内存管理--KASAN

KASAN是用于内存debug使用的一种机制,通过内核中使能该选项:

 CONFIG_KASAN = y

它的原理就是,通过内存中分配一块专用内存为“影子内存”(shadow memory)用来标记系统可以用内存的状态,类似于内核中使用struct page结构体,只不过影子内存比struct page更加浪费内存,它与可用内存的比例为1:8。因为影子内存是把内存按照8 Byte来标记,标志位如下:

0x00-------8 Byte可访问
0x01-------起始处1 Byte可访问
0x02-------起始处2 Byte可访问
0x03-------起始处3 Byte可访问
0x04-------起始处4 Byte可访问
0x05-------起始处5 Byte可访问
0x06-------起始处6 Byte可访问
0x07-------起始处7 Byte可访问
0xFA-0xFF-----不可访问

这样把每块内存的访问状态都可以利用影子内存来查找到,在内核编译时,利用GCC的选项来编译特定指令到内核中,相当于打桩,在每次访问内存时都会进行一下access权限的验证,如果验证失败就会报错。这就是KASAN的实现原理。

除了上面介绍的CONFIG配置项以外,有些内核版本可能还需要打开slub debug才行,因为有一些版本的KASAN的实现是依赖于slub debug的:

CONFIG_SLUB_DEBUG=y

最新的内核版本已经不存在这种依赖了,但是依然可以同时打开,这样的好处是KASAN检测出来的错误会输出更多的信息以便定位问题。

这里需要特别强调的是,slub debug和KASAN是两个功能,实现机制也是各有不同,不可以混为一谈。

  • slub debug只能对slub分配器的内存进行检查,使能redzone和padding用于检查slab越界访问和访问已释放内存,redzone可以检测出向后越界,padding可以检测出向前越界。
  • KASAN的功能和slub debug的功能有部分重叠,但是比slub debug更加强大,它可以检测slab越界、栈越界、全局变量越界等。
==================================================================
BUG: AddressSanitizer: out of bounds access in kmalloc_oob_right+0x65/0x75 [test_kasan] at addr ffff8800693bc5d3
Write of size 1 by task modprobe/1689
=============================================================================
BUG kmalloc-128 (Not tainted): kasan error
-----------------------------------------------------------------------------

Disabling lock debugging due to kernel taint
INFO: Allocated in kmalloc_oob_right+0x3d/0x75 [test_kasan] age=0 cpu=0 pid=1689
 __slab_alloc+0x4b4/0x4f0
 kmem_cache_alloc_trace+0x10b/0x190
 kmalloc_oob_right+0x3d/0x75 [test_kasan]
 init_module+0x9/0x47 [test_kasan]
 do_one_initcall+0x99/0x200
 load_module+0x2cb3/0x3b20
 SyS_finit_module+0x76/0x80
 system_call_fastpath+0x12/0x17
INFO: Slab 0xffffea0001a4ef00 objects=17 used=7 fp=0xffff8800693bd728 flags=0x100000000004080
INFO: Object 0xffff8800693bc558 @offset=1368 fp=0xffff8800693bc720

Bytes b4 ffff8800693bc548: 00 00 00 00 00 00 00 00 5a 5a 5a 5a 5a 5a 5a 5a  ........ZZZZZZZZ
Object ffff8800693bc558: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
Object ffff8800693bc568: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
Object ffff8800693bc578: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
Object ffff8800693bc588: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
Object ffff8800693bc598: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
Object ffff8800693bc5a8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
Object ffff8800693bc5b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
Object ffff8800693bc5c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5  kkkkkkkkkkkkkkk.
Redzone ffff8800693bc5d8: cc cc cc cc cc cc cc cc                          ........
Padding ffff8800693bc718: 5a 5a 5a 5a 5a 5a 5a 5a                          ZZZZZZZZ
CPU: 0 PID: 1689 Comm: modprobe Tainted: G    B          3.18.0-rc1-mm1+ #98
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.7.5-0-ge51488c-20140602_164612-nilsson.home.kraxel.org 04/01/2014
 ffff8800693bc000 0000000000000000 ffff8800693bc558 ffff88006923bb78
 ffffffff81cc68ae 00000000000000f3 ffff88006d407600 ffff88006923bba8
 ffffffff811fd848 ffff88006d407600 ffffea0001a4ef00 ffff8800693bc558
Call Trace:
 [] dump_stack+0x46/0x58
 [] print_trailer+0xf8/0x160
 [] ? kmem_cache_oob+0xc3/0xc3 [test_kasan]
 [] object_err+0x35/0x40
 [] ? kmalloc_oob_right+0x65/0x75 [test_kasan]
 [] kasan_report_error+0x38a/0x3f0
 [] ? kasan_poison_shadow+0x2f/0x40
 [] ? kasan_unpoison_shadow+0x14/0x40
 [] ? kasan_poison_shadow+0x2f/0x40
 [] ? kmem_cache_oob+0xc3/0xc3 [test_kasan]
 [] __asan_store1+0x75/0xb0
 [] ? kmem_cache_oob+0x1d/0xc3 [test_kasan]
 [] ? kmalloc_oob_right+0x65/0x75 [test_kasan]
 [] kmalloc_oob_right+0x65/0x75 [test_kasan]
 [] init_module+0x9/0x47 [test_kasan]
 [] do_one_initcall+0x99/0x200
 [] ? __vunmap+0xec/0x160
 [] load_module+0x2cb3/0x3b20
 [] ? m_show+0x240/0x240
 [] SyS_finit_module+0x76/0x80
 [] system_call_fastpath+0x12/0x17
Memory state around the buggy address:
 ffff8800693bc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8800693bc380: fc fc 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
 ffff8800693bc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8800693bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8800693bc500: fc fc fc fc fc fc fc fc fc fc fc 00 00 00 00 00
>ffff8800693bc580: 00 00 00 00 00 00 00 00 00 00 03 fc fc fc fc fc
                                                 ^
 ffff8800693bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8800693bc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8800693bc700: fc fc fc fc fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8800693bc780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff8800693bc800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

最后的Memory state中的值就是对应地址的访问权限。

你可能感兴趣的:(内核笔记,深入浅出内存管理)