|  | // Copyright 2017 The Chromium Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style license that can be | 
|  | // found in the LICENSE file. | 
|  |  | 
|  | // Protected memory is memory holding security-sensitive data intended to be | 
|  | // left read-only for the majority of its lifetime to avoid being overwritten | 
|  | // by attackers. ProtectedMemory is a simple wrapper around platform-specific | 
|  | // APIs to set memory read-write and read-only when required. Protected memory | 
|  | // should be set read-write for the minimum amount of time required. | 
|  |  | 
|  | // Normally mutable variables are held in read-write memory and constant data | 
|  | // is held in read-only memory to ensure it is not accidentally overwritten. | 
|  | // In some cases we want to hold mutable variables in read-only memory, except | 
|  | // when they are being written to, to ensure that they are not tampered with. | 
|  | // | 
|  | // ProtectedMemory is a container class intended to hold a single variable in | 
|  | // read-only memory, except when explicitly set read-write. The variable can be | 
|  | // set read-write by creating a scoped AutoWritableMemory object by calling | 
|  | // AutoWritableMemory::Create(), the memory stays writable until the returned | 
|  | // object goes out of scope and is destructed. The wrapped variable can be | 
|  | // accessed using operator* and operator->. | 
|  | // | 
|  | // Instances of ProtectedMemory must be declared in the PROTECTED_MEMORY_SECTION | 
|  | // and as global variables. Because protected memory variables are globals, the | 
|  | // the same rules apply disallowing non-trivial constructors and destructors. | 
|  | // Global definitions are required to avoid the linker placing statics in | 
|  | // inlinable functions into a comdat section and setting the protected memory | 
|  | // section read-write when they are merged. | 
|  | // | 
|  | // EXAMPLE: | 
|  | // | 
|  | //  struct Items { void* item1; }; | 
|  | //  static PROTECTED_MEMORY_SECTION base::ProtectedMemory<Items> items; | 
|  | //  void InitializeItems() { | 
|  | //    // Explicitly set items read-write before writing to it. | 
|  | //    auto writer = base::AutoWritableMemory::Create(items); | 
|  | //    items->item1 = /* ... */; | 
|  | //    assert(items->item1 != nullptr); | 
|  | //    // items is set back to read-only on the destruction of writer | 
|  | //  } | 
|  | // | 
|  | //  using FnPtr = void (*)(void); | 
|  | //  PROTECTED_MEMORY_SECTION base::ProtectedMemory<FnPtr> fnPtr; | 
|  | //  FnPtr ResolveFnPtr(void) { | 
|  | //    // The Initializer nested class is a helper class for creating a static | 
|  | //    // initializer for a ProtectedMemory variable. It implicitly sets the | 
|  | //    // variable read-write during initialization. | 
|  | //    static base::ProtectedMemory<FnPtr>::Initializer I(&fnPtr, | 
|  | //      reinterpret_cast<FnPtr>(dlsym(/* ... */))); | 
|  | //    return *fnPtr; | 
|  | //  } | 
|  |  | 
|  | #ifndef BASE_MEMORY_PROTECTED_MEMORY_H_ | 
|  | #define BASE_MEMORY_PROTECTED_MEMORY_H_ | 
|  |  | 
|  | #include "base/lazy_instance.h" | 
|  | #include "base/logging.h" | 
|  | #include "base/macros.h" | 
|  | #include "base/synchronization/lock.h" | 
|  | #include "build/build_config.h" | 
|  |  | 
|  | #define PROTECTED_MEMORY_ENABLED 1 | 
|  |  | 
|  | #if defined(OS_MACOSX) && !defined(OS_IOS) | 
|  | // The segment the section is in is defined read-only with a linker flag in | 
|  | // build/config/mac/BUILD.gn | 
|  | #define PROTECTED_MEMORY_SECTION \ | 
|  | __attribute__((section("PROTECTED_MEMORY, protected_memory"))) | 
|  | extern char __start_protected_memory __asm( | 
|  | "section$start$PROTECTED_MEMORY$protected_memory"); | 
|  | extern char __stop_protected_memory __asm( | 
|  | "section$end$PROTECTED_MEMORY$protected_memory"); | 
|  |  | 
|  | #elif defined(OS_WIN) | 
|  | // Define a read-write prot section. The $a, $mem, and $z 'sub-sections' are | 
|  | // merged alphabetically so $a and $z are used to define the start and end of | 
|  | // the protected memory section, and $mem holds protected variables. | 
|  | // (Note: Sections in Portable Executables are equivalent to segments in other | 
|  | // executable formats, so this section is mapped into its own pages.) | 
|  | #pragma section("prot$a", read, write) | 
|  | #pragma section("prot$mem", read, write) | 
|  | #pragma section("prot$z", read, write) | 
|  |  | 
|  | // We want the protected memory section to be read-only, not read-write so we | 
|  | // instruct the linker to set the section read-only at link time. We do this | 
|  | // at link time instead of compile time, because defining the prot section | 
|  | // read-only would cause mis-compiles due to optimizations assuming that the | 
|  | // section contents are constant. | 
|  | #pragma comment(linker, "/SECTION:prot,R") | 
|  |  | 
|  | __declspec(allocate("prot$a")) __declspec(selectany) | 
|  | char __start_protected_memory; | 
|  | __declspec(allocate("prot$z")) __declspec(selectany) | 
|  | char __stop_protected_memory; | 
|  |  | 
|  | #define PROTECTED_MEMORY_SECTION __declspec(allocate("prot$mem")) | 
|  |  | 
|  | #else | 
|  | #undef PROTECTED_MEMORY_ENABLED | 
|  | #define PROTECTED_MEMORY_ENABLED 0 | 
|  | #define PROTECTED_MEMORY_SECTION | 
|  | #endif | 
|  |  | 
|  | namespace base { | 
|  |  | 
|  | template <typename T> | 
|  | class ProtectedMemory { | 
|  | public: | 
|  | ProtectedMemory() = default; | 
|  |  | 
|  | // Expose direct access to the encapsulated variable | 
|  | T& operator*() { return data; } | 
|  | const T& operator*() const { return data; } | 
|  | T* operator->() { return &data; } | 
|  | const T* operator->() const { return &data; } | 
|  |  | 
|  | // Helper class for creating simple ProtectedMemory static initializers. | 
|  | class Initializer { | 
|  | public: | 
|  | // Defined out-of-line below to break circular definition dependency between | 
|  | // ProtectedMemory and AutoWritableMemory. | 
|  | Initializer(ProtectedMemory<T>* PM, const T& Init); | 
|  |  | 
|  | DISALLOW_IMPLICIT_CONSTRUCTORS(Initializer); | 
|  | }; | 
|  |  | 
|  | private: | 
|  | T data; | 
|  |  | 
|  | DISALLOW_COPY_AND_ASSIGN(ProtectedMemory); | 
|  | }; | 
|  |  | 
|  | // DCHECK that the byte at |ptr| is read-only. | 
|  | BASE_EXPORT void AssertMemoryIsReadOnly(const void* ptr); | 
|  |  | 
|  | // Abstract out platform-specific methods to get the beginning and end of the | 
|  | // PROTECTED_MEMORY_SECTION. ProtectedMemoryEnd returns a pointer to the byte | 
|  | // past the end of the PROTECTED_MEMORY_SECTION. | 
|  | #if PROTECTED_MEMORY_ENABLED | 
|  | constexpr void* ProtectedMemoryStart = &__start_protected_memory; | 
|  | constexpr void* ProtectedMemoryEnd = &__stop_protected_memory; | 
|  | #endif | 
|  |  | 
|  | #if defined(COMPONENT_BUILD) | 
|  | namespace internal { | 
|  |  | 
|  | // For component builds we want to define a separate global writers variable | 
|  | // (explained below) in every DSO that includes this header. To do that we use | 
|  | // this template to define a global without duplicate symbol errors. | 
|  | template <typename T> | 
|  | struct DsoSpecific { | 
|  | static T value; | 
|  | }; | 
|  | template <typename T> | 
|  | T DsoSpecific<T>::value = 0; | 
|  |  | 
|  | }  // namespace internal | 
|  | #endif  // defined(COMPONENT_BUILD) | 
|  |  | 
|  | // A class that sets a given ProtectedMemory variable writable while the | 
|  | // AutoWritableMemory is in scope. This class implements the logic for setting | 
|  | // the protected memory region read-only/read-write in a thread-safe manner. | 
|  | class AutoWritableMemory { | 
|  | private: | 
|  | // 'writers' is a global holding the number of ProtectedMemory instances set | 
|  | // writable, used to avoid races setting protected memory readable/writable. | 
|  | // When this reaches zero the protected memory region is set read only. | 
|  | // Access is controlled by writers_lock. | 
|  | #if defined(COMPONENT_BUILD) | 
|  | // For component builds writers is a reference to an int defined separately in | 
|  | // every DSO. | 
|  | static constexpr int& writers = internal::DsoSpecific<int>::value; | 
|  | #else | 
|  | // Otherwise, we declare writers in the protected memory section to avoid the | 
|  | // scenario where an attacker could overwrite it with a large value and invoke | 
|  | // code that constructs and destructs an AutoWritableMemory. After such a call | 
|  | // protected memory would still be set writable because writers > 0. | 
|  | static int writers; | 
|  | #endif  // defined(COMPONENT_BUILD) | 
|  |  | 
|  | // Synchronizes access to the writers variable and the simultaneous actions | 
|  | // that need to happen alongside writers changes, e.g. setting the protected | 
|  | // memory region readable when writers is decremented to 0. | 
|  | static BASE_EXPORT base::LazyInstance<Lock>::Leaky writers_lock; | 
|  |  | 
|  | // Abstract out platform-specific memory APIs. |end| points to the byte past | 
|  | // the end of the region of memory having its memory protections changed. | 
|  | BASE_EXPORT bool SetMemoryReadWrite(void* start, void* end); | 
|  | BASE_EXPORT bool SetMemoryReadOnly(void* start, void* end); | 
|  |  | 
|  | // If this is the first writer (e.g. writers == 0) set the writers variable | 
|  | // read-write. Next, increment writers and set the requested memory writable. | 
|  | AutoWritableMemory(void* ptr, void* ptr_end) { | 
|  | #if PROTECTED_MEMORY_ENABLED | 
|  | DCHECK(ptr >= ProtectedMemoryStart && ptr_end <= ProtectedMemoryEnd); | 
|  |  | 
|  | { | 
|  | base::AutoLock auto_lock(writers_lock.Get()); | 
|  | if (writers == 0) { | 
|  | AssertMemoryIsReadOnly(ptr); | 
|  | #if !defined(COMPONENT_BUILD) | 
|  | AssertMemoryIsReadOnly(&writers); | 
|  | CHECK(SetMemoryReadWrite(&writers, &writers + 1)); | 
|  | #endif  // !defined(COMPONENT_BUILD) | 
|  | } | 
|  |  | 
|  | writers++; | 
|  | } | 
|  |  | 
|  | CHECK(SetMemoryReadWrite(ptr, ptr_end)); | 
|  | #endif  // PROTECTED_MEMORY_ENABLED | 
|  | } | 
|  |  | 
|  | public: | 
|  | // Wrap the private constructor to create an easy-to-use interface to | 
|  | // construct AutoWritableMemory objects. | 
|  | template <typename T> | 
|  | static AutoWritableMemory Create(ProtectedMemory<T>& PM) { | 
|  | T* ptr = &*PM; | 
|  | return AutoWritableMemory(ptr, ptr + 1); | 
|  | } | 
|  |  | 
|  | // Move constructor just increments writers | 
|  | AutoWritableMemory(AutoWritableMemory&& original) { | 
|  | #if PROTECTED_MEMORY_ENABLED | 
|  | base::AutoLock auto_lock(writers_lock.Get()); | 
|  | CHECK_GT(writers, 0); | 
|  | writers++; | 
|  | #endif  // PROTECTED_MEMORY_ENABLED | 
|  | } | 
|  |  | 
|  | // On destruction decrement writers, and if no other writers exist, set the | 
|  | // entire protected memory region read-only. | 
|  | ~AutoWritableMemory() { | 
|  | #if PROTECTED_MEMORY_ENABLED | 
|  | base::AutoLock auto_lock(writers_lock.Get()); | 
|  | CHECK_GT(writers, 0); | 
|  | writers--; | 
|  |  | 
|  | if (writers == 0) { | 
|  | CHECK(SetMemoryReadOnly(ProtectedMemoryStart, ProtectedMemoryEnd)); | 
|  | #if !defined(COMPONENT_BUILD) | 
|  | AssertMemoryIsReadOnly(&writers); | 
|  | #endif  // !defined(COMPONENT_BUILD) | 
|  | } | 
|  | #endif  // PROTECTED_MEMORY_ENABLED | 
|  | } | 
|  |  | 
|  | DISALLOW_IMPLICIT_CONSTRUCTORS(AutoWritableMemory); | 
|  | }; | 
|  |  | 
|  | template <typename T> | 
|  | ProtectedMemory<T>::Initializer::Initializer(ProtectedMemory<T>* PM, | 
|  | const T& Init) { | 
|  | AutoWritableMemory writer = AutoWritableMemory::Create(*PM); | 
|  | **PM = Init; | 
|  | } | 
|  |  | 
|  | }  // namespace base | 
|  |  | 
|  | #endif  // BASE_MEMORY_PROTECTED_MEMORY_H_ |