1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
base / win / cet_shadow_stack_unittest.cc [blame]
// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <Windows.h>
#include <intrin.h>
#include "base/compiler_specific.h"
#include "base/win/windows_version.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace base {
namespace win {
namespace {
bool IsHardwareEnforcedShadowStacksEnabled() {
// Only supported post Win 10 2004.
if (base::win::GetVersion() < base::win::Version::WIN10_20H1)
return false;
PROCESS_MITIGATION_USER_SHADOW_STACK_POLICY uss_policy;
if (!::GetProcessMitigationPolicy(GetCurrentProcess(),
ProcessUserShadowStackPolicy, &uss_policy,
sizeof(uss_policy))) {
return false;
}
if (uss_policy.EnableUserShadowStack)
return true;
else
return false;
}
void* return_address;
// Bug() simulates a ROP. The first time we are called we save the
// address we will return to and return to it (like a normal function
// call). The second time we return to the saved address. If called
// from a different function the second time, this redirects control
// flow and should be different from the return address in the shadow
// stack.
NOINLINE void Bug() {
void* pvAddressOfReturnAddress = _AddressOfReturnAddress();
if (!return_address)
return_address = *reinterpret_cast<void**>(pvAddressOfReturnAddress);
else
*reinterpret_cast<void**>(pvAddressOfReturnAddress) = return_address;
}
NOINLINE void A() {
Bug();
}
NOINLINE void B() {
Bug();
}
} // namespace
TEST(CET, ShadowStack) {
if (IsHardwareEnforcedShadowStacksEnabled()) {
A();
EXPECT_DEATH(B(), "");
}
}
} // namespace win
} // namespace base