crashpad/util/linux/exception_handler_client.cc
Mark Mentovai 50ed179e9a Use BUILDFLAG for OS checking
Use BUILDFLAG(IS_*) instead of defined(OS_*).

This was generated mostly mechnically by performing the following steps:
 - sed -i '' -E -e 's/defined\(OS_/BUILDFLAG(IS_/g' \
                -e 's%([ !])OS_([A-Z]+)%\1BUILDFLAG(IS_\2)%g' \
       $(git grep -l 'OS_'
         '**/*.c' '**/*.cc' '**/*.h' '**/*.m' '**/*.mm')
 - sed -i '' -e 's/#ifdef BUILDFLAG(/#if BUILDFLAG(/' \
       $(git grep -l '#ifdef BUILDFLAG('
         '**/*.c' '**/*.cc' '**/*.h' '**/*.m' '**/*.mm')
 - gsed -i -z -E -e \
       's%(.*)#include "%\1#include "build/buildflag.h"\n#include "%' \
       $(git grep -l 'BUILDFLAG(IS_'
         '**/*.c' '**/*.cc' '**/*.h' '**/*.m' '**/*.mm')
 - Spot checks to move #include "build/buildflag.h" to the correct parts
   of files.
 - sed -i '' -E -e \
       's%^(#include "build/buildflag.h")$%#include "build/build_config.h"\n\1%' \
       $(grep -L '^#include "build/build_config.h"$'
         $(git grep -l 'BUILDFLAG(IS_'
           '**/*.c' '**/*.cc' '**/*.h' '**/*.m' '**/*.mm'))
 - Add “clang-format off” around tool usage messages.
 - git cl format
 - Update mini_chromium to 85ba51f98278 (intermediate step).
   TESTING ONLY).
 - for f in $(git grep -l '^#include "build/buildflag.h"$'
              '**/*.c' '**/*.cc' '**/*.h' '**/*.m' '**/*.mm'); do \
       grep -v '^#include "build/buildflag.h"$' "${f}" > /tmp/z; \
       cp /tmp/z "${f}"; done
 - git cl format
 - Update mini_chromium to 735143774c5f (intermediate step).
 - Update mini_chromium to f41420eb45fa (as checked in).
 - Update mini_chromium to 6e2f204b4ae1 (as checked in).

For ease of review and inspection, each of these steps is uploaded as a
new patch set in a review series.

This includes an update of mini_chromium to 6e2f204b4ae1:

f41420eb45fa Use BUILDFLAG for OS checking
6e2f204b4ae1 Include what you use: string_util.h uses build_config.h

Bug: chromium:1234043
Change-Id: Ieef86186f094c64e59b853729737e36982f8cf69
Reviewed-on: https://chromium-review.googlesource.com/c/crashpad/crashpad/+/3400258
Reviewed-by: Joshua Peraza <jperaza@chromium.org>
Commit-Queue: Mark Mentovai <mark@chromium.org>
2022-01-19 20:21:19 +00:00

228 lines
6.3 KiB
C++

// Copyright 2017 The Crashpad Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "util/linux/exception_handler_client.h"
#include <errno.h>
#include <signal.h>
#include <sys/prctl.h>
#include <sys/wait.h>
#include <unistd.h>
#include "base/logging.h"
#include "base/posix/eintr_wrapper.h"
#include "build/build_config.h"
#include "third_party/lss/lss.h"
#include "util/file/file_io.h"
#include "util/linux/ptrace_broker.h"
#include "util/linux/socket.h"
#include "util/misc/from_pointer_cast.h"
#include "util/posix/signals.h"
#if BUILDFLAG(IS_ANDROID)
#include <android/api-level.h>
#endif
namespace crashpad {
namespace {
class ScopedSigprocmaskRestore {
public:
explicit ScopedSigprocmaskRestore(const kernel_sigset_t& set_to_block)
: orig_mask_(), mask_is_set_(false) {
mask_is_set_ = sys_sigprocmask(SIG_BLOCK, &set_to_block, &orig_mask_) == 0;
DPLOG_IF(ERROR, !mask_is_set_) << "sigprocmask";
}
ScopedSigprocmaskRestore(const ScopedSigprocmaskRestore&) = delete;
ScopedSigprocmaskRestore& operator=(const ScopedSigprocmaskRestore&) = delete;
~ScopedSigprocmaskRestore() {
if (mask_is_set_ &&
sys_sigprocmask(SIG_SETMASK, &orig_mask_, nullptr) != 0) {
DPLOG(ERROR) << "sigprocmask";
}
}
private:
kernel_sigset_t orig_mask_;
bool mask_is_set_;
};
} // namespace
ExceptionHandlerClient::ExceptionHandlerClient(int sock, bool multiple_clients)
: server_sock_(sock),
ptracer_(-1),
can_set_ptracer_(true),
multiple_clients_(multiple_clients) {}
ExceptionHandlerClient::~ExceptionHandlerClient() = default;
bool ExceptionHandlerClient::GetHandlerCredentials(ucred* creds) {
ExceptionHandlerProtocol::ClientToServerMessage message = {};
message.type =
ExceptionHandlerProtocol::ClientToServerMessage::kTypeCheckCredentials;
if (UnixCredentialSocket::SendMsg(server_sock_, &message, sizeof(message)) !=
0) {
return false;
}
ExceptionHandlerProtocol::ServerToClientMessage response;
return UnixCredentialSocket::RecvMsg(
server_sock_, &response, sizeof(response), creds);
}
int ExceptionHandlerClient::RequestCrashDump(
const ExceptionHandlerProtocol::ClientInformation& info) {
VMAddress sp = FromPointerCast<VMAddress>(&sp);
if (multiple_clients_) {
return SignalCrashDump(info, sp);
}
int status = SendCrashDumpRequest(info, sp);
if (status != 0) {
return status;
}
return WaitForCrashDumpComplete();
}
int ExceptionHandlerClient::SetPtracer(pid_t pid) {
if (ptracer_ == pid) {
return 0;
}
if (!can_set_ptracer_) {
return EPERM;
}
if (prctl(PR_SET_PTRACER, pid, 0, 0, 0) == 0) {
return 0;
}
return errno;
}
void ExceptionHandlerClient::SetCanSetPtracer(bool can_set_ptracer) {
can_set_ptracer_ = can_set_ptracer;
}
int ExceptionHandlerClient::SignalCrashDump(
const ExceptionHandlerProtocol::ClientInformation& info,
VMAddress stack_pointer) {
kernel_sigset_t dump_done_sigset;
sys_sigemptyset(&dump_done_sigset);
sys_sigaddset(&dump_done_sigset, ExceptionHandlerProtocol::kDumpDoneSignal);
ScopedSigprocmaskRestore scoped_block(dump_done_sigset);
int status = SendCrashDumpRequest(info, stack_pointer);
if (status != 0) {
return status;
}
siginfo_t siginfo = {};
timespec timeout;
timeout.tv_sec = 5;
timeout.tv_nsec = 0;
if (HANDLE_EINTR(sys_sigtimedwait(&dump_done_sigset, &siginfo, &timeout)) <
0) {
return errno;
}
return 0;
}
int ExceptionHandlerClient::SendCrashDumpRequest(
const ExceptionHandlerProtocol::ClientInformation& info,
VMAddress stack_pointer) {
ExceptionHandlerProtocol::ClientToServerMessage message;
message.type =
ExceptionHandlerProtocol::ClientToServerMessage::kTypeCrashDumpRequest;
message.requesting_thread_stack_address = stack_pointer;
message.client_info = info;
return UnixCredentialSocket::SendMsg(server_sock_, &message, sizeof(message));
}
int ExceptionHandlerClient::WaitForCrashDumpComplete() {
ExceptionHandlerProtocol::ServerToClientMessage message;
// If the server hangs up, ReadFileExactly will return false without setting
// errno.
errno = 0;
while (ReadFileExactly(server_sock_, &message, sizeof(message))) {
switch (message.type) {
case ExceptionHandlerProtocol::ServerToClientMessage::kTypeForkBroker: {
Signals::InstallDefaultHandler(SIGCHLD);
pid_t pid = fork();
if (pid <= 0) {
ExceptionHandlerProtocol::Errno error = pid < 0 ? errno : 0;
if (!WriteFile(server_sock_, &error, sizeof(error))) {
return errno;
}
}
if (pid < 0) {
continue;
}
if (pid == 0) {
#if defined(ARCH_CPU_64_BITS)
constexpr bool am_64_bit = true;
#else
constexpr bool am_64_bit = false;
#endif // ARCH_CPU_64_BITS
PtraceBroker broker(server_sock_, getppid(), am_64_bit);
_exit(broker.Run());
}
int status = 0;
pid_t child = HANDLE_EINTR(waitpid(pid, &status, 0));
DCHECK_EQ(child, pid);
if (child == pid && status != 0) {
return status;
}
continue;
}
case ExceptionHandlerProtocol::ServerToClientMessage::kTypeSetPtracer: {
ExceptionHandlerProtocol::Errno result = SetPtracer(message.pid);
if (!WriteFile(server_sock_, &result, sizeof(result))) {
return errno;
}
continue;
}
case ExceptionHandlerProtocol::ServerToClientMessage::kTypeCredentials:
DCHECK(false);
continue;
case ExceptionHandlerProtocol::ServerToClientMessage::
kTypeCrashDumpComplete:
case ExceptionHandlerProtocol::ServerToClientMessage::
kTypeCrashDumpFailed:
return 0;
}
DCHECK(false);
}
return errno;
}
} // namespace crashpad