Documentation: Add KASAN to the project ideas list
Adding the Kernel Address Sanitizer feature to coreboot would help to find bugs. Change-Id: If00010e81147ec50e037678230df17c6888e40a2 Signed-off-by: Werner Zeh <werner.zeh@siemens.com> Reviewed-on: https://review.coreboot.org/c/31414 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Paul Menzel <paulepanter@users.sourceforge.net> Reviewed-by: Patrick Georgi <pgeorgi@google.com>
This commit is contained in:
parent
e90b632e97
commit
50baa88184
|
@ -72,3 +72,22 @@ code doesn't entirely break these architectures
|
||||||
hardware is available.
|
hardware is available.
|
||||||
|
|
||||||
### Mentors
|
### Mentors
|
||||||
|
|
||||||
|
## Add Kernel Address Sanitizer functionality to coreboot
|
||||||
|
The Kernel Address Sanitizer (KASAN) is a runtime dynamic memory error detector.
|
||||||
|
The idea is to check every memory access (variables) for its validity
|
||||||
|
during runtime and find bugs like stack overflow or out-of-bounds accesses.
|
||||||
|
Implementing this stub into coreboot like "Undefined behavior sanitizer support"
|
||||||
|
would help to ensure code quality and make the runtime code more robust.
|
||||||
|
|
||||||
|
### Requirements
|
||||||
|
* knowledge in the coreboot build system and the concept of stages
|
||||||
|
* the KASAN feature can be improved in a way so that the memory space needed
|
||||||
|
during runtime is not on a fixed address provided during compile time but
|
||||||
|
determined during runtime. For this to achieve a small patch to the GCC will
|
||||||
|
be helpful. Therefore minor GCC knowledge would be beneficial.
|
||||||
|
* Implementation can be initially done in QEMU and improved on different
|
||||||
|
mainboards and platforms
|
||||||
|
|
||||||
|
### Mentors
|
||||||
|
* Werner Zeh <werner.zeh@gmx.net>
|
||||||
|
|
Loading…
Reference in New Issue