harden size calculations, bounds checks, and SHM layout validation#626
Open
metsw24-max wants to merge 1 commit intoapache:trunkfrom
Open
harden size calculations, bounds checks, and SHM layout validation#626metsw24-max wants to merge 1 commit intoapache:trunkfrom
metsw24-max wants to merge 1 commit intoapache:trunkfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
adds overflow-safe helpers for size arithmetic and applies them to all allocation and layout calculations in both slotmem backends
rejects creation when
item_size * item_numor derived sizes overflow preventing under-allocation that could lead to out-of-bounds access during slot indexingreplaces direct size expressions with validated
basesize,inuse_size, andalloc_sizeto ensure all memory allocations are correctly boundedadds checks in
slotmem_getandslotmem_putto ensuredest_lenandsrc_lendo not exceed the fixed slot size, preventing out-of-bounds reads and writes via memcpyreorders validation so that slot index bounds are checked before deriving pointers like
inuse + id, avoiding invalid pointer computationadds guards against overflow in pointer arithmetic
size * idbefore computing slot addressesvalidates shared memory layout during
slotmem_attachby recomputing expected size from descriptor fields and ensuring it does not exceed the actual segment sizeprevents use of corrupted or inconsistent shared memory segments that could otherwise lead to invalid memory access