mirror of
				https://github.com/GrapheneOS/hardened_malloc.git
				synced 2025-11-04 01:36:33 +01:00 
			
		
		
		
	Compare commits
	
		
			5 commits
		
	
	
		
			f465f80023
			...
			06fa9908ef
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
							 | 
						06fa9908ef | ||
| 
							 | 
						33ed3027ab | ||
| 
							 | 
						86dde60fcf | ||
| 
							 | 
						ff99511eb4 | ||
| 
							 | 
						6e39d5713d | 
					 3 changed files with 24 additions and 10 deletions
				
			
		
							
								
								
									
										30
									
								
								README.md
									
										
									
									
									
								
							
							
						
						
									
										30
									
								
								README.md
									
										
									
									
									
								
							| 
						 | 
					@ -22,6 +22,7 @@
 | 
				
			||||||
* [API extensions](#api-extensions)
 | 
					* [API extensions](#api-extensions)
 | 
				
			||||||
* [Stats](#stats)
 | 
					* [Stats](#stats)
 | 
				
			||||||
* [System calls](#system-calls)
 | 
					* [System calls](#system-calls)
 | 
				
			||||||
 | 
					* [Citations](#citations-and-mentions)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Introduction
 | 
					## Introduction
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -65,14 +66,14 @@ used instead as this allocator fundamentally doesn't support that environment.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Dependencies
 | 
					## Dependencies
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Debian stable (currently Debian 12) determines the most ancient set of
 | 
					Debian stable (currently Debian 13) determines the most ancient set of
 | 
				
			||||||
supported dependencies:
 | 
					supported dependencies:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* glibc 2.36
 | 
					* glibc 2.41
 | 
				
			||||||
* Linux 6.1
 | 
					* Linux 6.12
 | 
				
			||||||
* Clang 14.0.6 or GCC 12.2.0
 | 
					* Clang 19.1.7 or GCC 14.2.0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
For Android, the Linux GKI 5.10, 5.15 and 6.1 branches are supported.
 | 
					For Android, the Linux GKI 6.1, 6.6 and 6.12 branches are supported.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
However, using more recent releases is highly recommended. Older versions of
 | 
					However, using more recent releases is highly recommended. Older versions of
 | 
				
			||||||
the dependencies may be compatible at the moment but are not tested and will
 | 
					the dependencies may be compatible at the moment but are not tested and will
 | 
				
			||||||
| 
						 | 
					@ -83,7 +84,7 @@ there will be custom integration offering better performance in the future
 | 
				
			||||||
along with other hardening for the C standard library implementation.
 | 
					along with other hardening for the C standard library implementation.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
For Android, only the current generation, actively developed maintenance branch of the Android
 | 
					For Android, only the current generation, actively developed maintenance branch of the Android
 | 
				
			||||||
Open Source Project will be supported, which currently means `android15-release`.
 | 
					Open Source Project will be supported, which currently means `android16-release`.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Testing
 | 
					## Testing
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -159,8 +160,11 @@ line to the `/etc/ld.so.preload` configuration file:
 | 
				
			||||||
The format of this configuration file is a whitespace-separated list, so it's
 | 
					The format of this configuration file is a whitespace-separated list, so it's
 | 
				
			||||||
good practice to put each library on a separate line.
 | 
					good practice to put each library on a separate line.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
On Debian systems `libhardened_malloc.so` should be installed into `/usr/lib/`
 | 
					For maximum compatibility `libhardened_malloc.so` can be installed into
 | 
				
			||||||
to avoid preload failures caused by AppArmor profile restrictions.
 | 
					`/usr/lib/` to avoid preload failures caused by AppArmor profiles or systemd
 | 
				
			||||||
 | 
					ExecPaths= restrictions. Check for logs of the following format:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ERROR: ld.so: object '/usr/local/lib/libhardened_malloc.so' from /etc/ld.so.preload cannot be preloaded (failed to map segment from shared object): ignored.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Using the `LD_PRELOAD` environment variable to load it on a case-by-case basis
 | 
					Using the `LD_PRELOAD` environment variable to load it on a case-by-case basis
 | 
				
			||||||
will not work when `AT_SECURE` is set such as with setuid binaries. It's also
 | 
					will not work when `AT_SECURE` is set such as with setuid binaries. It's also
 | 
				
			||||||
| 
						 | 
					@ -1004,3 +1008,13 @@ Additional system calls when `CONFIG_SEAL_METADATA=true` is set:
 | 
				
			||||||
Additional system calls for Android builds with `LABEL_MEMORY`:
 | 
					Additional system calls for Android builds with `LABEL_MEMORY`:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* `prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, ptr, size, name)`
 | 
					* `prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, ptr, size, name)`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Citations and mentions
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- [StarMalloc: Verifying a Modern, Hardened Memory Allocator](https://dl.acm.org/doi/10.1145/3689773) (2024)
 | 
				
			||||||
 | 
					- [S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More](https://arxiv.org/abs/2402.01894) (2024))
 | 
				
			||||||
 | 
					- [TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution](https://arxiv.org/abs/2406.08719) (2024)
 | 
				
			||||||
 | 
					- [GuaNary: Efficient Buffer Overflow Detection In Virtualized Clouds Using Intel EPT-based Sub-Page Write Protection Support](https://dl.acm.org/doi/10.1145/3626787) (2023)
 | 
				
			||||||
 | 
					- [DangZero: Efficient Use-After-Free Detection via Direct Page Table Access](https://dl.acm.org/doi/10.1145/3548606.3560625) (2022)
 | 
				
			||||||
 | 
					- [Understanding and Mitigating Memory Corruption Attacks](https://repository.library.northeastern.edu/files/neu:4f186m727/fulltext.pdf), PhD Dissertation (2022)
 | 
				
			||||||
 | 
					- [HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators](https://dl.acm.org/doi/10.1145/3460120.3484740) (2021)
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -44,7 +44,7 @@ void *set_pointer_tag(void *ptr, u8 tag) {
 | 
				
			||||||
    return (void *) (((uintptr_t) tag << 56) | (uintptr_t) untag_pointer(ptr));
 | 
					    return (void *) (((uintptr_t) tag << 56) | (uintptr_t) untag_pointer(ptr));
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// This test checks that slab slot allocation uses tag that is distint from tags of its neighbors
 | 
					// This test checks that slab slot allocation uses tag that is distinct from tags of its neighbors
 | 
				
			||||||
// and from the tag of the previous allocation that used the same slot
 | 
					// and from the tag of the previous allocation that used the same slot
 | 
				
			||||||
void tag_distinctness() {
 | 
					void tag_distinctness() {
 | 
				
			||||||
    // tag 0 is reserved
 | 
					    // tag 0 is reserved
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -98,7 +98,7 @@ class TestSimpleMemoryCorruption(unittest.TestCase):
 | 
				
			||||||
        self.assertEqual(stderr.decode("utf-8"),
 | 
					        self.assertEqual(stderr.decode("utf-8"),
 | 
				
			||||||
                         "fatal allocator error: invalid free\n")
 | 
					                         "fatal allocator error: invalid free\n")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def test_invalid_malloc_usable_size_small_quarantene(self):
 | 
					    def test_invalid_malloc_usable_size_small_quarantine(self):
 | 
				
			||||||
        _stdout, stderr, returncode = self.run_test(
 | 
					        _stdout, stderr, returncode = self.run_test(
 | 
				
			||||||
            "invalid_malloc_usable_size_small_quarantine")
 | 
					            "invalid_malloc_usable_size_small_quarantine")
 | 
				
			||||||
        self.assertEqual(returncode, -6)
 | 
					        self.assertEqual(returncode, -6)
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
	Add table
		
		Reference in a new issue