blob: 69209b3d165b9db459d7d0d2c6bf1158981240c0 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/renderer_host/debug_urls.h"
#include <vector>
#include "base/bind.h"
#include "base/command_line.h"
#include "base/debug/asan_invalid_access.h"
#include "base/debug/profiler.h"
#include "base/memory/memory_pressure_listener.h"
#include "base/sanitizer_buildflags.h"
#include "base/strings/utf_string_conversions.h"
#include "base/synchronization/waitable_event.h"
#include "base/threading/thread_restrictions.h"
#include "build/build_config.h"
#include "cc/base/switches.h"
#include "content/browser/gpu/gpu_process_host.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/common/content_constants.h"
#include "content/public/common/url_constants.h"
#include "ppapi/buildflags/buildflags.h"
#include "third_party/blink/public/common/chrome_debug_urls.h"
#include "url/gurl.h"
#if BUILDFLAG(ENABLE_PLUGINS)
#include "content/browser/ppapi_plugin_process_host.h" // nogncheck
#include "ppapi/proxy/ppapi_messages.h" // nogncheck
#endif
#if defined(OS_WIN)
#include "base/debug/invalid_access_win.h"
#endif
namespace content {
class ScopedAllowWaitForDebugURL {
private:
base::ScopedAllowBaseSyncPrimitivesOutsideBlockingScope wait;
};
namespace {
// Define the Asan debug URLs.
const char kAsanCrashDomain[] = "crash";
const char kAsanHeapOverflow[] = "/browser-heap-overflow";
const char kAsanHeapUnderflow[] = "/browser-heap-underflow";
const char kAsanUseAfterFree[] = "/browser-use-after-free";
#if defined(OS_WIN)
const char kAsanCorruptHeapBlock[] = "/browser-corrupt-heap-block";
const char kAsanCorruptHeap[] = "/browser-corrupt-heap";
#endif
void HandlePpapiFlashDebugURL(const GURL& url) {
#if BUILDFLAG(ENABLE_PLUGINS)
bool crash = url == blink::kChromeUIPpapiFlashCrashURL;
std::vector<PpapiPluginProcessHost*> hosts;
PpapiPluginProcessHost::FindByName(base::UTF8ToUTF16(kFlashPluginName),
&hosts);
for (auto iter = hosts.begin(); iter != hosts.end(); ++iter) {
if (crash)
(*iter)->Send(new PpapiMsg_Crash());
else
(*iter)->Send(new PpapiMsg_Hang());
}
#endif
}
bool IsAsanDebugURL(const GURL& url) {
if (!(url.is_valid() && url.SchemeIs(kChromeUIScheme) &&
url.DomainIs(kAsanCrashDomain) && url.has_path())) {
return false;
}
if (url.path_piece() == kAsanHeapOverflow ||
url.path_piece() == kAsanHeapUnderflow ||
url.path_piece() == kAsanUseAfterFree) {
return true;
}
#if defined(OS_WIN)
if (url.path_piece() == kAsanCorruptHeapBlock ||
url.path_piece() == kAsanCorruptHeap) {
return true;
}
#endif
return false;
}
bool HandleAsanDebugURL(const GURL& url) {
#if defined(ADDRESS_SANITIZER) || BUILDFLAG(IS_HWASAN)
#if defined(OS_WIN)
if (url.path_piece() == kAsanCorruptHeapBlock) {
base::debug::AsanCorruptHeapBlock();
return true;
} else if (url.path_piece() == kAsanCorruptHeap) {
base::debug::AsanCorruptHeap();
return true;
}
#endif // OS_WIN
if (url.path_piece() == kAsanHeapOverflow) {
base::debug::AsanHeapOverflow();
} else if (url.path_piece() == kAsanHeapUnderflow) {
base::debug::AsanHeapUnderflow();
} else if (url.path_piece() == kAsanUseAfterFree) {
base::debug::AsanHeapUseAfterFree();
} else {
return false;
}
#endif
return true;
}
void HangCurrentThread() {
ScopedAllowWaitForDebugURL allow_wait;
base::WaitableEvent(base::WaitableEvent::ResetPolicy::AUTOMATIC,
base::WaitableEvent::InitialState::NOT_SIGNALED)
.Wait();
}
} // namespace
bool HandleDebugURL(const GURL& url,
ui::PageTransition transition,
bool is_explicit_navigation) {
// We want to handle the debug URL if the user explicitly navigated to this
// URL, unless kEnableGpuBenchmarking is enabled by Telemetry.
bool is_telemetry_navigation =
base::CommandLine::ForCurrentProcess()->HasSwitch(
cc::switches::kEnableGpuBenchmarking) &&
(PageTransitionCoreTypeIs(transition, ui::PAGE_TRANSITION_TYPED));
if (!is_explicit_navigation && !is_telemetry_navigation)
return false;
if (IsAsanDebugURL(url))
return HandleAsanDebugURL(url);
if (url == blink::kChromeUIBrowserCrashURL) {
// Induce an intentional crash in the browser process.
CHECK(false);
return true;
}
#if defined(OS_WIN)
if (url == blink::kChromeUIBrowserHeapCorruptionURL) {
// Induce an intentional heap corruption in the browser process.
base::debug::win::TerminateWithHeapCorruption();
}
#endif
if (url == blink::kChromeUIBrowserUIHang) {
HangCurrentThread();
return true;
}
if (url == blink::kChromeUIDelayedBrowserUIHang) {
// Webdriver-safe url to hang the ui thread. Webdriver waits for the onload
// event in javascript which needs a little more time to fire.
GetUIThreadTaskRunner({})->PostDelayedTask(
FROM_HERE, base::BindOnce(&HangCurrentThread), base::Seconds(2));
return true;
}
if (url == blink::kChromeUIGpuCleanURL) {
GpuProcessHost::CallOnIO(GPU_PROCESS_KIND_SANDBOXED,
false /* force_create */,
base::BindOnce([](GpuProcessHost* host) {
if (host)
host->gpu_service()->DestroyAllChannels();
}));
return true;
}
if (url == blink::kChromeUIGpuCrashURL) {
GpuProcessHost::CallOnIO(GPU_PROCESS_KIND_SANDBOXED,
false /* force_create */,
base::BindOnce([](GpuProcessHost* host) {
if (host)
host->gpu_service()->Crash();
}));
return true;
}
#if defined(OS_ANDROID)
if (url == blink::kChromeUIGpuJavaCrashURL) {
GpuProcessHost::CallOnIO(GPU_PROCESS_KIND_SANDBOXED,
false /* force_create */,
base::BindOnce([](GpuProcessHost* host) {
if (host)
host->gpu_service()->ThrowJavaException();
}));
return true;
}
#endif
if (url == blink::kChromeUIGpuHangURL) {
GpuProcessHost::CallOnIO(GPU_PROCESS_KIND_SANDBOXED,
false /* force_create */,
base::BindOnce([](GpuProcessHost* host) {
if (host)
host->gpu_service()->Hang();
}));
return true;
}
if (url == blink::kChromeUIPpapiFlashCrashURL ||
url == blink::kChromeUIPpapiFlashHangURL) {
GetIOThreadTaskRunner({})->PostTask(
FROM_HERE, base::BindOnce(&HandlePpapiFlashDebugURL, url));
return true;
}
if (url == blink::kChromeUIMemoryPressureCriticalURL) {
base::MemoryPressureListener::NotifyMemoryPressure(
base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
return true;
}
if (url == blink::kChromeUIMemoryPressureModerateURL) {
base::MemoryPressureListener::NotifyMemoryPressure(
base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_MODERATE);
return true;
}
return false;
}
} // namespace content