Searched hist:"38 da497a4dfcf1979c8c2b0e9f3fa0564035c147" (Results 1 – 6 of 6) sorted by relevance
/freebsd/share/man/man9/ |
H A D | kasan.9 | 38da497a4dfcf1979c8c2b0e9f3fa0564035c147 Tue Apr 13 23:39:19 CEST 2021 Mark Johnston <markj@FreeBSD.org> Add the KASAN runtime
KASAN enables the use of LLVM's AddressSanitizer in the kernel. This feature makes use of compiler instrumentation to validate memory accesses in the kernel and detect several types of bugs, including use-after-frees and out-of-bounds accesses. It is particularly effective when combined with test suites or syzkaller. KASAN has high CPU and memory usage overhead and so is not suited for production environments.
The runtime and pmap maintain a shadow of the kernel map to store information about the validity of memory mapped at a given kernel address.
The runtime implements a number of functions defined by the compiler ABI. These are prefixed by __asan. The compiler emits calls to __asan_load*() and __asan_store*() around memory accesses, and the runtime consults the shadow map to determine whether a given access is valid.
kasan_mark() is called by various kernel allocators to update state in the shadow map. Updates to those allocators will come in subsequent commits.
The runtime also defines various interceptors. Some low-level routines are implemented in assembly and are thus not amenable to compiler instrumentation. To handle this, the runtime implements these routines on behalf of the rest of the kernel. The sanitizer implementation validates memory accesses manually before handing off to the real implementation.
The sanitizer in a KASAN-configured kernel can be disabled by setting the loader tunable debug.kasan.disable=1.
Obtained from: NetBSD MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D29416
|
/freebsd/sys/sys/ |
H A D | asan.h | 38da497a4dfcf1979c8c2b0e9f3fa0564035c147 Tue Apr 13 23:39:19 CEST 2021 Mark Johnston <markj@FreeBSD.org> Add the KASAN runtime
KASAN enables the use of LLVM's AddressSanitizer in the kernel. This feature makes use of compiler instrumentation to validate memory accesses in the kernel and detect several types of bugs, including use-after-frees and out-of-bounds accesses. It is particularly effective when combined with test suites or syzkaller. KASAN has high CPU and memory usage overhead and so is not suited for production environments.
The runtime and pmap maintain a shadow of the kernel map to store information about the validity of memory mapped at a given kernel address.
The runtime implements a number of functions defined by the compiler ABI. These are prefixed by __asan. The compiler emits calls to __asan_load*() and __asan_store*() around memory accesses, and the runtime consults the shadow map to determine whether a given access is valid.
kasan_mark() is called by various kernel allocators to update state in the shadow map. Updates to those allocators will come in subsequent commits.
The runtime also defines various interceptors. Some low-level routines are implemented in assembly and are thus not amenable to compiler instrumentation. To handle this, the runtime implements these routines on behalf of the rest of the kernel. The sanitizer implementation validates memory accesses manually before handing off to the real implementation.
The sanitizer in a KASAN-configured kernel can be disabled by setting the loader tunable debug.kasan.disable=1.
Obtained from: NetBSD MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D29416
|
/freebsd/sys/kern/ |
H A D | subr_asan.c | 38da497a4dfcf1979c8c2b0e9f3fa0564035c147 Tue Apr 13 23:39:19 CEST 2021 Mark Johnston <markj@FreeBSD.org> Add the KASAN runtime
KASAN enables the use of LLVM's AddressSanitizer in the kernel. This feature makes use of compiler instrumentation to validate memory accesses in the kernel and detect several types of bugs, including use-after-frees and out-of-bounds accesses. It is particularly effective when combined with test suites or syzkaller. KASAN has high CPU and memory usage overhead and so is not suited for production environments.
The runtime and pmap maintain a shadow of the kernel map to store information about the validity of memory mapped at a given kernel address.
The runtime implements a number of functions defined by the compiler ABI. These are prefixed by __asan. The compiler emits calls to __asan_load*() and __asan_store*() around memory accesses, and the runtime consults the shadow map to determine whether a given access is valid.
kasan_mark() is called by various kernel allocators to update state in the shadow map. Updates to those allocators will come in subsequent commits.
The runtime also defines various interceptors. Some low-level routines are implemented in assembly and are thus not amenable to compiler instrumentation. To handle this, the runtime implements these routines on behalf of the rest of the kernel. The sanitizer implementation validates memory accesses manually before handing off to the real implementation.
The sanitizer in a KASAN-configured kernel can be disabled by setting the loader tunable debug.kasan.disable=1.
Obtained from: NetBSD MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D29416
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/ |
H A D | AddressSanitizer.cpp | diff 1b00608b264f1fac846e571e23d8ef7134834638 Tue Apr 27 21:18:13 CEST 2021 Dimitry Andric <dim@FreeBSD.org> Merge llvm commits for kernel address and memory sanitizer support
Merge commit 99eca1bd9c7a from llvm git (by Mark Johnston):
[Driver] Enable kernel address and memory sanitizers on FreeBSD
Test Plan: using kernel ASAN and MSAN implementations in FreeBSD
Reviewed By: emaste, dim, arichardson
Differential Revision: https://reviews.llvm.org/D98286
Merge commit f511dc75e4c1 from llvm git (by Mark Johnston):
[asan] Add an offset for the kernel address sanitizer on FreeBSD
This is based on a port of the sanitizer runtime to the FreeBSD kernel that has been commited as https://cgit.freebsd.org/src/commit/?id=38da497a4dfcf1979c8c2b0e9f3fa0564035c147 and the following commits.
Reviewed By: emaste, dim Differential Revision: https://reviews.llvm.org/D98285
Requested by: markj MFC after: 3 days
|
/freebsd/contrib/llvm-project/clang/lib/Driver/ToolChains/ |
H A D | FreeBSD.cpp | diff 1b00608b264f1fac846e571e23d8ef7134834638 Tue Apr 27 21:18:13 CEST 2021 Dimitry Andric <dim@FreeBSD.org> Merge llvm commits for kernel address and memory sanitizer support
Merge commit 99eca1bd9c7a from llvm git (by Mark Johnston):
[Driver] Enable kernel address and memory sanitizers on FreeBSD
Test Plan: using kernel ASAN and MSAN implementations in FreeBSD
Reviewed By: emaste, dim, arichardson
Differential Revision: https://reviews.llvm.org/D98286
Merge commit f511dc75e4c1 from llvm git (by Mark Johnston):
[asan] Add an offset for the kernel address sanitizer on FreeBSD
This is based on a port of the sanitizer runtime to the FreeBSD kernel that has been commited as https://cgit.freebsd.org/src/commit/?id=38da497a4dfcf1979c8c2b0e9f3fa0564035c147 and the following commits.
Reviewed By: emaste, dim Differential Revision: https://reviews.llvm.org/D98285
Requested by: markj MFC after: 3 days
|
/freebsd/sys/conf/ |
H A D | files | diff 38da497a4dfcf1979c8c2b0e9f3fa0564035c147 Tue Apr 13 23:39:19 CEST 2021 Mark Johnston <markj@FreeBSD.org> Add the KASAN runtime
KASAN enables the use of LLVM's AddressSanitizer in the kernel. This feature makes use of compiler instrumentation to validate memory accesses in the kernel and detect several types of bugs, including use-after-frees and out-of-bounds accesses. It is particularly effective when combined with test suites or syzkaller. KASAN has high CPU and memory usage overhead and so is not suited for production environments.
The runtime and pmap maintain a shadow of the kernel map to store information about the validity of memory mapped at a given kernel address.
The runtime implements a number of functions defined by the compiler ABI. These are prefixed by __asan. The compiler emits calls to __asan_load*() and __asan_store*() around memory accesses, and the runtime consults the shadow map to determine whether a given access is valid.
kasan_mark() is called by various kernel allocators to update state in the shadow map. Updates to those allocators will come in subsequent commits.
The runtime also defines various interceptors. Some low-level routines are implemented in assembly and are thus not amenable to compiler instrumentation. To handle this, the runtime implements these routines on behalf of the rest of the kernel. The sanitizer implementation validates memory accesses manually before handing off to the real implementation.
The sanitizer in a KASAN-configured kernel can be disabled by setting the loader tunable debug.kasan.disable=1.
Obtained from: NetBSD MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D29416
|