mirror of
https://github.com/chromium/crashpad.git
synced 2025-03-09 14:06:33 +00:00
Add ProcessMemorySanitized
The ProcessMemorySanitized implementation only allows reads to a given process if it falls within a given whitelist of memory ranges. This ensures that 'sanitized' snapshots only allow reading memory that was explicitly allowed. Bug: crashpad:263, chromium:973167 Change-Id: I72712d7ea3cabfd49cc91ffbe563cb349e6fcfdb Reviewed-on: https://chromium-review.googlesource.com/c/crashpad/crashpad/+/1752593 Commit-Queue: Vlad Tsyrklevich <vtsyrklevich@chromium.org> Reviewed-by: Joshua Peraza <jperaza@chromium.org>
This commit is contained in:
parent
5a0e18e417
commit
bde5196af5
@ -329,6 +329,8 @@ static_library("util") {
|
|||||||
"posix/process_info_linux.cc",
|
"posix/process_info_linux.cc",
|
||||||
"process/process_memory_linux.cc",
|
"process/process_memory_linux.cc",
|
||||||
"process/process_memory_linux.h",
|
"process/process_memory_linux.h",
|
||||||
|
"process/process_memory_sanitized.cc",
|
||||||
|
"process/process_memory_sanitized.h",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -651,6 +653,7 @@ source_set("util_test") {
|
|||||||
"linux/scoped_ptrace_attach_test.cc",
|
"linux/scoped_ptrace_attach_test.cc",
|
||||||
"linux/socket_test.cc",
|
"linux/socket_test.cc",
|
||||||
"misc/capture_context_test_util_linux.cc",
|
"misc/capture_context_test_util_linux.cc",
|
||||||
|
"process/process_memory_sanitized_test.cc",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -126,6 +126,9 @@ class ProcessMemory {
|
|||||||
bool has_size,
|
bool has_size,
|
||||||
VMSize size,
|
VMSize size,
|
||||||
std::string* string) const;
|
std::string* string) const;
|
||||||
|
|
||||||
|
// Allow ProcessMemorySanitized to call ReadUpTo.
|
||||||
|
friend class ProcessMemorySanitized;
|
||||||
};
|
};
|
||||||
|
|
||||||
} // namespace crashpad
|
} // namespace crashpad
|
||||||
|
65
util/process/process_memory_sanitized.cc
Normal file
65
util/process/process_memory_sanitized.cc
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
// Copyright 2019 The Crashpad Authors. All rights reserved.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
#include "util/process/process_memory_sanitized.h"
|
||||||
|
|
||||||
|
#include <fcntl.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
|
||||||
|
#include <algorithm>
|
||||||
|
#include <limits>
|
||||||
|
|
||||||
|
#include "base/logging.h"
|
||||||
|
#include "base/posix/eintr_wrapper.h"
|
||||||
|
|
||||||
|
namespace crashpad {
|
||||||
|
|
||||||
|
ProcessMemorySanitized::ProcessMemorySanitized()
|
||||||
|
: ProcessMemory(), memory_(nullptr), whitelist_() {}
|
||||||
|
|
||||||
|
ProcessMemorySanitized::~ProcessMemorySanitized() {}
|
||||||
|
|
||||||
|
bool ProcessMemorySanitized::Initialize(
|
||||||
|
const ProcessMemory* memory,
|
||||||
|
const std::vector<std::pair<VMAddress, VMAddress>>* whitelist) {
|
||||||
|
INITIALIZATION_STATE_SET_INITIALIZING(initialized_);
|
||||||
|
memory_ = memory;
|
||||||
|
if (whitelist)
|
||||||
|
whitelist_ = *whitelist;
|
||||||
|
INITIALIZATION_STATE_SET_VALID(initialized_);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssize_t ProcessMemorySanitized::ReadUpTo(VMAddress address,
|
||||||
|
size_t size,
|
||||||
|
void* buffer) const {
|
||||||
|
INITIALIZATION_STATE_DCHECK_VALID(initialized_);
|
||||||
|
|
||||||
|
VMAddress end = address + size;
|
||||||
|
for (auto&& entry : whitelist_) {
|
||||||
|
if (address >= entry.first && address < entry.second &&
|
||||||
|
end >= entry.first && end <= entry.second) {
|
||||||
|
return memory_->ReadUpTo(address, size, buffer);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
DLOG(ERROR)
|
||||||
|
<< "ProcessMemorySanitized failed to read unwhitelisted region. address="
|
||||||
|
<< address << " size=" << size;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
} // namespace crashpad
|
62
util/process/process_memory_sanitized.h
Normal file
62
util/process/process_memory_sanitized.h
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
// Copyright 2019 The Crashpad Authors. All rights reserved.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
#ifndef CRASHPAD_UTIL_PROCESS_PROCESS_MEMORY_SANITIZED_H_
|
||||||
|
#define CRASHPAD_UTIL_PROCESS_PROCESS_MEMORY_SANITIZED_H_
|
||||||
|
|
||||||
|
#include <sys/types.h>
|
||||||
|
|
||||||
|
#include <utility>
|
||||||
|
#include <vector>
|
||||||
|
|
||||||
|
#include "base/macros.h"
|
||||||
|
#include "util/misc/address_types.h"
|
||||||
|
#include "util/misc/initialization_state_dcheck.h"
|
||||||
|
#include "util/process/process_memory.h"
|
||||||
|
|
||||||
|
namespace crashpad {
|
||||||
|
|
||||||
|
//! \brief Sanitized access to the memory of another process.
|
||||||
|
class ProcessMemorySanitized final : public ProcessMemory {
|
||||||
|
public:
|
||||||
|
ProcessMemorySanitized();
|
||||||
|
~ProcessMemorySanitized();
|
||||||
|
|
||||||
|
//! \brief Initializes this object to read memory from the underlying
|
||||||
|
//! \a memory object if the memory range is in the provided \a whitelist.
|
||||||
|
//!
|
||||||
|
//! This method must be called successfully prior to calling any other method
|
||||||
|
//! in this class.
|
||||||
|
//!
|
||||||
|
//! \param[in] memory The memory object to read whitelisted regions from.
|
||||||
|
//! \param[in] whitelist A whitelist of memory regions.
|
||||||
|
//!
|
||||||
|
//! \return `true` on success, `false` on failure with a message logged.
|
||||||
|
bool Initialize(
|
||||||
|
const ProcessMemory* memory,
|
||||||
|
const std::vector<std::pair<VMAddress, VMAddress>>* whitelist);
|
||||||
|
|
||||||
|
private:
|
||||||
|
ssize_t ReadUpTo(VMAddress address, size_t size, void* buffer) const override;
|
||||||
|
|
||||||
|
const ProcessMemory* memory_;
|
||||||
|
InitializationStateDcheck initialized_;
|
||||||
|
std::vector<std::pair<VMAddress, VMAddress>> whitelist_;
|
||||||
|
|
||||||
|
DISALLOW_COPY_AND_ASSIGN(ProcessMemorySanitized);
|
||||||
|
};
|
||||||
|
|
||||||
|
} // namespace crashpad
|
||||||
|
|
||||||
|
#endif // CRASHPAD_UTIL_PROCESS_PROCESS_MEMORY_SANITIZED_H_
|
64
util/process/process_memory_sanitized_test.cc
Normal file
64
util/process/process_memory_sanitized_test.cc
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
// Copyright 2019 The Crashpad Authors. All rights reserved.
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
#include "util/process/process_memory_sanitized.h"
|
||||||
|
|
||||||
|
#include "gtest/gtest.h"
|
||||||
|
#include "test/process_type.h"
|
||||||
|
#include "util/misc/from_pointer_cast.h"
|
||||||
|
#include "util/process/process_memory_native.h"
|
||||||
|
|
||||||
|
namespace crashpad {
|
||||||
|
namespace test {
|
||||||
|
namespace {
|
||||||
|
|
||||||
|
TEST(ProcessMemorySanitized, DenyOnEmptyWhitelist) {
|
||||||
|
ProcessMemoryNative memory;
|
||||||
|
ASSERT_TRUE(memory.Initialize(GetSelfProcess()));
|
||||||
|
|
||||||
|
char c = 42;
|
||||||
|
char out;
|
||||||
|
|
||||||
|
ProcessMemorySanitized san_null;
|
||||||
|
san_null.Initialize(&memory, nullptr);
|
||||||
|
EXPECT_FALSE(san_null.Read(FromPointerCast<VMAddress>(&c), 1, &out));
|
||||||
|
|
||||||
|
std::vector<std::pair<VMAddress, VMAddress>> whitelist;
|
||||||
|
ProcessMemorySanitized san_blank;
|
||||||
|
san_blank.Initialize(&memory, &whitelist);
|
||||||
|
EXPECT_FALSE(san_blank.Read(FromPointerCast<VMAddress>(&c), 1, &out));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ProcessMemorySanitized, WhitelistingWorks) {
|
||||||
|
ProcessMemoryNative memory;
|
||||||
|
ASSERT_TRUE(memory.Initialize(GetSelfProcess()));
|
||||||
|
|
||||||
|
char str[4] = "ABC";
|
||||||
|
char out[4];
|
||||||
|
|
||||||
|
std::vector<std::pair<VMAddress, VMAddress>> whitelist;
|
||||||
|
whitelist.push_back(std::make_pair(FromPointerCast<VMAddress>(str + 1),
|
||||||
|
FromPointerCast<VMAddress>(str + 2)));
|
||||||
|
|
||||||
|
ProcessMemorySanitized sanitized;
|
||||||
|
sanitized.Initialize(&memory, &whitelist);
|
||||||
|
|
||||||
|
EXPECT_FALSE(sanitized.Read(FromPointerCast<VMAddress>(str), 1, &out));
|
||||||
|
EXPECT_TRUE(sanitized.Read(FromPointerCast<VMAddress>(str + 1), 1, &out));
|
||||||
|
EXPECT_FALSE(sanitized.Read(FromPointerCast<VMAddress>(str + 2), 1, &out));
|
||||||
|
}
|
||||||
|
|
||||||
|
} // namespace
|
||||||
|
} // namespace test
|
||||||
|
} // namespace crashpad
|
@ -395,6 +395,8 @@
|
|||||||
['OS=="linux" or OS=="android"', {
|
['OS=="linux" or OS=="android"', {
|
||||||
'sources': [
|
'sources': [
|
||||||
'net/http_transport_socket.cc',
|
'net/http_transport_socket.cc',
|
||||||
|
'util/process_memory_sanitized.cc',
|
||||||
|
'util/process_memory_sanitized.h',
|
||||||
],
|
],
|
||||||
}, { # else: OS!="linux"
|
}, { # else: OS!="linux"
|
||||||
'sources!': [
|
'sources!': [
|
||||||
|
@ -154,6 +154,11 @@
|
|||||||
['exclude', '^net/http_transport_test\\.cc$'],
|
['exclude', '^net/http_transport_test\\.cc$'],
|
||||||
]
|
]
|
||||||
}],
|
}],
|
||||||
|
['OS=="linux" or OS=="android"', {
|
||||||
|
'sources': [
|
||||||
|
'util/process_memory_sanitized_test.cc',
|
||||||
|
],
|
||||||
|
}],
|
||||||
['OS!="linux" and OS!="android"', {
|
['OS!="linux" and OS!="android"', {
|
||||||
'sources/': [
|
'sources/': [
|
||||||
['exclude', '^process/'],
|
['exclude', '^process/'],
|
||||||
|
Loading…
x
Reference in New Issue
Block a user