Werner Zeh has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/31414
Change subject: Documentation: Add KASAN to the project ideas list ......................................................................
Documentation: Add KASAN to the project ideas list
Adding the Kernel Address Sanitizer feature to coreboot would help to find bugs.
Change-Id: If00010e81147ec50e037678230df17c6888e40a2 Signed-off-by: Werner Zeh werner.zeh@siemens.com --- M Documentation/contributing/project_ideas.md 1 file changed, 19 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/14/31414/1
diff --git a/Documentation/contributing/project_ideas.md b/Documentation/contributing/project_ideas.md index 0a39a88..1c23cc6 100644 --- a/Documentation/contributing/project_ideas.md +++ b/Documentation/contributing/project_ideas.md @@ -72,3 +72,22 @@ hardware is available.
### Mentors + +## Add Kernel Address Sanitizer functionality to coreboot +The Kernel Address Sanitizer (KASAN) is a runtime dynamic memory error detector. +The idea is to check every memory access (variables) for its validity +during runtime and find bugs like stack overflow or out-of-bounds accesses. +Implementing this stub into coreboot like "Undefined behavior sanitizer support" +would help to ensure code quality and make the runtime code more robust. + +### Requirements +* knowledge in the coreboot build system and the concept of stages +* the KASAN feature can be improved in a way so that the memory space needed + during runtime is not on a fixed address provided during compile time but + determined during runtime. For this to achieve a small patch to the GCC will + be helpful. Therefore minor GCC knowledge would be beneficial. +* Implementation can be initially done in QEMU and improved on different + mainboards and platforms + +### Mentors +* Werner Zeh werner.zeh@gmx.net