
+ #[serde(skip_serializing_if = "Option::is_none")]
+ OOMAllocationSize: Option<String>,
+ ProductID: String,
+ ProductName: String,
+ ReleaseChannel: String,
+ ServerURL: String,
+ StartupTime: String,
+ UptimeTS: String,
+ #[serde(skip_serializing_if = "Option::is_none")]
+ Vendor: Option<String>,
+ Version: String,
+ WindowsErrorReporting: String,
+}
+
+impl Annotations {
+ fn from_application_data(
+ application_data: &ApplicationData,
+ release_channel: String,
+ install_time: String,
+ crash_time: u64,
+ startup_time: u64,
+ oom_allocation_size: usize,
+ ) -> Annotations {
+ let oom_allocation_size = if oom_allocation_size != 0 {
+ Some(oom_allocation_size.to_string())
+ } else {
+ None
+ };
+ Annotations {
+ BuildID: application_data.build_id.clone(),
+ CrashTime: crash_time.to_string(),
+ InstallTime: install_time,
+ OOMAllocationSize: oom_allocation_size,
+ ProductID: application_data.product_id.clone(),
+ ProductName: application_data.name.clone(),
+ ReleaseChannel: release_channel,
+ ServerURL: application_data.server_url.clone(),
+ StartupTime: startup_time.to_string(),
+ UptimeTS: (crash_time - startup_time).to_string() + ".0",
+ Vendor: application_data.vendor.clone(),
+ Version: application_data.version.clone(),
+ WindowsErrorReporting: "1".to_string(),
+ }
+ }
+}
+
+/// Encapsulates the information about the application that crashed. This includes the install path as well as version information
+struct ApplicationInformation {
+ install_path: PathBuf,
+ application_data: ApplicationData,
+ release_channel: String,
+ crash_reports_dir: PathBuf,
+ install_time: String,
+}
+
+impl ApplicationInformation {
+ fn from_process(process: HANDLE) -> Result<ApplicationInformation, ()> {
+ let mut install_path = ApplicationInformation::get_application_path(process)?;
+ install_path.pop();
+ let application_data = ApplicationData::load_from_disk(install_path.as_ref())?;
+ let release_channel = ApplicationInformation::get_release_channel(install_path.as_ref())?;
+ let crash_reports_dir = ApplicationInformation::get_crash_reports_dir(&application_data)?;
+ let install_time = ApplicationInformation::get_install_time(
+ &crash_reports_dir,
+ &application_data.build_id,
+ )?;
+
+ Ok(ApplicationInformation {
+ install_path,
+ application_data,
+ release_channel,
+ crash_reports_dir,
+ install_time,
+ })
+ }
+
+ fn get_application_path(process: HANDLE) -> Result<PathBuf, ()> {
+ let mut path: [u16; MAX_PATH + 1] = [0; MAX_PATH + 1];
+ unsafe {
+ let res = K32GetModuleFileNameExW(
+ process,
+ null_mut(),
+ (&mut path).as_mut_ptr(),
+ (MAX_PATH + 1) as DWORD,
+ );
+
+ if res == 0 {
+ return Err(());
+ }
+
+ let application_path = PathBuf::from(OsString::from_wide(&path[0..res as usize]));
+ Ok(application_path)
+ }
+ }
+
+ fn get_release_channel(install_path: &Path) -> Result<String, ()> {
+ let channel_prefs =
+ File::open(install_path.join("defaults/pref/channel-prefs.js")).map_err(|_e| ())?;
+ let lines = BufReader::new(channel_prefs).lines();
+ let line = lines
+ .filter_map(Result::ok)
+ .find(|line| line.contains("app.update.channel"))
+ .ok_or(())?;
+ line.split("\"").nth(3).map(|s| s.to_string()).ok_or(())
+ }
+
+ fn get_crash_reports_dir(application_data: &ApplicationData) -> Result<PathBuf, ()> {
+ let mut psz_path: PWSTR = null_mut();
+ unsafe {
+ let res = SHGetKnownFolderPath(
+ &FOLDERID_RoamingAppData as *const _,
+ 0,
+ null_mut(),
+ &mut psz_path as *mut _,
+ );
+
+ if res == S_OK {
+ let mut len = 0;
+ while psz_path.offset(len).read() != 0 {
+ len += 1;
+ }
+ let str = OsString::from_wide(from_raw_parts(psz_path, len as usize));
+ CoTaskMemFree(psz_path as _);
+ let mut path = PathBuf::from(str);
+ if let Some(vendor) = &application_data.vendor {
+ path.push(vendor);
+ }
+ path.push(&application_data.name);
+ path.push("Crash Reports");
+ Ok(path)
+ } else {
+ Err(())
+ }
+ }
+ }
+
+ fn get_install_time(crash_reports_path: &Path, build_id: &str) -> Result<String, ()> {
+ let file_name = "InstallTime".to_owned() + build_id;
+ let file_path = crash_reports_path.join(file_name);
+ read_to_string(file_path).map_err(|_e| ())
+ }
+}
+
+struct CrashReport {
+ uuid: String,
+ crash_reports_path: PathBuf,
+ release_channel: String,
+ annotations: Annotations,
+ crash_time: u64,
+ oom_allocation_size: usize,
+}
+
+impl CrashReport {
+ fn new(
+ application_information: &ApplicationInformation,
+ startup_time: u64,
+ oom_allocation_size: usize,
+ ) -> CrashReport {
+ let uuid = Uuid::new_v4()
+ .as_hyphenated()
+ .encode_lower(&mut Uuid::encode_buffer())
+ .to_owned();
+ let crash_reports_path = application_information.crash_reports_dir.clone();
+ let crash_time: u64 = unsafe { time(null_mut()) as u64 };
+ let annotations = Annotations::from_application_data(
+ &application_information.application_data,
+ application_information.release_channel.clone(),
+ application_information.install_time.clone(),
+ crash_time,
+ startup_time,
+ oom_allocation_size,
+ );
+ CrashReport {
+ uuid,
+ crash_reports_path,
+ release_channel: application_information.release_channel.clone(),
+ annotations,
+ crash_time,
+ oom_allocation_size,
+ }
+ }
+
+ fn is_nightly(&self) -> bool {
+ self.release_channel == "nightly" || self.release_channel == "default"
+ }
+
+ fn get_minidump_type(&self) -> MINIDUMP_TYPE {
+ let mut minidump_type = MiniDumpWithFullMemoryInfo | MiniDumpWithUnloadedModules;
+ if self.is_nightly() {
+ // This is Nightly only because this doubles the size of minidumps based
+ // on the experimental data.
+ minidump_type = minidump_type | MiniDumpWithProcessThreadData;
+
+ // dbghelp.dll on Win7 can't handle overlapping memory regions so we only
+ // enable this feature on Win8 or later.
+ if is_windows8_or_later() {
+ // This allows us to examine heap objects referenced from stack objects
+ // at the cost of further doubling the size of minidumps.
+ minidump_type = minidump_type | MiniDumpWithIndirectlyReferencedMemory
+ }
+ }
+ minidump_type
+ }
+
+ fn get_pending_path(&self) -> PathBuf {
+ self.crash_reports_path.join("pending")
+ }
+
+ fn get_events_path(&self) -> PathBuf {
+ self.crash_reports_path.join("events")
+ }
+
+ fn get_minidump_path(&self) -> PathBuf {
+ self.get_pending_path().join(self.uuid.to_string() + ".dmp")
+ }
+
+ fn get_minidump_name(&self) -> [u8; 40] {
+ let bytes = (self.uuid.to_string() + ".dmp").into_bytes();
+ bytes[0..40].try_into().unwrap()
+ }
+
+ fn get_extra_file_path(&self) -> PathBuf {
+ self.get_pending_path()
+ .join(self.uuid.to_string() + ".extra")
+ }
+
+ fn get_event_file_path(&self) -> PathBuf {
+ self.get_events_path().join(self.uuid.to_string())
+ }
+
+ fn write_minidump(
+ &self,
+ exception_information: PWER_RUNTIME_EXCEPTION_INFORMATION,
+ ) -> Result<(), ()> {
+ let minidump_path = self.get_minidump_path();
+ let minidump_file = File::create(minidump_path).map_err(|_e| ())?;
+ let minidump_type: MINIDUMP_TYPE = self.get_minidump_type();
+
+ unsafe {
+ let mut exception_pointers = EXCEPTION_POINTERS {
+ ExceptionRecord: &mut ((*exception_information).exceptionRecord),
+ ContextRecord: &mut ((*exception_information).context),
+ };
+
+ let mut exception = MINIDUMP_EXCEPTION_INFORMATION {
+ ThreadId: GetThreadId((*exception_information).hThread),
+ ExceptionPointers: &mut exception_pointers,
+ ClientPointers: FALSE,
+ };
+
+ let res = MiniDumpWriteDump(
+ (*exception_information).hProcess,
+ get_process_id((*exception_information).hProcess)?,
+ minidump_file.as_raw_handle() as _,
+ minidump_type,
+ &mut exception,
+ /* userStream */ null(),
+ /* callback */ null(),
+ );
+
+ bool_ok_or_err(res, ())
+ }
+ }
+
+ fn write_extra_file(&self) -> Result<(), ()> {
+ let extra_file = File::create(self.get_extra_file_path()).map_err(|_e| ())?;
+ to_writer(extra_file, &self.annotations).map_err(|_e| ())
+ }
+
+ fn write_event_file(&self) -> Result<(), ()> {
+ let mut event_file = File::create(self.get_event_file_path()).map_err(|_e| ())?;
+ writeln!(event_file, "crash.main.3").map_err(|_e| ())?;
+ writeln!(event_file, "{}", self.crash_time).map_err(|_e| ())?;
+ writeln!(event_file, "{}", self.uuid).map_err(|_e| ())?;
+ to_writer(event_file, &self.annotations).map_err(|_e| ())
+ }
+}
+
+fn is_windows8_or_later() -> bool {
+ let mut info = OSVERSIONINFOEXW {
+ dwOSVersionInfoSize: size_of::<OSVERSIONINFOEXW>().try_into().unwrap(),
+ dwMajorVersion: 6,
+ dwMinorVersion: 2,
+ ..Default::default()
+ };
+
+ unsafe {
+ let mut mask: DWORDLONG = 0;
+ mask = VerSetConditionMask(mask, VER_MAJORVERSION, VER_GREATER_EQUAL);
+ mask = VerSetConditionMask(mask, VER_MINORVERSION, VER_GREATER_EQUAL);
+ mask = VerSetConditionMask(mask, VER_SERVICEPACKMAJOR, VER_GREATER_EQUAL);
+ mask = VerSetConditionMask(mask, VER_SERVICEPACKMINOR, VER_GREATER_EQUAL);
+
+ let res = VerifyVersionInfoW(
+ &mut info as LPOSVERSIONINFOEXW,
+ VER_MAJORVERSION | VER_MINORVERSION | VER_SERVICEPACKMAJOR | VER_SERVICEPACKMINOR,
+ mask,
+ );
+
+ res != FALSE
+ }
+}
+
+fn bool_ok_or_err<T>(res: BOOL, data: T) -> Result<T, ()> {
+ match res {
+ FALSE => Err(()),
+ _ => Ok(data),
+ }
+}
+
+fn read_environment_block(process: HANDLE) -> Result<Vec<u16>, ()> {
+ let upp = read_user_process_parameters(process)?;
+
+ // Read the environment
+ let buffer = upp.Environment;
+ let length = upp.EnvironmentSize;
+ let count = length as usize / 2;
+ read_array_from_process::<u16>(process, buffer, count)
+}
+
+fn read_command_line(process: HANDLE) -> Result<String, ()> {
+ let upp = read_user_process_parameters(process)?;
+
+ // Read the command-line
+ let buffer = upp.CommandLine.Buffer;
+ let length = upp.CommandLine.Length;
+ let count = (length as usize) / 2;
+ let command_line = read_array_from_process::<u16>(process, buffer as *mut _, count)?;
+ String::from_utf16(&command_line).map_err(|_err| ())
+}
+
+fn read_user_process_parameters(process: HANDLE) -> Result<RTL_USER_PROCESS_PARAMETERS, ()> {
+ let mut pbi: PROCESS_BASIC_INFORMATION = unsafe { zeroed() };
+ let mut length: ULONG = 0;
+ let result = unsafe {
+ NtQueryInformationProcess(
+ process,
+ ProcessBasicInformation,
+ &mut pbi as *mut _ as _,
+ size_of::<PROCESS_BASIC_INFORMATION>().try_into().unwrap(),
+ &mut length,
+ )
+ };
+
+ if result != STATUS_SUCCESS {
+ return Err(());
+ }
+
+ // Read the process environment block
+ let peb: PEB = read_from_process(process, pbi.PebBaseAddress)?;
+
+ // Read the user process parameters
+ read_from_process::<RTL_USER_PROCESS_PARAMETERS>(process, peb.ProcessParameters)
+}
+
+/******************************************************************************
+ * The stuff below should be migrated to the winapi crate, see bug 1696414 *
+ ******************************************************************************/
+
+// we can't use winapi's ENUM macro directly because it doesn't support
+// attributes, so let's define this one here until we migrate this code
+macro_rules! ENUM {
+ {enum $name:ident { $($variant:ident = $value:expr,)+ }} => {
+ #[allow(non_camel_case_types)] pub type $name = u32;
+ $(#[allow(non_upper_case_globals)] pub const $variant: $name = $value;)+
+ };
+}
+
+// winapi doesn't export the FN macro, so we duplicate it here
+macro_rules! FN {
+ (stdcall $func:ident($($t:ty,)*) -> $ret:ty) => (
+ #[allow(non_camel_case_types)] pub type $func = Option<unsafe extern "system" fn($($t,)*) -> $ret>;
+ );
+ (stdcall $func:ident($($p:ident: $t:ty,)*) -> $ret:ty) => (
+ #[allow(non_camel_case_types)] pub type $func = Option<unsafe extern "system" fn($($p: $t,)*) -> $ret>;
+ );
+}
+
+// From um/WerApi.h
+
+STRUCT! {#[allow(non_snake_case)] struct WER_RUNTIME_EXCEPTION_INFORMATION
+{
+ dwSize: DWORD,
+ hProcess: HANDLE,
+ hThread: HANDLE,
+ exceptionRecord: EXCEPTION_RECORD,
+ context: CONTEXT,
+ pwszReportId: PCWSTR,
+ bIsFatal: BOOL,
+ dwReserved: DWORD,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PWER_RUNTIME_EXCEPTION_INFORMATION = *mut WER_RUNTIME_EXCEPTION_INFORMATION;
+
+// From minidumpapiset.hProcess
+
+STRUCT! {#[allow(non_snake_case)] #[repr(packed(4))] struct MINIDUMP_EXCEPTION_INFORMATION {
+ ThreadId: DWORD,
+ ExceptionPointers: PEXCEPTION_POINTERS,
+ ClientPointers: BOOL,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PMINIDUMP_EXCEPTION_INFORMATION = *mut MINIDUMP_EXCEPTION_INFORMATION;
+
+ENUM! { enum MINIDUMP_TYPE {
+ MiniDumpNormal = 0x00000000,
+ MiniDumpWithDataSegs = 0x00000001,
+ MiniDumpWithFullMemory = 0x00000002,
+ MiniDumpWithHandleData = 0x00000004,
+ MiniDumpFilterMemory = 0x00000008,
+ MiniDumpScanMemory = 0x00000010,
+ MiniDumpWithUnloadedModules = 0x00000020,
+ MiniDumpWithIndirectlyReferencedMemory = 0x00000040,
+ MiniDumpFilterModulePaths = 0x00000080,
+ MiniDumpWithProcessThreadData = 0x00000100,
+ MiniDumpWithPrivateReadWriteMemory = 0x00000200,
+ MiniDumpWithoutOptionalData = 0x00000400,
+ MiniDumpWithFullMemoryInfo = 0x00000800,
+ MiniDumpWithThreadInfo = 0x00001000,
+ MiniDumpWithCodeSegs = 0x00002000,
+ MiniDumpWithoutAuxiliaryState = 0x00004000,
+ MiniDumpWithFullAuxiliaryState = 0x00008000,
+ MiniDumpWithPrivateWriteCopyMemory = 0x00010000,
+ MiniDumpIgnoreInaccessibleMemory = 0x00020000,
+ MiniDumpWithTokenInformation = 0x00040000,
+ MiniDumpWithModuleHeaders = 0x00080000,
+ MiniDumpFilterTriage = 0x00100000,
+ MiniDumpWithAvxXStateContext = 0x00200000,
+ MiniDumpWithIptTrace = 0x00400000,
+ MiniDumpScanInaccessiblePartialPages = 0x00800000,
+ MiniDumpValidTypeFlags = 0x00ffffff,
+}}
+
+// We don't actually need the following three structs so we use placeholders
+STRUCT! {#[allow(non_snake_case)] struct MINIDUMP_CALLBACK_INPUT {
+ dummy: u32,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PMINIDUMP_CALLBACK_INPUT = *const MINIDUMP_CALLBACK_INPUT;
+
+STRUCT! {#[allow(non_snake_case)] struct MINIDUMP_USER_STREAM_INFORMATION {
+ dummy: u32,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PMINIDUMP_USER_STREAM_INFORMATION = *const MINIDUMP_USER_STREAM_INFORMATION;
+
+STRUCT! {#[allow(non_snake_case)] struct MINIDUMP_CALLBACK_OUTPUT {
+ dummy: u32,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PMINIDUMP_CALLBACK_OUTPUT = *const MINIDUMP_CALLBACK_OUTPUT;
+
+// MiniDumpWriteDump() function and structs
+FN! {stdcall MINIDUMP_CALLBACK_ROUTINE(
+CallbackParam: PVOID,
+CallbackInput: PMINIDUMP_CALLBACK_INPUT,
+CallbackOutput: PMINIDUMP_CALLBACK_OUTPUT,
+) -> BOOL}
+
+STRUCT! {#[allow(non_snake_case)] #[repr(packed(4))] struct MINIDUMP_CALLBACK_INFORMATION {
+ CallbackRoutine: MINIDUMP_CALLBACK_ROUTINE,
+ CallbackParam: PVOID,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PMINIDUMP_CALLBACK_INFORMATION = *const MINIDUMP_CALLBACK_INFORMATION;
+
+extern "system" {
+ pub fn MiniDumpWriteDump(
+ hProcess: HANDLE,
+ ProcessId: DWORD,
+ hFile: HANDLE,
+ DumpType: MINIDUMP_TYPE,
+ Exceptionparam: PMINIDUMP_EXCEPTION_INFORMATION,
+ UserStreamParam: PMINIDUMP_USER_STREAM_INFORMATION,
+ CallbackParam: PMINIDUMP_CALLBACK_INFORMATION,
+ ) -> BOOL;
+}
+
+// From um/winternl.h
+
+STRUCT! {#[allow(non_snake_case)] struct PEB_LDR_DATA {
+ Reserved1: [BYTE; 8],
+ Reserved2: [PVOID; 3],
+ InMemoryOrderModuleList: LIST_ENTRY,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PPEB_LDR_DATA = *mut PEB_LDR_DATA;
+
+STRUCT! {#[allow(non_snake_case)] struct RTL_DRIVE_LETTER_CURDIR {
+ Flags: WORD,
+ Length: WORD,
+ TimeStamp: ULONG,
+ DosPath: STRING,
+}}
+
+STRUCT! {#[allow(non_snake_case)] struct RTL_USER_PROCESS_PARAMETERS {
+ Reserved1: [BYTE; 16],
+ Reserved2: [PVOID; 10],
+ ImagePathName: UNICODE_STRING,
+ CommandLine: UNICODE_STRING,
+ // Everything below this point is undocumented
+ Environment: PVOID,
+ StartingX: ULONG,
+ StartingY: ULONG,
+ CountX: ULONG,
+ CountY: ULONG,
+ CountCharsX: ULONG,
+ CountCharsY: ULONG,
+ FillAttribute: ULONG,
+ WindowFlags: ULONG,
+ ShowWindowFlags: ULONG,
+ WindowTitle: UNICODE_STRING,
+ DesktopInfo: UNICODE_STRING,
+ ShellInfo: UNICODE_STRING,
+ RuntimeData: UNICODE_STRING,
+ CurrentDirectores: [RTL_DRIVE_LETTER_CURDIR; 32],
+ EnvironmentSize: ULONG,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PRTL_USER_PROCESS_PARAMETERS = *mut RTL_USER_PROCESS_PARAMETERS;
+
+FN! {stdcall PPS_POST_PROCESS_INIT_ROUTINE() -> ()}
+
+STRUCT! {#[allow(non_snake_case)] struct PEB {
+ Reserved1: [BYTE; 2],
+ BeingDebugged: BYTE,
+ Reserved2: [BYTE; 1],
+ Reserved3: [PVOID; 2],
+ Ldr: PPEB_LDR_DATA,
+ ProcessParameters: PRTL_USER_PROCESS_PARAMETERS,
+ Reserved4: [PVOID; 3],
+ AtlThunkSListPtr: PVOID,
+ Reserved5: PVOID,
+ Reserved6: ULONG,
+ Reserved7: PVOID,
+ Reserved8: ULONG,
+ AtlThunkSListPtr32: ULONG,
+ Reserved9: [PVOID; 45],
+ Reserved10: [BYTE; 96],
+ PostProcessInitRoutine: PPS_POST_PROCESS_INIT_ROUTINE,
+ Reserved11: [BYTE; 128],
+ Reserved12: [PVOID; 1],
+ SessionId: ULONG,
+}}
+
+#[allow(non_camel_case_types)]
+pub type PPEB = *mut PEB;
+
+STRUCT! {#[allow(non_snake_case)] struct PROCESS_BASIC_INFORMATION {
+ Reserved1: PVOID,
+ PebBaseAddress: PPEB,
+ Reserved2: [PVOID; 2],
+ UniqueProcessId: ULONG_PTR,
+ Reserved3: PVOID,
+}}
+
+ENUM! {enum PROCESSINFOCLASS {
+ ProcessBasicInformation = 0,
+ ProcessDebugPort = 7,
+ ProcessWow64Information = 26,
+ ProcessImageFileName = 27,
+ ProcessBreakOnTermination = 29,
+}}
+
+extern "system" {
+ pub fn NtQueryInformationProcess(
+ ProcessHandle: HANDLE,
+ ProcessInformationClass: PROCESSINFOCLASS,
+ ProcessInformation: PVOID,
+ ProcessInformationLength: ULONG,
+ ReturnLength: PULONG,
+ ) -> NTSTATUS;
+}