diff options
author | Szabolcs Nagy <szabolcs.nagy@arm.com> | 2021-07-07 14:21:40 +0100 |
---|---|---|
committer | Szabolcs Nagy <szabolcs.nagy@arm.com> | 2022-10-27 14:46:53 +0100 |
commit | 883d0c4a228ea9ae5c988bf87e99451bb80b1266 (patch) | |
tree | c134301eda7f40f1e830cf69ed0e2b1c6ada754d /malloc/malloc.c | |
parent | cf06645316e11077afbc9731693fd19e55619f59 (diff) | |
download | glibc-883d0c4a228ea9ae5c988bf87e99451bb80b1266.tar glibc-883d0c4a228ea9ae5c988bf87e99451bb80b1266.tar.gz glibc-883d0c4a228ea9ae5c988bf87e99451bb80b1266.tar.bz2 glibc-883d0c4a228ea9ae5c988bf87e99451bb80b1266.zip |
cheri: malloc: Disable pointer protection
Such arithmetic invalidates capabilities so this security measure does
not work for CHERI.
Note: the architecture makes it hard to corrupt pointers in malloc
metadata, but not impossible: current allocation bounds include the
metadata and capabilities are not revoked after free. These issues can
be fixed by a capability aware malloc.
Diffstat (limited to 'malloc/malloc.c')
-rw-r--r-- | malloc/malloc.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/malloc/malloc.c b/malloc/malloc.c index bd3c76ed31..062ca0dc0a 100644 --- a/malloc/malloc.c +++ b/malloc/malloc.c @@ -341,8 +341,12 @@ Fatal glibc error: malloc assertion failure in %s: %s\n", It assumes a minimum page size of 4096 bytes (12 bits). Systems with larger pages provide less entropy, although the pointer mangling still works. */ +#ifdef __CHERI_PURE_CAPABILITY__ +#define PROTECT_PTR(pos, ptr) (ptr) +#else #define PROTECT_PTR(pos, ptr) \ ((__typeof (ptr)) ((((size_t) pos) >> 12) ^ ((size_t) ptr))) +#endif #define REVEAL_PTR(ptr) PROTECT_PTR (&ptr, ptr) /* |