-
Welcome
-
Subscribe to
KernelMemorySanitizer against uninitialized memory
Session information has not yet been published for this event.
One Line Summary
I'll present KernelMemorySanitizer, a new tool for detecting uses of uninitialized values in the kernel.
Abstract
KernelMemorySanitizer is a new tool that detects uses of uninitialized values in the Linux kernel.
The tool is based on compiler instrumentation and is times faster than kmemcheck, so one can use it with fuzzers or other load.
I’ll outline some implementation details and the possible applications of the same approach to other problems in the kernel.
Tags
debugging, fuzzing, kmsan, memory errors
Presentation Materials
slidesSpeaker
-
Alexander Potapenko
Google- Twitter: Glider
- Favorites: View Alexander's favorites
Biography
I’ve been involved with dynamic tools for memory detection since 2009.
Have experience with hacking Valgrind, LLVM, Google Perftools on both Linux and Mac OS X.
Co-author of AddressSanitizer, the state of the art addressability error detector.
Right now I’m contributing to KernelAddressSanitizer and developing KernelMemorySanitizer.