Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2014 The Crashpad Authors. All rights reserved. | |
| 2 // | |
| 3 // Licensed under the Apache License, Version 2.0 (the "License"); | |
| 4 // you may not use this file except in compliance with the License. | |
| 5 // You may obtain a copy of the License at | |
| 6 // | |
| 7 // http://www.apache.org/licenses/LICENSE-2.0 | |
| 8 // | |
| 9 // Unless required by applicable law or agreed to in writing, software | |
| 10 // distributed under the License is distributed on an "AS IS" BASIS, | |
| 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
| 12 // See the License for the specific language governing permissions and | |
| 13 // limitations under the License. | |
| 14 | |
| 15 #include "client/crashpad_client.h" | |
| 16 | |
| 17 #include <mach/mach.h> | |
| 18 #include <sys/wait.h> | |
| 19 #include <unistd.h> | |
| 20 | |
| 21 #include "base/logging.h" | |
| 22 #include "base/posix/eintr_wrapper.h" | |
| 23 #include "base/strings/stringprintf.h" | |
| 24 #include "client/crashpad_client.h" | |
| 25 #include "util/mach/child_port_handshake.h" | |
| 26 #include "util/mach/exception_ports.h" | |
| 27 #include "util/mach/mach_extensions.h" | |
| 28 #include "util/posix/close_multiple.h" | |
| 29 | |
| 30 namespace crashpad { | |
| 31 | |
| 32 CrashpadClient::CrashpadClient() | |
| 33 : exception_port_() { | |
| 34 } | |
| 35 | |
| 36 CrashpadClient::~CrashpadClient() { | |
| 37 } | |
| 38 | |
| 39 bool CrashpadClient::StartHandler( | |
| 40 const base::FilePath& handler, | |
| 41 const std::vector<std::string>& handler_arguments) { | |
| 42 DCHECK_EQ(exception_port_, kMachPortNull); | |
| 43 | |
| 44 // Set up the arguments for execve() first. These aren’t needed until execve() | |
| 45 // is called, but it’s dangerous to do this in a child process after fork(). | |
| 46 ChildPortHandshake child_port_handshake; | |
| 47 int handshake_fd = child_port_handshake.ReadPipeFD(); | |
| 48 std::string handshake_fd_arg = | |
| 49 base::StringPrintf("--handshake-fd=%d", handshake_fd); | |
| 50 | |
| 51 const std::string& handler_s = handler.value(); | |
| 52 const char* const handler_c = handler_s.c_str(); | |
| 53 | |
| 54 // Use handler as argv[0], followed by handler_arguments, handshake_fd_arg, | |
| 55 // and a nullptr terminator. | |
| 56 std::vector<const char*> argv(1, handler_c); | |
| 57 argv.reserve(1 + handler_arguments.size() + 1 + 1); | |
| 58 for (const std::string& handler_argument : handler_arguments) { | |
| 59 argv.push_back(handler_argument.c_str()); | |
| 60 } | |
| 61 argv.push_back(handshake_fd_arg.c_str()); | |
| 62 argv.push_back(nullptr); | |
| 63 | |
| 64 // Double-fork(). The three processes involved are parent, child, and | |
| 65 // grandchild. The grandchild will become the handler process. The child exits | |
| 66 // immediately after spawning the grandchild, so the grandchild becomes an | |
| 67 // orphan and its parent process ID becomes 1. This relieves the parent and | |
| 68 // child of the responsibility for reaping the grandchild with waitpid() or | |
| 69 // similar. The handler process is expected to outlive the parent process, so | |
| 70 // the parent shouldn’t be concerned with reaping it. This approach means that | |
| 71 // accidental early termination of the handler process will not result in a | |
| 72 // zombie process. | |
| 73 pid_t pid = fork(); | |
| 74 if (pid < 0) { | |
| 75 PLOG(ERROR) << "fork"; | |
| 76 return false; | |
| 77 } | |
| 78 | |
| 79 if (pid == 0) { | |
| 80 // Child process. | |
| 81 | |
| 82 // Call setsid(), creating a new process group and a new session, both led | |
| 83 // by this process. The new process group has no controlling terminal. This | |
| 84 // disconnects it from signals generated by the parent process’ terminal. | |
| 85 // | |
| 86 // setsid() is done in the child instead of the grandchild so that the | |
| 87 // grandchild will not be a session leader. If it were a session leader, an | |
| 88 // accidental open() of a terminal device without O_NOCTTY would make that | |
| 89 // terminal the controlling terminal. | |
| 90 // | |
| 91 // It’s not desirable for the handler to have a controlling terminale. The | |
|
Robert Sesek
2014/12/29 16:34:03
sp: terminale
| |
| 92 // handler monitors clients on its own and manages its own lifetime, exiting | |
| 93 // when it loses all clients and when it deems it appropraite to do so. It | |
| 94 // may serve clients in different process groups or sessions than its | |
| 95 // original client, and receiving signals intended for its original client’s | |
| 96 // process group could be harmful in that case. | |
| 97 PCHECK(setsid() != -1) << "setsid"; | |
| 98 | |
| 99 pid = fork(); | |
| 100 if (pid < 0) { | |
| 101 PLOG(FATAL) << "fork"; | |
| 102 } | |
| 103 | |
| 104 if (pid > 0) { | |
| 105 // Child process. | |
| 106 | |
| 107 // _exit() instead of exit(), because fork() was called. | |
| 108 _exit(EXIT_SUCCESS); | |
| 109 } | |
| 110 | |
| 111 // Grandchild process. | |
| 112 | |
| 113 CloseMultipleNowOrOnExec(STDERR_FILENO + 1, handshake_fd); | |
| 114 | |
| 115 // &argv[0] is a pointer to a pointer to const char data, but because of how | |
| 116 // C (not C++) works, execvp() wants a pointer to a const pointer to char | |
| 117 // data. It modifies neither the data nor the pointers, so the const_cast is | |
| 118 // safe. | |
| 119 execvp(handler_c, const_cast<char* const*>(&argv[0])); | |
| 120 PLOG(FATAL) << "execvp " << handler_s; | |
| 121 } | |
| 122 | |
| 123 // Parent process. | |
| 124 | |
| 125 // waitpid() for the child, so that it does not become a zombie process. The | |
| 126 // child normally exits quickly. | |
| 127 int status; | |
| 128 pid_t wait_pid = HANDLE_EINTR(waitpid(pid, &status, 0)); | |
| 129 PCHECK(wait_pid != -1) << "waitpid"; | |
| 130 DCHECK_EQ(wait_pid, pid); | |
| 131 | |
| 132 if (WIFSIGNALED(status)) { | |
| 133 LOG(WARNING) << "intermediate process: signal " << WTERMSIG(status); | |
| 134 } else if (!WIFEXITED(status)) { | |
| 135 DLOG(WARNING) << "intermediate process: unknown termination " << status; | |
| 136 } else if (WEXITSTATUS(status) != EXIT_SUCCESS) { | |
| 137 LOG(WARNING) << "intermediate process: exit status " << WEXITSTATUS(status); | |
| 138 } | |
| 139 | |
| 140 // Rendezvous with the handler running in the grandchild process. | |
| 141 exception_port_.reset(child_port_handshake.RunServer()); | |
| 142 | |
| 143 return exception_port_ ? true : false; | |
| 144 } | |
| 145 | |
| 146 bool CrashpadClient::UseHandler() { | |
| 147 DCHECK_NE(exception_port_, kMachPortNull); | |
| 148 | |
| 149 // Set the exception handler for EXC_CRASH, EXC_RESOURCE, and EXC_GUARD. | |
| 150 // | |
| 151 // EXC_CRASH is how most crashes are received. Most other exception types such | |
| 152 // as EXC_BAD_ACCESS are delivered to a host-level exception handler in the | |
| 153 // kernel where they are converted to POSIX signals. See 10.9.5 | |
| 154 // xnu-2422.115.4/bsd/uxkern/ux_exception.c catch_mach_exception_raise(). If a | |
| 155 // core-generating signal (triggered through this hardware mechanism or a | |
| 156 // software mechanism such as abort() sending SIGABRT) is unhandled and the | |
| 157 // process exits, the exception becomes EXC_CRASH. See 10.9.5 | |
| 158 // xnu-2422.115.4/bsd/kern/kern_exit.c proc_prepareexit(). | |
| 159 // | |
| 160 // EXC_RESOURCE and EXC_GUARD do not become signals or EXC_CRASH exceptions. | |
| 161 // The host-level exception handler in the kernel does not receive these | |
| 162 // exception types, and even if it did, it would not map them to signals. | |
| 163 // Instead, the first Mach service loaded by the root (process ID 1) launchd | |
| 164 // with a boolean “ExceptionServer” property in its job dictionary (regardless | |
| 165 // of its value) or with any subdictionary property will become the host-level | |
| 166 // exception handler for EXC_CRASH, EXC_RESOURCE, and EXC_GUARD. See 10.9.5 | |
| 167 // launchd-842.92.1/src/core.c job_setup_exception_port(). Normally, this job | |
| 168 // is com.apple.ReportCrash.Root, the systemwide Apple Crash Reporter. Since | |
| 169 // it is impossible to receive EXC_RESOURCE and EXC_GUARD exceptions through | |
| 170 // the EXC_CRASH mechanism, an exception handler must be registered for them | |
| 171 // by name if it is to receive these exception types. The default task-level | |
| 172 // handler for these exception types is set by launchd in a similar manner. | |
| 173 // | |
| 174 // EXC_MASK_RESOURCE and EXC_MASK_GUARD are not available on all systems, and | |
| 175 // the kernel will reject attempts to use them if it does not understand them, | |
| 176 // so AND them with ExcMaskAll(). EXC_MASK_CRASH is not present in | |
| 177 // ExcMaskAll() but is always supported. See the documentation for | |
| 178 // ExcMaskAll(). | |
| 179 ExceptionPorts exception_ports(ExceptionPorts::kTargetTypeTask, TASK_NULL); | |
| 180 if (!exception_ports.SetExceptionPort( | |
| 181 EXC_MASK_CRASH | | |
| 182 ((EXC_MASK_RESOURCE | EXC_MASK_GUARD) & ExcMaskAll()), | |
| 183 exception_port_, | |
| 184 EXCEPTION_STATE_IDENTITY | MACH_EXCEPTION_CODES, | |
| 185 MACHINE_THREAD_STATE)) { | |
| 186 return false; | |
| 187 } | |
| 188 | |
| 189 return true; | |
| 190 } | |
| 191 | |
| 192 } // namespace crashpad | |
| OLD | NEW |