mirror of
				https://github.com/GrapheneOS/hardened_malloc.git
				synced 2025-11-04 01:36:33 +01:00 
			
		
		
		
	Compare commits
	
		
			4 commits
		
	
	
		
			8e9b94b3ed
			...
			ef17e74063
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
							 | 
						ef17e74063 | ||
| 
							 | 
						33ed3027ab | ||
| 
							 | 
						86dde60fcf | ||
| 
							 | 
						9ca3279507 | 
					 8 changed files with 87 additions and 5 deletions
				
			
		| 
						 | 
					@ -159,8 +159,11 @@ line to the `/etc/ld.so.preload` configuration file:
 | 
				
			||||||
The format of this configuration file is a whitespace-separated list, so it's
 | 
					The format of this configuration file is a whitespace-separated list, so it's
 | 
				
			||||||
good practice to put each library on a separate line.
 | 
					good practice to put each library on a separate line.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
On Debian systems `libhardened_malloc.so` should be installed into `/usr/lib/`
 | 
					For maximum compatibility `libhardened_malloc.so` can be installed into
 | 
				
			||||||
to avoid preload failures caused by AppArmor profile restrictions.
 | 
					`/usr/lib/` to avoid preload failures caused by AppArmor profiles or systemd
 | 
				
			||||||
 | 
					ExecPaths= restrictions. Check for logs of the following format:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ERROR: ld.so: object '/usr/local/lib/libhardened_malloc.so' from /etc/ld.so.preload cannot be preloaded (failed to map segment from shared object): ignored.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Using the `LD_PRELOAD` environment variable to load it on a case-by-case basis
 | 
					Using the `LD_PRELOAD` environment variable to load it on a case-by-case basis
 | 
				
			||||||
will not work when `AT_SECURE` is set such as with setuid binaries. It's also
 | 
					will not work when `AT_SECURE` is set such as with setuid binaries. It's also
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -44,7 +44,7 @@ void *set_pointer_tag(void *ptr, u8 tag) {
 | 
				
			||||||
    return (void *) (((uintptr_t) tag << 56) | (uintptr_t) untag_pointer(ptr));
 | 
					    return (void *) (((uintptr_t) tag << 56) | (uintptr_t) untag_pointer(ptr));
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// This test checks that slab slot allocation uses tag that is distint from tags of its neighbors
 | 
					// This test checks that slab slot allocation uses tag that is distinct from tags of its neighbors
 | 
				
			||||||
// and from the tag of the previous allocation that used the same slot
 | 
					// and from the tag of the previous allocation that used the same slot
 | 
				
			||||||
void tag_distinctness() {
 | 
					void tag_distinctness() {
 | 
				
			||||||
    // tag 0 is reserved
 | 
					    // tag 0 is reserved
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
							
								
								
									
										3
									
								
								test/.gitignore
									
										
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								test/.gitignore
									
										
									
									
										vendored
									
									
								
							| 
						 | 
					@ -41,4 +41,7 @@ overflow_small_8_byte
 | 
				
			||||||
uninitialized_read_large
 | 
					uninitialized_read_large
 | 
				
			||||||
uninitialized_read_small
 | 
					uninitialized_read_small
 | 
				
			||||||
realloc_init
 | 
					realloc_init
 | 
				
			||||||
 | 
					realloc_c23_undefined_behaviour
 | 
				
			||||||
 | 
					realloc_c23_undefined_behaviour_double_free
 | 
				
			||||||
 | 
					realloc_c23_undefined_behaviour_use_after_free
 | 
				
			||||||
__pycache__/
 | 
					__pycache__/
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -67,7 +67,10 @@ EXECUTABLES := \
 | 
				
			||||||
    invalid_malloc_object_size_small \
 | 
					    invalid_malloc_object_size_small \
 | 
				
			||||||
    invalid_malloc_object_size_small_quarantine \
 | 
					    invalid_malloc_object_size_small_quarantine \
 | 
				
			||||||
    impossibly_large_malloc \
 | 
					    impossibly_large_malloc \
 | 
				
			||||||
    realloc_init
 | 
					    realloc_init \
 | 
				
			||||||
 | 
					    realloc_c23_undefined_behaviour \
 | 
				
			||||||
 | 
					    realloc_c23_undefined_behaviour_double_free \
 | 
				
			||||||
 | 
					    realloc_c23_undefined_behaviour_use_after_free
 | 
				
			||||||
 | 
					
 | 
				
			||||||
all: $(EXECUTABLES)
 | 
					all: $(EXECUTABLES)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
							
								
								
									
										19
									
								
								test/realloc_c23_undefined_behaviour.c
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								test/realloc_c23_undefined_behaviour.c
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,19 @@
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "test_util.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OPTNONE int main(void) {
 | 
				
			||||||
 | 
					    char *p, *q, *r;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    p = malloc(16);
 | 
				
			||||||
 | 
					    if (!p) {
 | 
				
			||||||
 | 
					        return 1;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    q = realloc(p, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    free(q);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										19
									
								
								test/realloc_c23_undefined_behaviour_double_free.c
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								test/realloc_c23_undefined_behaviour_double_free.c
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,19 @@
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "test_util.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OPTNONE int main(void) {
 | 
				
			||||||
 | 
					    char *p, *q, *r;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    p = malloc(16);
 | 
				
			||||||
 | 
					    if (!p) {
 | 
				
			||||||
 | 
					        return 1;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    q = realloc(p, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    free(p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										21
									
								
								test/realloc_c23_undefined_behaviour_use_after_free.c
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								test/realloc_c23_undefined_behaviour_use_after_free.c
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
					@ -0,0 +1,21 @@
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "test_util.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OPTNONE int main(void) {
 | 
				
			||||||
 | 
					    char *p, *q, *r;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    p = malloc(256 * 1024);
 | 
				
			||||||
 | 
					    if (!p) {
 | 
				
			||||||
 | 
					        return 1;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    q = realloc(p, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    printf("%c\n", *p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    free(q);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -98,7 +98,7 @@ class TestSimpleMemoryCorruption(unittest.TestCase):
 | 
				
			||||||
        self.assertEqual(stderr.decode("utf-8"),
 | 
					        self.assertEqual(stderr.decode("utf-8"),
 | 
				
			||||||
                         "fatal allocator error: invalid free\n")
 | 
					                         "fatal allocator error: invalid free\n")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def test_invalid_malloc_usable_size_small_quarantene(self):
 | 
					    def test_invalid_malloc_usable_size_small_quarantine(self):
 | 
				
			||||||
        _stdout, stderr, returncode = self.run_test(
 | 
					        _stdout, stderr, returncode = self.run_test(
 | 
				
			||||||
            "invalid_malloc_usable_size_small_quarantine")
 | 
					            "invalid_malloc_usable_size_small_quarantine")
 | 
				
			||||||
        self.assertEqual(returncode, -6)
 | 
					        self.assertEqual(returncode, -6)
 | 
				
			||||||
| 
						 | 
					@ -169,6 +169,20 @@ class TestSimpleMemoryCorruption(unittest.TestCase):
 | 
				
			||||||
        self.assertEqual(stderr.decode("utf-8"),
 | 
					        self.assertEqual(stderr.decode("utf-8"),
 | 
				
			||||||
                         "fatal allocator error: invalid realloc\n")
 | 
					                         "fatal allocator error: invalid realloc\n")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    def test_realloc_c23_undefined_behaviour(self):
 | 
				
			||||||
 | 
					        _stdout, stderr, returncode = self.run_test("realloc_c23_undefined_behaviour")
 | 
				
			||||||
 | 
					        self.assertEqual(returncode, 0)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    def test_realloc_c23_undefined_behaviour_double_free(self):
 | 
				
			||||||
 | 
					        _stdout, stderr, returncode = self.run_test("realloc_c23_undefined_behaviour_double_free")
 | 
				
			||||||
 | 
					        self.assertEqual(returncode, -6)
 | 
				
			||||||
 | 
					        self.assertEqual(stderr.decode("utf-8"),
 | 
				
			||||||
 | 
					                         "fatal allocator error: double free (quarantine)\n")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    def test_realloc_c23_undefined_behaviour_use_after_free(self):
 | 
				
			||||||
 | 
					        _stdout, stderr, returncode = self.run_test("realloc_c23_undefined_behaviour_use_after_free")
 | 
				
			||||||
 | 
					        self.assertEqual(returncode, -11)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def test_write_after_free_large_reuse(self):
 | 
					    def test_write_after_free_large_reuse(self):
 | 
				
			||||||
        _stdout, _stderr, returncode = self.run_test(
 | 
					        _stdout, _stderr, returncode = self.run_test(
 | 
				
			||||||
            "write_after_free_large_reuse")
 | 
					            "write_after_free_large_reuse")
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
	Add table
		
		Reference in a new issue