git: 777a0f30b3 - main - developers-handbook/kerneldebug: Document KASAN and KMSAN
Mark Johnston
markj at FreeBSD.org
Wed Aug 18 21:38:23 UTC 2021
The branch main has been updated by markj (src committer):
URL: https://cgit.FreeBSD.org/doc/commit/?id=777a0f30b349615db6feba4b48383dc1723e22e7
commit 777a0f30b349615db6feba4b48383dc1723e22e7
Author: Mark Johnston <markj at FreeBSD.org>
AuthorDate: 2021-07-13 21:32:19 +0000
Commit: Mark Johnston <markj at FreeBSD.org>
CommitDate: 2021-08-18 21:37:21 +0000
developers-handbook/kerneldebug: Document KASAN and KMSAN
Reviewed by: allanjude, ceri, imp
Sponsored by: The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D31166
---
.../content/en/books/developers-handbook/kerneldebug/_index.adoc | 2 ++
1 file changed, 2 insertions(+)
diff --git a/documentation/content/en/books/developers-handbook/kerneldebug/_index.adoc b/documentation/content/en/books/developers-handbook/kerneldebug/_index.adoc
index 817ef1f7de..5385ac1426 100644
--- a/documentation/content/en/books/developers-handbook/kerneldebug/_index.adoc
+++ b/documentation/content/en/books/developers-handbook/kerneldebug/_index.adoc
@@ -827,3 +827,5 @@ This section provides a brief glossary of compile-time kernel options used for d
* `options DEBUG_VFS_LOCKS`: track lock acquisition points for lockmgr/vnode locks, expanding the amount of information displayed by `show lockedvnods` in DDB. This option has a measurable performance impact.
* `options DEBUG_MEMGUARD`: a replacement for the man:malloc[9] kernel memory allocator that uses the VM system to detect reads or writes from allocated memory after free. Details may be found in man:memguard[9]. This option has a significant performance impact, but can be very helpful in debugging kernel memory corruption bugs.
* `options DIAGNOSTIC`: enable additional, more expensive diagnostic tests along the lines of `options INVARIANTS`.
+* `options KASAN`: enable the Kernel Address Sanitizer. This enables compiler instrumentation which can be used to detect invalid memory accesses in the kernel, such as use-after-frees and buffer overflows. This largely supersedes `options DEBUG_MEMGUARD`. See man:kasan[9] for details, and for the currently supported platforms.
+* `options KMSAN`: enable the Kernel Memory Sanitizer. This enables compiler instrumentation which can be used to detect uses of uninitialized memory. See man:kmsan[9] for details, and for the currently supported platforms.
More information about the dev-commits-doc-all
mailing list