diff options
Diffstat (limited to 'src/processor/exploitability_linux.cc')
-rw-r--r-- | src/processor/exploitability_linux.cc | 153 |
1 files changed, 143 insertions, 10 deletions
diff --git a/src/processor/exploitability_linux.cc b/src/processor/exploitability_linux.cc index 1b6aabf0..c1c291ce 100644 --- a/src/processor/exploitability_linux.cc +++ b/src/processor/exploitability_linux.cc @@ -36,6 +36,8 @@ #include "processor/exploitability_linux.h" +#include <elf.h> + #include "google_breakpad/common/minidump_exception_linux.h" #include "google_breakpad/processor/call_stack.h" #include "google_breakpad/processor/process_state.h" @@ -109,8 +111,13 @@ ExploitabilityRating ExploitabilityLinux::CheckPlatformExploitability() { return EXPLOITABILITY_ERR_PROCESSING; } + if (this->ArchitectureType() == UNSUPPORTED_ARCHITECTURE) { + BPLOG(INFO) << "Unsupported architecture."; + return EXPLOITABILITY_ERR_PROCESSING; + } // Getting the instruction pointer. if (!context->GetInstructionPointer(&instruction_ptr)) { + BPLOG(INFO) << "Failed to retrieve instruction pointer."; return EXPLOITABILITY_ERR_PROCESSING; } @@ -119,35 +126,161 @@ ExploitabilityRating ExploitabilityLinux::CheckPlatformExploitability() { return EXPLOITABILITY_HIGH; } + // There was no strong evidence suggesting exploitability, but the minidump + // does not appear totally benign either. return EXPLOITABILITY_INTERESTING; } +LinuxArchitectureType ExploitabilityLinux::ArchitectureType() { + // GetContextCPU() should have already been successfully called before + // calling this method. Thus there should be a raw exception stream for + // the minidump. + MinidumpException *exception = dump_->GetException(); + const DumpContext *dump_context = + exception ? + exception->GetContext() : NULL; + if (dump_context == NULL) { + BPLOG(INFO) << "No raw dump context."; + return UNSUPPORTED_ARCHITECTURE; + } + + // Check the architecture type. + switch (dump_context->GetContextCPU()) { + case MD_CONTEXT_ARM: + case MD_CONTEXT_X86: + return LINUX_32_BIT; + case MD_CONTEXT_ARM64: + case MD_CONTEXT_AMD64: + return LINUX_64_BIT; + default: + // This should not happen. The four architectures above should be + // the only Linux architectures. + BPLOG(INFO) << "Unsupported architecture."; + return UNSUPPORTED_ARCHITECTURE; + } +} + bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { - // Here we get memory mapping. Most minidumps will not contain a memory - // mapping, so we will commonly resort to checking modules. + // Get memory mapping. Most minidumps will not contain a memory + // mapping, so processing will commonly resort to checking modules. MinidumpMemoryInfoList *mem_info_list = dump_->GetMemoryInfoList(); const MinidumpMemoryInfo *mem_info = mem_info_list ? mem_info_list->GetMemoryInfoForAddress(instruction_ptr) : NULL; - // Checking if the memory mapping at the instruction pointer is executable. - // If there is no memory mapping, we will use the modules as reference. + // Check if the memory mapping at the instruction pointer is executable. + // If there is no memory mapping, processing will use modules as reference. if (mem_info != NULL) { return mem_info->IsExecutable(); } - // If the memory mapping retrieval fails, we will check the modules + // If the memory mapping retrieval fails, check the modules // to see if the instruction pointer is inside a module. - // TODO(liuandrew): Check if the instruction pointer lies in an executable - // region within the module. MinidumpModuleList *minidump_module_list = dump_->GetModuleList(); - return !minidump_module_list || - minidump_module_list->GetModuleForAddress(instruction_ptr); + const MinidumpModule *minidump_module = + minidump_module_list ? + minidump_module_list->GetModuleForAddress(instruction_ptr) : NULL; + + // If the instruction pointer isn't in a module, return false. + if (minidump_module == NULL) { + return false; + } + + // Get ELF header data from the instruction pointer's module. + const uint64_t base_address = minidump_module->base_address(); + MinidumpMemoryList *memory_list = dump_->GetMemoryList(); + MinidumpMemoryRegion *memory_region = + memory_list ? + memory_list->GetMemoryRegionForAddress(base_address) : NULL; + + // The minidump does not have the correct memory region. + // This returns true because even though there is no memory data available, + // the evidence so far suggests that the instruction pointer is not at a + // bad location. + if (memory_region == NULL) { + return true; + } + + // Examine ELF headers. Depending on the architecture, the size of the + // ELF headers can differ. + LinuxArchitectureType architecture = this->ArchitectureType(); + if (architecture == LINUX_32_BIT) { + // Check if the ELF header is within the memory region and if the + // instruction pointer lies within the ELF header. + if (memory_region->GetSize() < sizeof(Elf32_Ehdr) || + instruction_ptr < base_address + sizeof(Elf32_Ehdr)) { + return false; + } + // Load 32-bit ELF header. + Elf32_Ehdr header; + this->LoadElfHeader(memory_region, base_address, &header); + // Check if the program header table is within the memory region, and + // validate that the program header entry size is correct. + if (header.e_phentsize != sizeof(Elf32_Phdr) || + memory_region->GetSize() < + header.e_phoff + + ((uint64_t) header.e_phentsize * (uint64_t) header.e_phnum)) { + return false; + } + // Load 32-bit Program Header Table. + scoped_array<Elf32_Phdr> program_headers(new Elf32_Phdr[header.e_phnum]); + this->LoadElfHeaderTable(memory_region, + base_address + header.e_phoff, + header.e_phnum, + program_headers.get()); + // Find correct program header that corresponds to the instruction pointer. + for (int i = 0; i < header.e_phnum; i++) { + const Elf32_Phdr& program_header = program_headers[i]; + // Check if instruction pointer lies within this program header's region. + if (instruction_ptr >= program_header.p_vaddr && + instruction_ptr < program_header.p_vaddr + program_header.p_memsz) { + // Return whether this program header region is executable. + return program_header.p_flags & PF_X; + } + } + } else if (architecture == LINUX_64_BIT) { + // Check if the ELF header is within the memory region and if the + // instruction pointer lies within the ELF header. + if (memory_region->GetSize() < sizeof(Elf64_Ehdr) || + instruction_ptr < base_address + sizeof(Elf64_Ehdr)) { + return false; + } + // Load 64-bit ELF header. + Elf64_Ehdr header; + this->LoadElfHeader(memory_region, base_address, &header); + // Check if the program header table is within the memory region, and + // validate that the program header entry size is correct. + if (header.e_phentsize != sizeof(Elf64_Phdr) || + memory_region->GetSize() < + header.e_phoff + + ((uint64_t) header.e_phentsize * (uint64_t) header.e_phnum)) { + return false; + } + // Load 64-bit Program Header Table. + scoped_array<Elf64_Phdr> program_headers(new Elf64_Phdr[header.e_phnum]); + this->LoadElfHeaderTable(memory_region, + base_address + header.e_phoff, + header.e_phnum, + program_headers.get()); + // Find correct program header that corresponds to the instruction pointer. + for (int i = 0; i < header.e_phnum; i++) { + const Elf64_Phdr& program_header = program_headers[i]; + // Check if instruction pointer lies within this program header's region. + if (instruction_ptr >= program_header.p_vaddr && + instruction_ptr < program_header.p_vaddr + program_header.p_memsz) { + // Return whether this program header region is executable. + return program_header.p_flags & PF_X; + } + } + } + + // The instruction pointer was not in an area identified by the ELF headers. + return false; } bool ExploitabilityLinux::BenignCrashTrigger(const MDRawExceptionStream *raw_exception_stream) { - // Here we check the cause of crash. + // Check the cause of crash. // If the exception of the crash is a benign exception, // it is probably not exploitable. switch (raw_exception_stream->exception_record.exception_code) { |