mirror of
https://github.com/chromium/crashpad.git
synced 2025-01-15 10:07:56 +08:00
36d4bb83b3
crashpad_handler_trampoline needs to use NoCfiIcall, but does not link libstdc++ in order to remain small. A dependency on base causes link errors in ASAN builds: https://ci.chromium.org/p/chromium/builders/ci/android-asan/7791? This CL depends on https://chromium-review.googlesource.com/c/chromium/mini_chromium/+/2405651 in order to include "build/build_config.h". Change-Id: Ie0344b7ead9c019cdda8a6e37ea8ec9cd5bf72b0 Reviewed-on: https://chromium-review.googlesource.com/c/crashpad/crashpad/+/2405650 Commit-Queue: Joshua Peraza <jperaza@chromium.org> Reviewed-by: Mark Mentovai <mark@chromium.org>
140 lines
4.5 KiB
C++
140 lines
4.5 KiB
C++
// Copyright 2020 The Crashpad Authors. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#ifndef CRASHPAD_UTIL_MISC_NO_CFI_ICALL_H_
|
|
#define CRASHPAD_UTIL_MISC_NO_CFI_ICALL_H_
|
|
|
|
#include <type_traits>
|
|
#include <utility>
|
|
|
|
#include "build/build_config.h"
|
|
|
|
#if defined(OS_WIN)
|
|
#include <windows.h>
|
|
#endif // OS_WIN
|
|
|
|
namespace crashpad {
|
|
|
|
namespace {
|
|
|
|
// Sanitizers annotations.
|
|
#if defined(__has_attribute)
|
|
#if __has_attribute(no_sanitize)
|
|
#define NO_SANITIZE(what) __attribute__((no_sanitize(what)))
|
|
#endif
|
|
#endif
|
|
#if !defined(NO_SANITIZE)
|
|
#define NO_SANITIZE(what)
|
|
#endif
|
|
|
|
// DISABLE_CFI_ICALL -- Disable Control Flow Integrity indirect call checks.
|
|
#if defined(OS_WIN)
|
|
// Windows also needs __declspec(guard(nocf)).
|
|
#define DISABLE_CFI_ICALL NO_SANITIZE("cfi-icall") __declspec(guard(nocf))
|
|
#else
|
|
#define DISABLE_CFI_ICALL NO_SANITIZE("cfi-icall")
|
|
#endif
|
|
|
|
template <typename Functor>
|
|
struct FunctorTraits;
|
|
|
|
template <typename R, typename... Args>
|
|
struct FunctorTraits<R (*)(Args...)> {
|
|
template <typename Function, typename... RunArgs>
|
|
DISABLE_CFI_ICALL static R Invoke(Function&& function, RunArgs&&... args) {
|
|
return std::forward<Function>(function)(std::forward<RunArgs>(args)...);
|
|
}
|
|
};
|
|
|
|
template <typename R, typename... Args>
|
|
struct FunctorTraits<R (*)(Args..., ...)> {
|
|
template <typename Function, typename... RunArgs>
|
|
DISABLE_CFI_ICALL static R Invoke(Function&& function, RunArgs&&... args) {
|
|
return std::forward<Function>(function)(std::forward<RunArgs>(args)...);
|
|
}
|
|
};
|
|
|
|
#if defined(OS_WIN) && defined(ARCH_CPU_X86)
|
|
template <typename R, typename... Args>
|
|
struct FunctorTraits<R(__stdcall*)(Args...)> {
|
|
template <typename... RunArgs>
|
|
DISABLE_CFI_ICALL static R Invoke(R(__stdcall* function)(Args...),
|
|
RunArgs&&... args) {
|
|
return function(std::forward<RunArgs>(args)...);
|
|
}
|
|
};
|
|
#endif // OS_WIN && ARCH_CPU_X86
|
|
|
|
} // namespace
|
|
|
|
//! \brief Disables cfi-icall for calls made through a function pointer.
|
|
//!
|
|
//! Clang provides several Control-Flow-Integrity (CFI) sanitizers, among them,
|
|
//! cfi-icall, which attempts to verify that the dynamic type of a function
|
|
//! matches the static type of the function pointer used to call it.
|
|
//!
|
|
//! https://clang.llvm.org/docs/ControlFlowIntegrity.html#indirect-function-call-checking
|
|
//!
|
|
//! However, cfi-icall does not have enough information to check indirect calls
|
|
//! to functions in other modules, such as through the pointers returned by
|
|
//! `dlsym()`. In these cases, CFI aborts the program upon executing the
|
|
//! indirect call.
|
|
//!
|
|
//! This class encapsulates cross-DSO function pointers to disable cfi-icall
|
|
//! precisely when calling these pointers.
|
|
template <typename Functor>
|
|
class NoCfiIcall {
|
|
public:
|
|
//! \brief Constructs this object.
|
|
//!
|
|
//! \param function A pointer to the function to be called.
|
|
explicit NoCfiIcall(Functor function) : function_(function) {}
|
|
|
|
//! \see NoCfiIcall
|
|
template <typename PointerType,
|
|
typename = std::enable_if_t<
|
|
std::is_same<typename std::remove_cv<PointerType>::type,
|
|
void*>::value>>
|
|
explicit NoCfiIcall(PointerType function)
|
|
: function_(reinterpret_cast<Functor>(function)) {}
|
|
|
|
#if defined(OS_WIN)
|
|
//! \see NoCfiIcall
|
|
template <typename = std::enable_if_t<
|
|
!std::is_same<typename std::remove_cv<Functor>::type,
|
|
FARPROC>::value>>
|
|
explicit NoCfiIcall(FARPROC function)
|
|
: function_(reinterpret_cast<Functor>(function)) {}
|
|
#endif // OS_WIN
|
|
|
|
~NoCfiIcall() = default;
|
|
|
|
//! \brief Calls the function without sanitization by cfi-icall.
|
|
template <typename... RunArgs>
|
|
decltype(auto) operator()(RunArgs&&... args) const {
|
|
return FunctorTraits<Functor>::Invoke(function_,
|
|
std::forward<RunArgs>(args)...);
|
|
}
|
|
|
|
//! \brief Returns `true` if not `nullptr`.
|
|
operator bool() const { return function_ != nullptr; }
|
|
|
|
private:
|
|
Functor function_;
|
|
};
|
|
|
|
} // namespace crashpad
|
|
|
|
#endif // CRASHPAD_UTIL_MISC_NO_CFI_ICALL_H_
|