You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fig. 5.Checking if non-executable memory regions are enabled for a given
178
+
Fig. 5.Checking if non-executable memory regions are enabled for a given
175
179
binary.
176
180
177
181
The presence of an element of type `PT_GNU_STACK` in the program header table
@@ -199,30 +203,33 @@ when attempting to read from the guard page/region. This is also referred to as
199
203
The Rust compiler supports stack clashing protection via stack probing, and
200
204
enables it by default since version 1.20.0 (2017-08-31)[26]–[29].
201
205
202
-

203
-
Fig. 6. IDA Pro listing cross references to `__rust_probestack` in hello-rust.
204
-
205
206
```rust
206
-
fnhello() {
207
-
println!("Hello, world!");
207
+
fnmain() {
208
+
letv: [u8; 16384] = [1; 16384];
209
+
letfirst=&v[0];
210
+
println!("The first element is: {first}");
208
211
}
212
+
```
213
+
Fig. 6. hello-rust-stack-probe-1 program.
209
214
215
+

216
+
Fig. 7. The "unrolled loop" stack probe variant in modified hello-rust.
217
+
218
+
```rust
210
219
fnmain() {
211
-
let_: [u64; 1024] = [0; 1024];
212
-
hello();
220
+
letv: [u8; 65536] = [1; 65536];
221
+
letfirst=&v[0];
222
+
println!("The first element is: {first}");
213
223
}
214
224
```
215
-
Fig 7. Modified hello-rust.
225
+
Fig. 8. hello-rust-stack-probe-2 program.
216
226
217
-

218
-
Fig. 8. IDA Pro listing cross references to `__rust_probestack` in modified
219
-
hello-rust.
227
+

228
+
Fig. 9. The "standard loop" stack probe variant in modified hello-rust.
220
229
221
-
To check if stack clashing protection is enabled for a given binary, search for
222
-
cross references to `__rust_probestack`. The `__rust_probestack` is called in
223
-
the prologue of functions whose stack size is larger than a page size (see Fig.
224
-
6), and can be forced for illustration purposes by modifying the hello-rust
225
-
example as seen in Fig. 7 and Fig. 8.
230
+
To check if stack clashing protection is enabled for a given binary, look for
231
+
any of the two stack probe variants in the prologue of functions whose stack
232
+
size is larger than a page size (see Figs. 6–9).
226
233
227
234
228
235
### Read-only relocations and immediate binding
@@ -272,7 +279,7 @@ section indicates immediate binding is not enabled for a given binary.
272
279
The presence of both an element of type `PT_GNU_RELRO` in the program header
273
280
table and of an element with the `DT_BIND_NOW` tag and the `DF_BIND_NOW` flag
274
281
in the dynamic section indicates full RELRO is enabled for a given binary (see
275
-
Fig. 9 and Fig. 10).
282
+
Figs. 9–10).
276
283
277
284
<smallid="fn:4">4\. And the `DF_1_NOW` flag for some link editors. <a
Fig. 12.Build and execution of hello-rust-heap with debug assertions enabled.
331
+
Fig. 12.Build and execution of hello-rust-heap with debug assertions enabled.
325
332
326
333
```text
327
334
$ cargo run --release
@@ -331,10 +338,10 @@ $ cargo run --release
331
338
free(): invalid next size (normal)
332
339
Aborted
333
340
```
334
-
Fig. 13.Build and execution of hello-rust-heap with debug assertions disabled.
341
+
Fig. 13.Build and execution of hello-rust-heap with debug assertions disabled.
335
342
336
-
Heap corruption checks are being performed when using the default allocator
337
-
(i.e., the GNU Allocator) as seen in Fig. 12 and Fig. 13.
343
+
Heap corruption checks are performed when using the default allocator (i.e.,
344
+
the GNU Allocator) (see Figs. 12–13).
338
345
339
346
<smallid="fn:5">5\. Linux's standard C library default allocator is the GNU
340
347
Allocator, which is derived from ptmalloc (pthreads malloc) by Wolfram Gloger,
@@ -350,15 +357,13 @@ instruction pointer, and checking if this value has changed when returning from
350
357
a function. This is also known as “Stack Protector” or “Stack Smashing
351
358
Protector (SSP)”.
352
359
353
-
The Rust compiler supports stack smashing protection on nightly builds[42].
360
+
The Rust compiler supports stack smashing protection on nightly builds[40].
354
361
355
362

356
363
Fig. 14. IDA Pro listing cross references to `__stack_chk_fail` in hello-rust.
357
364
358
365
To check if stack smashing protection is enabled for a given binary, search for
359
-
cross references to `__stack_chk_fail`. The presence of these cross-references
360
-
in Rust-compiled code (e.g., `hello_rust::main`) indicates that the stack
361
-
smashing protection is enabled (see Fig. 14).
366
+
cross references to `__stack_chk_fail` (see Fig. 14).
362
367
363
368
364
369
### Forward-edge control flow protection
@@ -380,17 +385,14 @@ commercially available [grsecurity/PaX Reuse Attack Protector
0 commit comments