// Copyright 2015 The Crashpad Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "handler/mac/crash_report_exception_handler.h" #include #include #include "base/logging.h" #include "base/mac/mach_logging.h" #include "base/strings/stringprintf.h" #include "client/settings.h" #include "minidump/minidump_file_writer.h" #include "snapshot/crashpad_info_client_options.h" #include "snapshot/mac/process_snapshot_mac.h" #include "util/file/file_writer.h" #include "util/mach/exc_client_variants.h" #include "util/mach/exception_behaviors.h" #include "util/mach/exception_types.h" #include "util/mach/mach_extensions.h" #include "util/mach/mach_message.h" #include "util/mach/scoped_task_suspend.h" #include "util/mach/symbolic_constants_mach.h" #include "util/misc/tri_state.h" #include "util/misc/uuid.h" namespace crashpad { CrashReportExceptionHandler::CrashReportExceptionHandler( CrashReportDatabase* database, CrashReportUploadThread* upload_thread, const std::map* process_annotations) : database_(database), upload_thread_(upload_thread), process_annotations_(process_annotations) { } CrashReportExceptionHandler::~CrashReportExceptionHandler() { } kern_return_t CrashReportExceptionHandler::CatchMachException( exception_behavior_t behavior, exception_handler_t exception_port, thread_t thread, task_t task, exception_type_t exception, const mach_exception_data_type_t* code, mach_msg_type_number_t code_count, thread_state_flavor_t* flavor, ConstThreadState old_state, mach_msg_type_number_t old_state_count, thread_state_t new_state, mach_msg_type_number_t* new_state_count, const mach_msg_trailer_t* trailer, bool* destroy_complex_request) { *destroy_complex_request = true; // The expected behavior is EXCEPTION_STATE_IDENTITY | MACH_EXCEPTION_CODES, // but it’s possible to deal with any exception behavior as long as it // carries identity information (valid thread and task ports). if (!ExceptionBehaviorHasIdentity(behavior)) { LOG(ERROR) << base::StringPrintf( "unexpected exception behavior %s, rejecting", ExceptionBehaviorToString( behavior, kUseFullName | kUnknownIsNumeric | kUseOr).c_str()); return KERN_FAILURE; } else if (behavior != (EXCEPTION_STATE_IDENTITY | kMachExceptionCodes)) { LOG(WARNING) << base::StringPrintf( "unexpected exception behavior %s, proceeding", ExceptionBehaviorToString( behavior, kUseFullName | kUnknownIsNumeric | kUseOr).c_str()); } if (task == mach_task_self()) { LOG(ERROR) << "cannot suspend myself"; return KERN_FAILURE; } ScopedTaskSuspend suspend(task); ProcessSnapshotMac process_snapshot; if (!process_snapshot.Initialize(task)) { return KERN_FAILURE; } // Check for suspicious message sources. A suspicious exception message comes // from a source other than the kernel or the process that the exception // purportedly occurred in. // // TODO(mark): Consider exceptions outside of the range (0, 32) from the // kernel to be suspicious, and exceptions other than kMachExceptionSimulated // from the process itself to be suspicious. const pid_t pid = process_snapshot.ProcessID(); pid_t audit_pid = AuditPIDFromMachMessageTrailer(trailer); if (audit_pid != -1 && audit_pid != 0) { if (audit_pid != pid) { LOG(WARNING) << "exception for pid " << pid << " sent by pid " << audit_pid; } } if (IsExceptionNonfatalResource(exception, code[0], pid)) { // Swallow non-fatal resource exceptions. // // Normally, all EXC_RESOURCE exceptions go to the host-level EXC_RESOURCE // handler, com.apple.ReportCrash.root, which invokes spindump to handle // them. These non-fatal exceptions are never user-visible and are not // currently of interest to Crashpad. Returning success here gets the // process going again quickly, without generating a crash report. // // Alternatively, this could return KERN_FAILURE to let the exception go to // the host-level handler, but there doesn’t seem to be much value in doing // so. ExcServerCopyState( behavior, old_state, old_state_count, new_state, new_state_count); return ExcServerSuccessfulReturnValue(behavior, false); } CrashpadInfoClientOptions client_options; process_snapshot.GetCrashpadOptions(&client_options); if (client_options.crashpad_handler_behavior != TriState::kDisabled) { if (!process_snapshot.InitializeException(behavior, thread, exception, code, code_count, *flavor, old_state, old_state_count)) { return KERN_FAILURE; } UUID client_id; Settings* const settings = database_->GetSettings(); if (settings) { // If GetSettings() or GetClientID() fails, something else will log a // message and client_id will be left at its default value, all zeroes, // which is appropriate. settings->GetClientID(&client_id); } process_snapshot.SetClientID(client_id); process_snapshot.SetAnnotationsSimpleMap(*process_annotations_); CrashReportDatabase::NewReport* new_report; CrashReportDatabase::OperationStatus database_status = database_->PrepareNewCrashReport(&new_report); if (database_status != CrashReportDatabase::kNoError) { return KERN_FAILURE; } process_snapshot.SetReportID(new_report->uuid); CrashReportDatabase::CallErrorWritingCrashReport call_error_writing_crash_report(database_, new_report); WeakFileHandleFileWriter file_writer(new_report->handle); MinidumpFileWriter minidump; minidump.InitializeFromSnapshot(&process_snapshot); if (!minidump.WriteEverything(&file_writer)) { return KERN_FAILURE; } call_error_writing_crash_report.Disarm(); UUID uuid; database_status = database_->FinishedWritingCrashReport(new_report, &uuid); if (database_status != CrashReportDatabase::kNoError) { return KERN_FAILURE; } upload_thread_->ReportPending(); } bool forwarded = false; if (client_options.system_crash_reporter_forwarding != TriState::kDisabled && (exception == EXC_CRASH || exception == EXC_RESOURCE || exception == EXC_GUARD)) { // Don’t forward simulated exceptions such as kMachExceptionSimulated to the // system crash reporter. Only forward the types of exceptions that it would // receive under normal conditions. Although the system crash reporter is // able to deal with other exceptions including simulated ones, forwarding // them to the system crash reporter could present the system’s crash UI for // processes that haven’t actually crashed, and could result in reports not // actually associated with crashes being sent to the operating system // vendor. // // Note that normally, EXC_RESOURCE and EXC_GUARD exceptions are sent to the // system-level com.apple.ReportCrash.Root job, and not to the user-level // job that they are forwarded to here. mach_port_t system_crash_reporter_port; const char kSystemCrashReporterServiceName[] = "com.apple.ReportCrash"; kern_return_t kr = bootstrap_look_up(bootstrap_port, kSystemCrashReporterServiceName, &system_crash_reporter_port); if (kr != BOOTSTRAP_SUCCESS) { BOOTSTRAP_LOG(ERROR, kr) << "bootstrap_look_up " << kSystemCrashReporterServiceName; } else { // Make copies of mutable out parameters so that the system crash reporter // can’t influence the state returned by this method. thread_state_flavor_t flavor_forward = *flavor; mach_msg_type_number_t new_state_forward_count = *new_state_count; std::vector new_state_forward( new_state, new_state + new_state_forward_count); // The system crash reporter requires the behavior to be // EXCEPTION_STATE_IDENTITY | MACH_EXCEPTION_CODES. It uses the identity // parameters but doesn’t appear to use the state parameters, including // |flavor|, and doesn’t care if they are 0 or invalid. As long as an // identity is available (checked above), any other exception behavior is // converted to what the system crash reporter wants, with the caveat that // problems may arise if the state wasn’t available and the system crash // reporter changes in the future to use it. However, normally, the state // will be available. kr = UniversalExceptionRaise( EXCEPTION_STATE_IDENTITY | MACH_EXCEPTION_CODES, system_crash_reporter_port, thread, task, exception, code, code_count, &flavor_forward, old_state, old_state_count, new_state_forward_count ? &new_state_forward[0] : nullptr, &new_state_forward_count); if (kr == KERN_SUCCESS) { forwarded = true; } else { MACH_LOG(WARNING, kr) << "UniversalExceptionRaise " << kSystemCrashReporterServiceName; } } } if (!forwarded) { ExcServerCopyState( behavior, old_state, old_state_count, new_state, new_state_count); } return ExcServerSuccessfulReturnValue(behavior, false); } } // namespace crashpad