Details
-
New Feature
-
Resolution: Unresolved
-
Major
-
None
-
None
Description
Create/use a dynamic memory error detector to test the kernel (and kernel mode drivers).
Use compile time instrumentation when building the kernel to find and locate memory access bugs on a per byte level on debug builds:
From a high level, our approach to memory error detection is similar to that of kmemcheck: use shadow memory to record whether each byte of memory is safe to access, and use compile-time instrumentation to check shadow memory on each memory access.
AddressSanitizer dedicates 1/8 of kernel memory to its shadow memory (e.g. 16TB to cover 128TB on x86_64) and uses direct mapping with a scale and offset to translate a memory address to its corresponding shadow address. cite
See usage, design and possibilities of KASAN from Linux® kernel development:
https://www.phoronix.com/scan.php?page=news_item&px=KASAN-CVE-2019-8912
Attachments
Issue Links
- is blocked by
-
CORE-11794 Upgrade to GCC6 or higher
- Resolved