Auf Englisch lesen

Teilen über

KasanDemo

This sample demonstrates how KASAN detects illegal memory accesses.

The sample consists of a legacy device driver that contains intentionally incorrect code that performs illegal memory accesses, and a Win32 console agent that interacts with the driver to trigger different types of illegal memory accesses that KASAN successfully detects.

Vorsicht

This driver contains INTENTIONALLY INCORRECT code. Neither this driver nor its sample programs are intended for use in a production environment. Instead, they are intended for educational purposes.

Vorsicht

This driver will cause KASAN to bugcheck your system.

Run the sample

To run this sample, enable KASAN in your system, load the kasantrigger.sys driver, and then run the kasanagent.exe application.