Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(94)

Unified Diff: third_party/tcmalloc/chromium/src/metadata_encrypt_generic.h

Issue 7833003: code for encrypting sensitive tcmalloc metadata (Closed) Base URL: http://git.chromium.org/git/chromium.git@trunk
Patch Set: metadata encryption Created 9 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/tcmalloc/chromium/src/metadata_encrypt_generic.h
diff --git a/third_party/tcmalloc/chromium/src/metadata_encrypt_generic.h b/third_party/tcmalloc/chromium/src/metadata_encrypt_generic.h
new file mode 100644
index 0000000000000000000000000000000000000000..b54c1578ff400f070c79967d94e565c84b46cc42
--- /dev/null
+++ b/third_party/tcmalloc/chromium/src/metadata_encrypt_generic.h
@@ -0,0 +1,80 @@
+// Copyright (c) 2011, Google Inc.
jschuh 2011/09/13 16:37:12 I'd rename this metadata_encrypt_posix.h. Also, I
bxx 2011/09/13 19:36:09 Done.
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are
+// met:
+//
+// * Redistributions of source code must retain the above copyright
+// notice, this list of conditions and the following disclaimer.
+// * Redistributions in binary form must reproduce the above
+// copyright notice, this list of conditions and the following disclaimer
+// in the documentation and/or other materials provided with the
+// distribution.
+// * Neither the name of Google Inc. nor the names of its
+// contributors may be used to endorse or promote products derived from
+// this software without specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+// ---
+// Author: Rebecca Shapiro
+//
+// Generic pointer encryption implementation.
+
+#ifndef TCMALLOC_METADATA_ENCRYPT_GENERIC_H_
+#define TCMALLOC_METADATA_ENCRYPT_GENERIC_H_
+
+#include <errno.h>
+#include <fcntl.h>
+#include <stdint.h>
+#include "base/logging.h"
+
+namespace {
+static uintptr_t key_;
+static bool initialized_ = false;
jschuh 2011/09/13 16:37:12 You don't need a separate bool for initialized. Ju
bxx 2011/09/13 19:36:09 Done.
+}
+
+namespace tcmalloc {
+
+void InitEncryption() {
+ // Ensure this function only executes once.
jar (doing other things) 2011/09/13 18:15:18 You also want assurances that this is only execute
bxx 2011/09/13 20:06:58 Initialization is done when TCMallocGuard() is con
bxx 2011/09/13 20:06:58 It gets initialized when TCMallocGuard() is constr
+ CHECK(initialized_ == false);
+ initialized_ == true;
jschuh 2011/09/13 16:37:12 Never mark something as "true" until you've actual
jar (doing other things) 2011/09/13 18:15:18 +1 Very good coding style. On 2011/09/13 16:37:1
bxx 2011/09/13 19:36:09 Done.
+
+ // Read random bytes from urandom to initialize key.
+ int fd = open("/dev/urandom", O_RDONLY);
+ CHECK(fd > 0);
+ size_t uintp_size = sizeof(uintptr_t);
+ size_t num_read_bytes = 0;
+ while (num_read_bytes < uintp_size) {
+ size_t num_bytes = read(fd, reinterpret_cast<void *>(&key_)+num_read_bytes,
jschuh 2011/09/13 16:37:12 Don't read directly into key. Better to store it i
bxx 2011/09/13 19:36:09 The initialization is done when TCMallocGuard() is
+ uintp_size-num_read_bytes);
+ if (num_bytes < 0) {
jar (doing other things) 2011/09/13 18:15:18 Since num_bytes is unsigned, this is a very strang
bxx 2011/09/13 20:06:58 The man pages tell me read() returns -1 when there
+ CHECK( errno == EINTR);
+ } else if (num_bytes == 0) {
+ break;
+ }
+ num_read_bytes += num_bytes;
+ }
+ CHECK(num_read_bytes == uintp_size);
+ close(fd);
+}
+
+uintptr_t EncryptUintptr(uintptr_t ptr) { return ptr ^ key_; }
+
+uintptr_t DecryptUintptr(uintptr_t ptr) { return EncryptUintptr(ptr); }
+
+}
+
+#endif // TCMALLOC_METADATA_ENCRYPT_GENERIC_H_

Powered by Google App Engine
This is Rietveld 408576698