mirror of
				https://github.com/GrapheneOS/hardened_malloc.git
				synced 2025-11-03 01:06:33 +01:00 
			
		
		
		
	README: add note about AppArmor constraint on Debian
This commit is contained in:
		
							parent
							
								
									61821b02c8
								
							
						
					
					
						commit
						272d9583f2
					
				
					 1 changed files with 3 additions and 0 deletions
				
			
		| 
						 | 
					@ -159,6 +159,9 @@ line to the `/etc/ld.so.preload` configuration file:
 | 
				
			||||||
The format of this configuration file is a whitespace-separated list, so it's
 | 
					The format of this configuration file is a whitespace-separated list, so it's
 | 
				
			||||||
good practice to put each library on a separate line.
 | 
					good practice to put each library on a separate line.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					On Debian systems `libhardened_malloc.so` should be installed into `/usr/lib/`
 | 
				
			||||||
 | 
					to avoid preload failures caused by AppArmor profile restrictions.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Using the `LD_PRELOAD` environment variable to load it on a case-by-case basis
 | 
					Using the `LD_PRELOAD` environment variable to load it on a case-by-case basis
 | 
				
			||||||
will not work when `AT_SECURE` is set such as with setuid binaries. It's also
 | 
					will not work when `AT_SECURE` is set such as with setuid binaries. It's also
 | 
				
			||||||
generally not a recommended approach for production usage. The recommendation
 | 
					generally not a recommended approach for production usage. The recommendation
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
	Add table
		
		Reference in a new issue