How to use KASAN (The Kernel Address Sanitizer) for finding use-after-free and out-of-bounds bugs?
Issue
-
How to use KASAN (The Kernel Address Sanitizer) for finding use-after-free and out-of-bounds bugs?
-
Is it safe to run kernel-debug that is built with CONFIG_KASAN being enabled in our production environment?
-
Is KASAN supported for s390 as well?
Environment
- Red Hat Enterprise Linux 8
- Red Hat Enterprise Linux 9
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.