18–20 Sept 2024
Europe/Vienna timezone

Kernel Sanitizers Office Hours

20 Sept 2024, 15:00
45m
"Room 1.85 - 1.86" (Austria Center)

"Room 1.85 - 1.86"

Austria Center

165
Birds of a Feather (BoF) Birds of a Feather (BoF)

Speakers

Alexander Potapenko (Google) Dmitry Vyukov (Google) Kees Cook (Google) Marco Elver (Google) Paul McKenney (Meta)

Description

The Linux kernel has numerous tools to detect bugs, among them a family of dynamic program analysis called "sanitizers": Kernel Address Sanitizer (KASAN), Kernel Memory Sanitizer (KMSAN), Kernel Concurrency Sanitizer (KCSAN), and the Undefined Behaviour Sanitizer (UBSAN).

Knowing when to apply which sanitizer in the kernel development process may not always be obvious: each sanitizer is dedicated to finding a different class of bugs, and each introduces some amount of performance and/or memory overhead. Not only that, each sanitizer also provides a range of options to tweak their abilities.

This session is dedicated to briefly introducing each kernel sanitizer, the bug classes they help detect, and important gotchas when using them.

The rest of the session is dedicated to answering questions around each of the sanitizers, KASAN, KMSAN, KCSAN, and UBSAN. Feel free to also share success stories that may give other attendees only starting out with some of the sanitizers ideas how to best apply them.

Primary authors

Presentation materials