Uploaded image for project: 'Core ReactOS'
  1. Core ReactOS
  2. CORE-15771

Implement Google sanitizers for kernel mode

    XMLWordPrintable

Details

    • New Feature
    • Resolution: Unresolved
    • Major
    • None
    • Drivers: Other, NTCore
    • None

    Description

      Create/use a dynamic memory error detector to test the kernel (and kernel mode drivers).

       

      Use compile time instrumentation when building the kernel to find and locate memory access bugs on a per byte level on debug builds:

       

      From a high level, our approach to memory error detection is similar to that of kmemcheck: use shadow memory to record whether each byte of memory is safe to access, and use compile-time instrumentation to check shadow memory on each memory access.

       

      AddressSanitizer dedicates 1/8 of kernel memory to its shadow memory (e.g. 16TB to cover 128TB on x86_64) and uses direct mapping with a scale and offset to translate a memory address to its corresponding shadow address. cite

       

       

       

      See usage, design and possibilities of KASAN from Linux® kernel development:

      https://www.phoronix.com/scan.php?page=news_item&px=KASAN-CVE-2019-8912

       

      https://www.kernel.org/doc/html/v4.14/dev-tools/kasan.html

      Attachments

        Issue Links

          Activity

            People

              extravert34 extravert34
              crashfourit crashfourit
              Votes:
              3 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

                Created:
                Updated: