Lines Matching refs:memory
7 KernelAddressSANitizer (KASAN) is a dynamic memory error detector. It provides
11 KASAN uses compile-time instrumentation for checking every memory access,
30 Currently KASAN works only with the SLUB memory allocator.
123 the description of the accessed memory page.
125 In the last section the report shows memory state around the accessed address.
128 The state of each 8 aligned bytes of memory is encoded in one shadow byte.
131 of the corresponding memory region are accessible; number N (1 <= N <= 7) means
135 inaccessible memory like redzones or freed memory (see mm/kasan/kasan.h).
144 From a high level, our approach to memory error detection is similar to that
145 of kmemcheck: use shadow memory to record whether each byte of memory is safe
146 to access, and use compile-time instrumentation to check shadow memory on each
147 memory access.
149 AddressSanitizer dedicates 1/8 of kernel memory to its shadow memory
151 offset to translate a memory address to its corresponding shadow address.
164 Compile-time instrumentation used for checking memory accesses. Compiler inserts
165 function calls (__asan_load*(addr), __asan_store*(addr)) before each memory
166 access of size 1, 2, 4, 8 or 16. These functions check whether memory access is
167 valid or not by checking corresponding shadow memory.
170 function calls GCC directly inserts the code to check the shadow memory.