// Copyright 2014 The Crashpad Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "client/crashpad_client.h" #include #include #include #include "base/logging.h" #include "base/mac/mach_logging.h" #include "base/posix/eintr_wrapper.h" #include "base/strings/stringprintf.h" #include "util/mach/child_port_handshake.h" #include "util/mach/exception_ports.h" #include "util/mach/mach_extensions.h" #include "util/misc/implicit_cast.h" #include "util/posix/close_multiple.h" namespace crashpad { namespace { std::string FormatArgumentString(const std::string& name, const std::string& value) { return base::StringPrintf("--%s=%s", name.c_str(), value.c_str()); } std::string FormatArgumentInt(const std::string& name, int value) { return base::StringPrintf("--%s=%d", name.c_str(), value); } // Set the exception handler for EXC_CRASH, EXC_RESOURCE, and EXC_GUARD. // // EXC_CRASH is how most crashes are received. Most other exception types such // as EXC_BAD_ACCESS are delivered to a host-level exception handler in the // kernel where they are converted to POSIX signals. See 10.9.5 // xnu-2422.115.4/bsd/uxkern/ux_exception.c catch_mach_exception_raise(). If a // core-generating signal (triggered through this hardware mechanism or a // software mechanism such as abort() sending SIGABRT) is unhandled and the // process exits, or if the process is killed with SIGKILL for code-signing // reasons, an EXC_CRASH exception will be sent. See 10.9.5 // xnu-2422.115.4/bsd/kern/kern_exit.c proc_prepareexit(). // // EXC_RESOURCE and EXC_GUARD do not become signals or EXC_CRASH exceptions. The // host-level exception handler in the kernel does not receive these exception // types, and even if it did, it would not map them to signals. Instead, the // first Mach service loaded by the root (process ID 1) launchd with a boolean // “ExceptionServer” property in its job dictionary (regardless of its value) or // with any subdictionary property will become the host-level exception handler // for EXC_CRASH, EXC_RESOURCE, and EXC_GUARD. See 10.9.5 // launchd-842.92.1/src/core.c job_setup_exception_port(). Normally, this job is // com.apple.ReportCrash.Root, the systemwide Apple Crash Reporter. Since it is // impossible to receive EXC_RESOURCE and EXC_GUARD exceptions through the // EXC_CRASH mechanism, an exception handler must be registered for them by name // if it is to receive these exception types. The default task-level handler for // these exception types is set by launchd in a similar manner. // // EXC_MASK_RESOURCE and EXC_MASK_GUARD are not available on all systems, and // the kernel will reject attempts to use them if it does not understand them, // so AND them with ExcMaskValid(). EXC_MASK_CRASH is always supported. bool SetCrashExceptionPorts(exception_handler_t exception_handler) { ExceptionPorts exception_ports(ExceptionPorts::kTargetTypeTask, TASK_NULL); return exception_ports.SetExceptionPort( (EXC_MASK_CRASH | EXC_MASK_RESOURCE | EXC_MASK_GUARD) & ExcMaskValid(), exception_handler, EXCEPTION_STATE_IDENTITY | MACH_EXCEPTION_CODES, MACHINE_THREAD_STATE); } //! \brief Starts a Crashpad handler. class HandlerStarter final { public: //! \brief Starts a Crashpad handler. //! //! All parameters are as in CrashpadClient::StartHandler(). //! //! \return On success, a send right to the Crashpad handler that has been //! started. On failure, `MACH_PORT_NULL` with a message logged. static base::mac::ScopedMachSendRight Start( const base::FilePath& handler, const base::FilePath& database, const std::string& url, const std::map& annotations, const std::vector& arguments) { base::mac::ScopedMachReceiveRight receive_right( NewMachPort(MACH_PORT_RIGHT_RECEIVE)); if (receive_right == kMachPortNull) { return base::mac::ScopedMachSendRight(); } mach_port_t port; mach_msg_type_name_t right_type; kern_return_t kr = mach_port_extract_right(mach_task_self(), receive_right.get(), MACH_MSG_TYPE_MAKE_SEND, &port, &right_type); if (kr != KERN_SUCCESS) { MACH_LOG(ERROR, kr) << "mach_port_extract_right"; return base::mac::ScopedMachSendRight(); } base::mac::ScopedMachSendRight send_right(port); DCHECK_EQ(port, receive_right.get()); DCHECK_EQ(right_type, implicit_cast(MACH_MSG_TYPE_PORT_SEND)); if (!CommonStart(handler, database, url, annotations, arguments, receive_right.Pass())) { return base::mac::ScopedMachSendRight(); } return send_right; } private: static bool CommonStart(const base::FilePath& handler, const base::FilePath& database, const std::string& url, const std::map& annotations, const std::vector& arguments, base::mac::ScopedMachReceiveRight receive_right) { // Set up the arguments for execve() first. These aren’t needed until // execve() is called, but it’s dangerous to do this in a child process // after fork(). ChildPortHandshake child_port_handshake; base::ScopedFD server_write_fd = child_port_handshake.ServerWriteFD(); // Use handler as argv[0], followed by arguments directed by this method’s // parameters and a --handshake-fd argument. |arguments| are added first so // that if it erroneously contains an argument such as --url, the actual // |url| argument passed to this method will supersede it. In normal // command-line processing, the last parameter wins in the case of a // conflict. std::vector argv(1, handler.value()); argv.reserve(1 + arguments.size() + 2 + annotations.size() + 1); for (const std::string& argument : arguments) { argv.push_back(argument); } if (!database.value().empty()) { argv.push_back(FormatArgumentString("database", database.value())); } if (!url.empty()) { argv.push_back(FormatArgumentString("url", url)); } for (const auto& kv : annotations) { argv.push_back( FormatArgumentString("annotation", kv.first + '=' + kv.second)); } argv.push_back(FormatArgumentInt("handshake-fd", server_write_fd.get())); const char* handler_c = handler.value().c_str(); // argv_c contains const char* pointers and is terminated by nullptr. argv // is required because the pointers in argv_c need to point somewhere, and // they can’t point to temporaries such as those returned by // FormatArgumentString(). std::vector argv_c; argv_c.reserve(argv.size() + 1); for (const std::string& argument : argv) { argv_c.push_back(argument.c_str()); } argv_c.push_back(nullptr); // Double-fork(). The three processes involved are parent, child, and // grandchild. The grandchild will become the handler process. The child // exits immediately after spawning the grandchild, so the grandchild // becomes an orphan and its parent process ID becomes 1. This relieves the // parent and child of the responsibility for reaping the grandchild with // waitpid() or similar. The handler process is expected to outlive the // parent process, so the parent shouldn’t be concerned with reaping it. // This approach means that accidental early termination of the handler // process will not result in a zombie process. pid_t pid = fork(); if (pid < 0) { PLOG(ERROR) << "fork"; return false; } if (pid == 0) { // Child process. // Call setsid(), creating a new process group and a new session, both led // by this process. The new process group has no controlling terminal. // This disconnects it from signals generated by the parent process’ // terminal. // // setsid() is done in the child instead of the grandchild so that the // grandchild will not be a session leader. If it were a session leader, // an accidental open() of a terminal device without O_NOCTTY would make // that terminal the controlling terminal. // // It’s not desirable for the handler to have a controlling terminal. The // handler monitors clients on its own and manages its own lifetime, // exiting when it loses all clients and when it deems it appropraite to // do so. It may serve clients in different process groups or sessions // than its original client, and receiving signals intended for its // original client’s process group could be harmful in that case. PCHECK(setsid() != -1) << "setsid"; pid = fork(); if (pid < 0) { PLOG(FATAL) << "fork"; } if (pid > 0) { // Child process. // _exit() instead of exit(), because fork() was called. _exit(EXIT_SUCCESS); } // Grandchild process. CloseMultipleNowOrOnExec(STDERR_FILENO + 1, server_write_fd.get()); // &argv_c[0] is a pointer to a pointer to const char data, but because of // how C (not C++) works, execvp() wants a pointer to a const pointer to // char data. It modifies neither the data nor the pointers, so the // const_cast is safe. execvp(handler_c, const_cast(&argv_c[0])); PLOG(FATAL) << "execvp " << handler_c; } // Parent process. // Close the write side of the pipe, so that the handler process is the only // process that can write to it. server_write_fd.reset(); // waitpid() for the child, so that it does not become a zombie process. The // child normally exits quickly. int status; pid_t wait_pid = HANDLE_EINTR(waitpid(pid, &status, 0)); PCHECK(wait_pid != -1) << "waitpid"; DCHECK_EQ(wait_pid, pid); if (WIFSIGNALED(status)) { LOG(WARNING) << "intermediate process: signal " << WTERMSIG(status); } else if (!WIFEXITED(status)) { DLOG(WARNING) << "intermediate process: unknown termination " << status; } else if (WEXITSTATUS(status) != EXIT_SUCCESS) { LOG(WARNING) << "intermediate process: exit status " << WEXITSTATUS(status); } // Rendezvous with the handler running in the grandchild process. if (!child_port_handshake.RunClient(receive_right.get(), MACH_MSG_TYPE_MOVE_RECEIVE)) { return false; } ignore_result(receive_right.release()); return true; } DISALLOW_IMPLICIT_CONSTRUCTORS(HandlerStarter); }; } // namespace CrashpadClient::CrashpadClient() : exception_port_() { } CrashpadClient::~CrashpadClient() { } bool CrashpadClient::StartHandler( const base::FilePath& handler, const base::FilePath& database, const std::string& url, const std::map& annotations, const std::vector& arguments) { DCHECK(!exception_port_.is_valid()); exception_port_ = HandlerStarter::Start( handler, database, url, annotations, arguments); if (!exception_port_.is_valid()) { return false; } return true; } bool CrashpadClient::UseHandler() { DCHECK(exception_port_.is_valid()); return SetCrashExceptionPorts(exception_port_.get()); } // static void CrashpadClient::UseSystemDefaultHandler() { base::mac::ScopedMachSendRight system_crash_reporter_handler(SystemCrashReporterHandler()); // Proceed even if SystemCrashReporterHandler() failed, setting MACH_PORT_NULL // to clear the current exception ports. if (!SetCrashExceptionPorts(system_crash_reporter_handler.get())) { SetCrashExceptionPorts(MACH_PORT_NULL); } } } // namespace crashpad