Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(49)

Issue 1841363003: Replace RELEASE_ASSERT_WITH_SECURITY_IMPLICATION with SECURITY_CHECK. (Closed)

Created:
4 years, 8 months ago by tkent
Modified:
4 years, 8 months ago
CC:
Mads Ager (chromium), blink-reviews, blink-reviews-bindings_chromium.org, blink-reviews-dom_chromium.org, blink-reviews-wtf_chromium.org, chromium-reviews, dglazkov+blink, eae+blinkwatch, gavinp+loader_chromium.org, hongchan, Nate Chapin, kouhei+heap_chromium.org, loading-reviews_chromium.org, Mikhail, oilpan-reviews, rwlbuis, Raymond Toy, sof, tyoshino+watch_chromium.org
Base URL:
https://chromium.googlesource.com/chromium/src.git@master
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

Replace RELEASE_ASSERT_WITH_SECURITY_IMPLICATION with SECURITY_CHECK. SECURITY_CHECK is based on base/logging.h. SECURITY_CHECK is - equivalent to SECURITY_DCHECK if ADDRESS_SANITIZER is defined. - equivalent to CHECK otherwise. It's similar to RELEASE_ASSERT_WITH_SECURITY_IMPLICATION. BUG=596760 Committed: https://crrev.com/be2579d48fbb2b4c98f693ab1c62cf1a9d60a06d Cr-Commit-Position: refs/heads/master@{#384205}

Patch Set 1 : #

Total comments: 7

Messages

Total messages: 24 (9 generated)
tkent
inferno@, would you review this please? I don't try to remove/improve RELEASE_ASSERT_WITH_SECURITY_IMPLICATION in this CL.
4 years, 8 months ago (2016-03-31 00:26:18 UTC) #3
haraken
https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h File third_party/WebKit/Source/wtf/Assertions.h (right): https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h#newcode220 third_party/WebKit/Source/wtf/Assertions.h:220: // with SECURITY_DCHECK. SECURITY_DCHECK => SECURITY_CHECK ? https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h#newcode250 third_party/WebKit/Source/wtf/Assertions.h:250: ...
4 years, 8 months ago (2016-03-31 00:54:59 UTC) #5
dcheng
https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h File third_party/WebKit/Source/wtf/Assertions.h (right): https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h#newcode220 third_party/WebKit/Source/wtf/Assertions.h:220: // with SECURITY_DCHECK. On 2016/03/31 at 00:54:58, haraken wrote: ...
4 years, 8 months ago (2016-03-31 01:09:40 UTC) #7
inferno
lgtm https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h File third_party/WebKit/Source/wtf/Assertions.h (right): https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h#newcode250 third_party/WebKit/Source/wtf/Assertions.h:250: // A SECURITY_CHECK failure is actually not vulnerable. ...
4 years, 8 months ago (2016-03-31 04:04:18 UTC) #9
haraken
On 2016/03/31 04:04:18, inferno wrote: > lgtm > > https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h > File third_party/WebKit/Source/wtf/Assertions.h (right): > ...
4 years, 8 months ago (2016-03-31 04:07:53 UTC) #10
tkent
https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h File third_party/WebKit/Source/wtf/Assertions.h (right): https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h#newcode220 third_party/WebKit/Source/wtf/Assertions.h:220: // with SECURITY_DCHECK. > SECURITY_DCHECK => SECURITY_CHECK ? SECURITY_DCHECK ...
4 years, 8 months ago (2016-03-31 05:26:12 UTC) #11
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1841363003/20001 View timeline at https://chromium-cq-status.appspot.com/patch-timeline/1841363003/20001
4 years, 8 months ago (2016-03-31 05:26:48 UTC) #13
commit-bot: I haz the power
Try jobs failed on following builders: mac_chromium_rel_ng on tryserver.chromium.mac (JOB_TIMED_OUT, http://build.chromium.org/p/tryserver.chromium.mac/builders/mac_chromium_rel_ng/builds/202788)
4 years, 8 months ago (2016-03-31 06:12:24 UTC) #15
Oliver Chang
https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h File third_party/WebKit/Source/wtf/Assertions.h (right): https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h#newcode250 third_party/WebKit/Source/wtf/Assertions.h:250: // A SECURITY_CHECK failure is actually not vulnerable. On ...
4 years, 8 months ago (2016-03-31 06:13:39 UTC) #17
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1841363003/20001 View timeline at https://chromium-cq-status.appspot.com/patch-timeline/1841363003/20001
4 years, 8 months ago (2016-03-31 06:14:01 UTC) #18
haraken
On 2016/03/31 06:13:39, Oliver Chang wrote: > https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h > File third_party/WebKit/Source/wtf/Assertions.h (right): > > https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Source/wtf/Assertions.h#newcode250 ...
4 years, 8 months ago (2016-03-31 06:21:46 UTC) #19
Oliver Chang
On 2016/03/31 06:21:46, haraken wrote: > On 2016/03/31 06:13:39, Oliver Chang wrote: > > > ...
4 years, 8 months ago (2016-03-31 06:30:26 UTC) #20
commit-bot: I haz the power
Committed patchset #1 (id:20001)
4 years, 8 months ago (2016-03-31 06:53:53 UTC) #21
commit-bot: I haz the power
Patchset 1 (id:??) landed as https://crrev.com/be2579d48fbb2b4c98f693ab1c62cf1a9d60a06d Cr-Commit-Position: refs/heads/master@{#384205}
4 years, 8 months ago (2016-03-31 06:55:08 UTC) #23
aarya
4 years, 8 months ago (2016-03-31 14:58:57 UTC) #24
Message was sent while issue was closed.
On 2016/03/31 06:13:39, Oliver Chang wrote:
>
https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Sour...
> File third_party/WebKit/Source/wtf/Assertions.h (right):
> 
>
https://codereview.chromium.org/1841363003/diff/20001/third_party/WebKit/Sour...
> third_party/WebKit/Source/wtf/Assertions.h:250: // A SECURITY_CHECK failure is
> actually not vulnerable.
> On 2016/03/31 04:04:18, inferno wrote:
> > On 2016/03/31 01:09:40, dcheng wrote:
> > > On 2016/03/31 at 00:54:58, haraken wrote:
> > > > Maybe failures that are not vulnerable should use CHECK?
> > > > 
> > > > BTW, I don't think Blink has distinguished
> > > RELEASE_ASSERT_WITH_SECURITY_IMPLICATION and RELEASE_ASSERT very well. Is
it
> > > worth having the difference?
> > > 
> > > (I think) the security team uses this as a signal of how critical a
reported
> > > issue might be.
> > 
> > Yes correct, otherwise we won't be able to distinguish these. and hard to
> > prioritize stuff everything shows as plain checks.
> 
> Why do we need to distinguish between CHECK and SECURITY_CHECK here? As tkent
> mentioned, SECURITY_CHECK failures don't indicate any exploitable
vulnerability,
> so there's no reason to prioritise SECURITY_CHECK over CHECK or make this
> distinction? The one advantage I see is that it could deter someone from
> unknowingly removing a security sensitive CHECK (or turning it into a DCHECK).
> 
> Either way, as this is right now it can actually cause confusion for us during
> fuzzing since we just see the "Security check failed:" message for both
> SECURITY_CHECK and SECURITY_DCHECK, but only the latter represents a real
> vulnerability.

SECURITY_CHECK are put in some few places (so yes it is discouraged and people
should put CHECK) where we actually want to get reproducible repro and
prioritize it for fixing the underlying cause. Otherwise, it just gets lost.

Powered by Google App Engine
This is Rietveld 408576698