doc/security/hardened_malloc.adoc

65 lines
2.6 KiB
Plaintext
Raw Normal View History

= GrapheneOS hardened_malloc
2023-07-16 02:52:56 +01:00
// Copyright 2023 Jake Winters
// SPDX-License-Identifier: CC-BY-4.0
Version: 0.1.1.13
2023-06-12 17:35:30 +01:00
This documentation contains instructions to use
2023-06-13 12:27:42 +01:00
https://github.com/GrapheneOS/hardened_malloc[GrapheneOS hardened_malloc] memory allocator as the
system's default memory allocator. These instructions apply to both musl and glibc C libraries on
2023-06-13 12:31:35 +01:00
Unix-based and Unix-like systems. hardened_malloc can also be used per-application and/or per-user,
in which case root permissions are not required; this documentation focuses on system-wide usage
of hardened_malloc, assumes root privileges, and assumes the compiled library will be located in a
path readable by all users of the system.
== Increase Permitted Amount of Memory Pages
2023-06-12 17:10:18 +01:00
Add `vm.max_map_count = 1048576` to `/etc/sysctl.conf` to accommodate hardened_malloc's large amount
2023-06-12 17:09:54 +01:00
of guard pages.
== Clone hardened_malloc Source Code
2023-06-13 12:31:35 +01:00
`$ git clone https://github.com/GrapheneOS/hardened_malloc.git`
== Enter hardened_malloc Local Git Repository
2023-06-13 12:31:35 +01:00
`$ cd hardened_malloc/`
== Compile hardened_malloc
2023-06-13 12:31:35 +01:00
`$ make <arguments>`
`CONFIG_N_ARENA=n` can be adjusted to increase parallel performance at the expense of memory usage,
2023-06-13 12:34:22 +01:00
or decrease memory usage at the expense of parallel performance, where `n` is an integer. Higher
values prefer parallel performance, lower values prefer lower memory usage. The number of arenas has
no impact on the security properties of hardened_malloc.
* Minimum number of arenas: 1
* Maximum number of arenas: 256
2023-06-13 12:54:27 +01:00
For extra security, `CONFIG_SEAL_METADATA=true` can be used in order to control whether Memory
Protection Keys are used to disable access to all writable allocator state outside of the memory
allocator code. It's currently disabled by default due to a significant performance cost for this
use case on current generation hardware. Whether or not this feature is enabled, the metadata is all
contained within an isolated memory region with high entropy random guard regions around it.
2023-06-13 12:34:22 +01:00
For low-memory systems, `VARIANT=light` can be used to compile the light variant of hardened_malloc,
which sacrifices some security for much less memory usage.
2023-06-13 12:54:27 +01:00
For all compile-time options, see the
https://github.com/GrapheneOS/hardened_malloc#configuration[configuration section] of
hardened_malloc's extensive official documentation.
== Copy Compiled hardened_malloc Library
2023-06-13 12:31:35 +01:00
`# cp out/libhardened_malloc.so <target_path>`
== Set System to Preload hardened_malloc on Boot
2023-06-12 17:36:13 +01:00
musl-based systems: Add `export LD_PRELOAD="<hardened_malloc_path>"` to `/etc/environment` +
+
glibc-based systems: Add `<hardened_malloc_path>` to `/etc/ld.so.preload`