mirror of
https://github.com/GrapheneOS/hardened_malloc.git
synced 2025-11-03 09:16:32 +01:00
Compare commits
4 commits
8e9b94b3ed
...
ef17e74063
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
ef17e74063 | ||
|
|
33ed3027ab | ||
|
|
86dde60fcf | ||
|
|
9ca3279507 |
8 changed files with 87 additions and 5 deletions
|
|
@ -159,8 +159,11 @@ line to the `/etc/ld.so.preload` configuration file:
|
|||
The format of this configuration file is a whitespace-separated list, so it's
|
||||
good practice to put each library on a separate line.
|
||||
|
||||
On Debian systems `libhardened_malloc.so` should be installed into `/usr/lib/`
|
||||
to avoid preload failures caused by AppArmor profile restrictions.
|
||||
For maximum compatibility `libhardened_malloc.so` can be installed into
|
||||
`/usr/lib/` to avoid preload failures caused by AppArmor profiles or systemd
|
||||
ExecPaths= restrictions. Check for logs of the following format:
|
||||
|
||||
ERROR: ld.so: object '/usr/local/lib/libhardened_malloc.so' from /etc/ld.so.preload cannot be preloaded (failed to map segment from shared object): ignored.
|
||||
|
||||
Using the `LD_PRELOAD` environment variable to load it on a case-by-case basis
|
||||
will not work when `AT_SECURE` is set such as with setuid binaries. It's also
|
||||
|
|
|
|||
|
|
@ -44,7 +44,7 @@ void *set_pointer_tag(void *ptr, u8 tag) {
|
|||
return (void *) (((uintptr_t) tag << 56) | (uintptr_t) untag_pointer(ptr));
|
||||
}
|
||||
|
||||
// This test checks that slab slot allocation uses tag that is distint from tags of its neighbors
|
||||
// This test checks that slab slot allocation uses tag that is distinct from tags of its neighbors
|
||||
// and from the tag of the previous allocation that used the same slot
|
||||
void tag_distinctness() {
|
||||
// tag 0 is reserved
|
||||
|
|
|
|||
3
test/.gitignore
vendored
3
test/.gitignore
vendored
|
|
@ -41,4 +41,7 @@ overflow_small_8_byte
|
|||
uninitialized_read_large
|
||||
uninitialized_read_small
|
||||
realloc_init
|
||||
realloc_c23_undefined_behaviour
|
||||
realloc_c23_undefined_behaviour_double_free
|
||||
realloc_c23_undefined_behaviour_use_after_free
|
||||
__pycache__/
|
||||
|
|
|
|||
|
|
@ -67,7 +67,10 @@ EXECUTABLES := \
|
|||
invalid_malloc_object_size_small \
|
||||
invalid_malloc_object_size_small_quarantine \
|
||||
impossibly_large_malloc \
|
||||
realloc_init
|
||||
realloc_init \
|
||||
realloc_c23_undefined_behaviour \
|
||||
realloc_c23_undefined_behaviour_double_free \
|
||||
realloc_c23_undefined_behaviour_use_after_free
|
||||
|
||||
all: $(EXECUTABLES)
|
||||
|
||||
|
|
|
|||
19
test/realloc_c23_undefined_behaviour.c
Normal file
19
test/realloc_c23_undefined_behaviour.c
Normal file
|
|
@ -0,0 +1,19 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
#include "test_util.h"
|
||||
|
||||
OPTNONE int main(void) {
|
||||
char *p, *q, *r;
|
||||
|
||||
p = malloc(16);
|
||||
if (!p) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
q = realloc(p, 0);
|
||||
|
||||
free(q);
|
||||
|
||||
return 0;
|
||||
}
|
||||
19
test/realloc_c23_undefined_behaviour_double_free.c
Normal file
19
test/realloc_c23_undefined_behaviour_double_free.c
Normal file
|
|
@ -0,0 +1,19 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
#include "test_util.h"
|
||||
|
||||
OPTNONE int main(void) {
|
||||
char *p, *q, *r;
|
||||
|
||||
p = malloc(16);
|
||||
if (!p) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
q = realloc(p, 0);
|
||||
|
||||
free(p);
|
||||
|
||||
return 0;
|
||||
}
|
||||
21
test/realloc_c23_undefined_behaviour_use_after_free.c
Normal file
21
test/realloc_c23_undefined_behaviour_use_after_free.c
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
#include "test_util.h"
|
||||
|
||||
OPTNONE int main(void) {
|
||||
char *p, *q, *r;
|
||||
|
||||
p = malloc(256 * 1024);
|
||||
if (!p) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
q = realloc(p, 0);
|
||||
|
||||
printf("%c\n", *p);
|
||||
|
||||
free(q);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
|
@ -98,7 +98,7 @@ class TestSimpleMemoryCorruption(unittest.TestCase):
|
|||
self.assertEqual(stderr.decode("utf-8"),
|
||||
"fatal allocator error: invalid free\n")
|
||||
|
||||
def test_invalid_malloc_usable_size_small_quarantene(self):
|
||||
def test_invalid_malloc_usable_size_small_quarantine(self):
|
||||
_stdout, stderr, returncode = self.run_test(
|
||||
"invalid_malloc_usable_size_small_quarantine")
|
||||
self.assertEqual(returncode, -6)
|
||||
|
|
@ -169,6 +169,20 @@ class TestSimpleMemoryCorruption(unittest.TestCase):
|
|||
self.assertEqual(stderr.decode("utf-8"),
|
||||
"fatal allocator error: invalid realloc\n")
|
||||
|
||||
def test_realloc_c23_undefined_behaviour(self):
|
||||
_stdout, stderr, returncode = self.run_test("realloc_c23_undefined_behaviour")
|
||||
self.assertEqual(returncode, 0)
|
||||
|
||||
def test_realloc_c23_undefined_behaviour_double_free(self):
|
||||
_stdout, stderr, returncode = self.run_test("realloc_c23_undefined_behaviour_double_free")
|
||||
self.assertEqual(returncode, -6)
|
||||
self.assertEqual(stderr.decode("utf-8"),
|
||||
"fatal allocator error: double free (quarantine)\n")
|
||||
|
||||
def test_realloc_c23_undefined_behaviour_use_after_free(self):
|
||||
_stdout, stderr, returncode = self.run_test("realloc_c23_undefined_behaviour_use_after_free")
|
||||
self.assertEqual(returncode, -11)
|
||||
|
||||
def test_write_after_free_large_reuse(self):
|
||||
_stdout, _stderr, returncode = self.run_test(
|
||||
"write_after_free_large_reuse")
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue