windows-nt/Source/XPSP1/NT/sdktools/debuggers/imagehlp/userdump.c
2020-09-26 16:20:57 +08:00

511 lines
14 KiB
C

/*++
Copyright (c) 1990-2000 Microsoft Corporation
Module Name:
userdump.c
Abstract:
This module implements full user-mode dump writing.
--*/
#include "private.h"
// hack to make it build
typedef ULONG UNICODE_STRING32;
typedef ULONG UNICODE_STRING64;
#include <ntiodump.h>
DWORD_PTR
DmppGetFilePointer(
HANDLE hFile
)
{
#ifdef _WIN64
LONG dwHigh = 0;
return SetFilePointer(hFile, 0, &dwHigh, FILE_CURRENT) |
((DWORD_PTR)dwHigh << 32);
#else
return SetFilePointer(hFile, 0, NULL, FILE_CURRENT);
#endif
}
WCHAR *
DmppGetHotFixString(
)
{
WCHAR *pszBigBuffer = NULL;
HKEY hkey = 0;
//
// Get the hot fixes. Concat hotfixes into a list that looks like:
// "Qxxxx, Qxxxx, Qxxxx, Qxxxx"
//
RegOpenKeyExW(HKEY_LOCAL_MACHINE,
L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Hotfix", 0, KEY_READ, &hkey);
if (hkey) {
DWORD dwMaxKeyNameLen = 0;
DWORD dwNumSubKeys = 0;
WCHAR *pszNameBuffer = NULL;
if (ERROR_SUCCESS != RegQueryInfoKeyW(hkey, // handle of key to query
NULL, // address of buffer for class string
NULL, // address of size of class string buffer
0, // reserved
&dwNumSubKeys, // address of buffer for number of subkeys
&dwMaxKeyNameLen, // address of buffer for longest subkey name length
NULL, // address of buffer for longest class string length
NULL, // address of buffer for number of value entries
NULL, // address of buffer for longest value name length
NULL, // address of buffer for longest value data length
NULL, // address of buffer for security descriptor length
NULL)) { // address of buffer for last write time);
pszNameBuffer = (WCHAR *) calloc(dwMaxKeyNameLen, sizeof(WCHAR));
pszBigBuffer = (WCHAR *) calloc(dwMaxKeyNameLen * dwNumSubKeys
// Factor in the space required for each ", " between the hotfixes
+ (dwNumSubKeys -1) * 2, sizeof(WCHAR));
if (!pszNameBuffer || !pszBigBuffer) {
if (pszBigBuffer) {
free(pszBigBuffer);
pszBigBuffer = NULL;
}
} else {
DWORD dw;
// So far so good, get each entry
for (dw=0; dw<dwNumSubKeys; dw++) {
DWORD dwSize = dwMaxKeyNameLen;
if (ERROR_SUCCESS == RegEnumKeyExW(hkey,
dw,
pszNameBuffer,
&dwSize,
0,
NULL,
NULL,
NULL)) {
// concat the list
wcscat(pszBigBuffer, pszNameBuffer);
if (dw < dwNumSubKeys-1) {
wcscat(pszBigBuffer, L", ");
}
}
}
}
}
if (pszNameBuffer) {
free(pszNameBuffer);
}
RegCloseKey(hkey);
}
return pszBigBuffer;
}
BOOL
DbgHelpCreateUserDump(
LPSTR CrashDumpName,
PDBGHELP_CREATE_USER_DUMP_CALLBACK DmpCallback,
PVOID lpv
)
{
UINT uSizeDumpFile;
UINT uSizeUnicode;
PWSTR pwszUnicode = NULL;
BOOL b;
if (CrashDumpName)
{
uSizeDumpFile = strlen(CrashDumpName);
uSizeUnicode = (uSizeDumpFile + 1) * sizeof(wchar_t);
pwszUnicode = (PWSTR)calloc(uSizeUnicode, 1);
if (!pwszUnicode) {
return FALSE;
}
*pwszUnicode = UNICODE_NULL;
if (*CrashDumpName) {
if (!MultiByteToWideChar(CP_ACP, MB_COMPOSITE,
CrashDumpName, uSizeDumpFile,
pwszUnicode, uSizeUnicode))
{
// Error. Free the string, return NULL.
free(pwszUnicode);
return FALSE;
}
}
}
b = DbgHelpCreateUserDumpW(pwszUnicode, DmpCallback, lpv);
if (pwszUnicode)
{
free(pwszUnicode);
}
return b;
}
BOOL
DbgHelpCreateUserDumpW(
LPWSTR CrashDumpName,
PDBGHELP_CREATE_USER_DUMP_CALLBACK DmpCallback,
PVOID lpv
)
/*++
Routine Description:
Create a usermode dump file.
Arguments:
CrashDumpName - Supplies a name for the dump file.
DmpCallback - Supplies a pointer to a callback function pointer which
will provide debugger service such as ReadMemory and GetContext.
lpv - Supplies private data which is sent to the callback functions.
Return Value:
TRUE - Success.
FALSE - Error.
--*/
{
OSVERSIONINFO OsVersion = {0};
USERMODE_CRASHDUMP_HEADER DumpHeader = {0};
DWORD cb;
HANDLE hFile = INVALID_HANDLE_VALUE;
BOOL rval;
PVOID DumpData;
DWORD DumpDataLength;
SECURITY_ATTRIBUTES SecAttrib;
SECURITY_DESCRIPTOR SecDescript;
if (CrashDumpName == NULL)
{
DmpCallback( DMP_DUMP_FILE_HANDLE, &hFile, &DumpDataLength, lpv );
}
else
{
//
// Create a DACL that allows all access to the directory
//
SecAttrib.nLength = sizeof(SECURITY_ATTRIBUTES);
SecAttrib.lpSecurityDescriptor = &SecDescript;
SecAttrib.bInheritHandle = FALSE;
InitializeSecurityDescriptor(&SecDescript, SECURITY_DESCRIPTOR_REVISION);
SetSecurityDescriptorDacl(&SecDescript, TRUE, NULL, FALSE);
hFile = CreateFileW(
CrashDumpName,
GENERIC_READ | GENERIC_WRITE,
0,
&SecAttrib,
CREATE_ALWAYS,
FILE_ATTRIBUTE_NORMAL,
NULL);
}
if ((hFile == NULL) || (hFile == INVALID_HANDLE_VALUE))
{
return FALSE;
}
// Write out an empty header
if (!WriteFile( hFile, &DumpHeader, sizeof(DumpHeader), &cb, NULL )) {
goto bad_file;
}
//
// write the debug event
//
DumpHeader.DebugEventOffset = DmppGetFilePointer( hFile );
DmpCallback( DMP_DEBUG_EVENT, &DumpData, &DumpDataLength, lpv );
if (!WriteFile( hFile, DumpData, sizeof(DEBUG_EVENT), &cb, NULL )) {
goto bad_file;
}
//
// write the memory map
//
DumpHeader.MemoryRegionOffset = DmppGetFilePointer( hFile );
do {
__try {
rval = DmpCallback(
DMP_MEMORY_BASIC_INFORMATION,
&DumpData,
&DumpDataLength,
lpv
);
} __except (EXCEPTION_EXECUTE_HANDLER) {
rval = FALSE;
}
if (rval) {
DumpHeader.MemoryRegionCount += 1;
if (!WriteFile( hFile, DumpData, sizeof(MEMORY_BASIC_INFORMATION), &cb, NULL )) {
goto bad_file;
}
}
} while( rval );
//
// write the thread contexts
//
DumpHeader.ThreadOffset = DmppGetFilePointer( hFile );
do {
__try {
rval = DmpCallback(
DMP_THREAD_CONTEXT,
&DumpData,
&DumpDataLength,
lpv
);
} __except (EXCEPTION_EXECUTE_HANDLER) {
rval = FALSE;
}
if (rval) {
if (!WriteFile( hFile, DumpData, DumpDataLength, &cb, NULL )) {
goto bad_file;
}
DumpHeader.ThreadCount += 1;
}
} while( rval );
//
// write the thread states
//
DumpHeader.ThreadStateOffset = DmppGetFilePointer( hFile );
do {
__try {
rval = DmpCallback(
DMP_THREAD_STATE,
&DumpData,
&DumpDataLength,
lpv
);
} __except (EXCEPTION_EXECUTE_HANDLER) {
rval = FALSE;
}
if (rval) {
if (!WriteFile( hFile, DumpData, sizeof(CRASH_THREAD), &cb, NULL )) {
goto bad_file;
}
}
} while( rval );
//
// write the module table
//
DumpHeader.ModuleOffset = DmppGetFilePointer( hFile );
do {
__try {
rval = DmpCallback(
DMP_MODULE,
&DumpData,
&DumpDataLength,
lpv
);
} __except (EXCEPTION_EXECUTE_HANDLER) {
rval = FALSE;
}
if (rval) {
if (!WriteFile(
hFile,
DumpData,
sizeof(CRASH_MODULE) +
((PCRASH_MODULE)DumpData)->ImageNameLength,
&cb,
NULL
)) {
goto bad_file;
}
DumpHeader.ModuleCount += 1;
}
} while( rval );
//
// write the virtual memory
//
DumpHeader.DataOffset = DmppGetFilePointer( hFile );
do {
__try {
rval = DmpCallback(
DMP_MEMORY_DATA,
&DumpData,
&DumpDataLength,
lpv
);
} __except (EXCEPTION_EXECUTE_HANDLER) {
rval = FALSE;
}
if (rval) {
if (!WriteFile(
hFile,
DumpData,
DumpDataLength,
&cb,
NULL
)) {
goto bad_file;
}
}
} while( rval );
//
// VersionInfoOffset will be an offset into the dump file that will contain
// misc information about drwatson. The format of the information
// will be a series of NULL terminated strings with two zero
// terminating the multistring. The string will be UNICODE.
//
// FORMAT:
// This data refers to the specific data about Dr. Watson
// DRW: OS version: XX.XX
// OS version of headers
// DRW: build: XXXX
// Build number of Dr. Watson binary
// DRW: QFE: X
// QFE number of the Dr. Watson binary
// Refers to info describing the OS on which the app crashed,
// including Service pack, hotfixes, etc...
// CRASH: OS SP: X
// Service Pack number of the OS where the app AV'd (we
// already store the build number, but not the SP)
//
DumpHeader.VersionInfoOffset = DmppGetFilePointer( hFile );
OsVersion.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
GetVersionEx( &OsVersion );
{
WCHAR szBuf[1024] = {0};
WCHAR * psz = szBuf;
WCHAR * pszHotfixes;
wcscat(psz, L"DRW: OS version");
psz += wcslen(psz) +1;
// Let the printf function convert it from ANSI to unicode
swprintf(psz, L"%S", VER_PRODUCTVERSION_STRING);
psz += wcslen(psz) +1;
wcscat(psz, L"DRW: build");
psz += wcslen(psz) +1;
swprintf(psz, L"%d", (int) VER_PRODUCTBUILD);
psz += wcslen(psz) +1;
wcscat(psz, L"DRW: QFE");
psz += wcslen(psz) +1;
swprintf(psz, L"%d", (int) VER_PRODUCTBUILD_QFE);
psz += wcslen(psz) +1;
wcscat(psz, L"CRASH: OS SP");
psz += wcslen(psz) +1;
if (OsVersion.szCSDVersion[0]) {
// Let the printf function convert it from ANSI to unicode
swprintf(psz, L"%S", OsVersion.szCSDVersion);
} else {
wcscat(psz, L"none");
}
psz += wcslen(psz) +1;
wcscat(psz, L"CRASH: Hotfixes");
psz += wcslen(psz) +1;
pszHotfixes = DmppGetHotFixString ();
if (pszHotfixes) {
wcscat(psz, pszHotfixes);
free(pszHotfixes);
} else {
wcscat(psz, L"none");
}
psz += wcslen(psz) +1;
// Include last terminating zero
psz++;
// Calc length of data. This should always fit in a ULONG.
DumpDataLength = (ULONG)((PBYTE) psz - (PBYTE) szBuf);
if (!WriteFile(
hFile,
szBuf,
DumpDataLength,
&cb,
NULL
)) {
goto bad_file;
}
}
//
// re-write the dump header with some valid data
//
DumpHeader.Signature = USERMODE_CRASHDUMP_SIGNATURE;
DumpHeader.MajorVersion = OsVersion.dwMajorVersion;
DumpHeader.MinorVersion =
(OsVersion.dwMinorVersion & 0xffff) |
(OsVersion.dwBuildNumber << 16);
#if defined(_M_IX86)
DumpHeader.MachineImageType = IMAGE_FILE_MACHINE_I386;
DumpHeader.ValidDump = USERMODE_CRASHDUMP_VALID_DUMP32;
#elif defined(_M_IA64)
DumpHeader.MachineImageType = IMAGE_FILE_MACHINE_IA64;
DumpHeader.ValidDump = USERMODE_CRASHDUMP_VALID_DUMP64;
#elif defined(_M_AXP64)
DumpHeader.MachineImageType = IMAGE_FILE_MACHINE_AXP64;
DumpHeader.ValidDump = USERMODE_CRASHDUMP_VALID_DUMP64;
#elif defined(_M_ALPHA)
DumpHeader.MachineImageType = IMAGE_FILE_MACHINE_ALPHA;
DumpHeader.ValidDump = USERMODE_CRASHDUMP_VALID_DUMP32;
#elif defined(_M_AMD64)
DumpHeader.MachineImageType = IMAGE_FILE_MACHINE_AMD64;
DumpHeader.ValidDump = USERMODE_CRASHDUMP_VALID_DUMP64;
#else
#error( "unknown target machine" );
#endif
SetFilePointer( hFile, 0, 0, FILE_BEGIN );
if (!WriteFile( hFile, &DumpHeader, sizeof(DumpHeader), &cb, NULL )) {
goto bad_file;
}
//
// close the file
//
if (CrashDumpName)
{
CloseHandle( hFile );
}
return TRUE;
bad_file:
if (CrashDumpName)
{
CloseHandle( hFile );
}
DeleteFileW( CrashDumpName );
return FALSE;
}