From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ua1-f42.google.com (mail-ua1-f42.google.com [209.85.222.42]) by mx.groups.io with SMTP id smtpd.web09.1216.1648161161406771981 for ; Thu, 24 Mar 2022 15:32:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=NnqJMIji; spf=pass (domain: gmail.com, ip: 209.85.222.42, mailfrom: pedro.falcato@gmail.com) Received: by mail-ua1-f42.google.com with SMTP id k11so2317653uap.1 for ; Thu, 24 Mar 2022 15:32:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:from:date:message-id:subject:to; bh=GZAuB2460rBMRQxVgUDoD8xA4xYE1AfSbCRt5dD28TA=; b=NnqJMIjiWVkOwywX4pKREbgWDGKT67POifg1NCYW7Y4ngfXxoxIrpGSdZav9yC5Myz dSBxkZGrv75aEYn8FQ3vDkTyyRw9lUvmhI6uc+lA33eMJxMGKS/mGOfvQEbzO35dAfVK B3O7vJgpKVg410LFOdTAyUUTaiaNuHB1m9rHhuiXEwcGVRd8d7voGS/MCUqtgrknquT0 DywG3KZETpD3ogcbAFxxWVtoCbRiw2ViGHnuZ0+sy1vkVhpWiGs6SibdiYpZVIWcQSos gJSElfSJtsdWlwi3NqyttfdbR8+26ycB/OxNscNxKSPgA8o281omImpBswcaOacRoGAe O6aQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=GZAuB2460rBMRQxVgUDoD8xA4xYE1AfSbCRt5dD28TA=; b=2nqxgTziPGNsXuuGkqmwfU5EQw1XGIZZR2DtXp9ZGSTH9zDXKOPpIU8nL/5Q4Kit/i PtXHxl0C1sTulX1CzNzZc03DobtI+/uy9mWdxJszDog4YlW9J+AEYRBNXM9yNYXjZEHr Q8vOx7MI+NBK6jXnC/qnR46NOLUJqJOtieK3WjfyzEFCFvgX1LgNMbpj1A8tYuEOZqdz G4/yJzm1lA35dhGP7PK6+cMKID/RHKKoOE8oTUJIKLnYoKA676pygKR4ggXPA2kzzwiy kOam0nJnYN93whgDR5o0WcWi6+/jLK1cYdqyJjl8YVA+rJGBMMwO0s4utQvIsIM1zT17 Awfg== X-Gm-Message-State: AOAM530Mw/tMKTi7pByOMxN+tr0w3q7Mp/6eesFt5Egg0vbPYrsIIdk/ vs/MAjr/Sulul3PnSEB4O53ftuVOarWuZfE/IkL4I4ggYy4= X-Google-Smtp-Source: ABdhPJwQM96WO4syXwOWBaFCBaLOHhBvbDq4GdS9Usv8AekSrFpPB6LaQD47e6ZBw4RE3YuSlA8xbNjwvT2HkjhOKVs= X-Received: by 2002:a9f:37c8:0:b0:34c:779a:fc5e with SMTP id q66-20020a9f37c8000000b0034c779afc5emr3739037uaq.40.1648161160324; Thu, 24 Mar 2022 15:32:40 -0700 (PDT) MIME-Version: 1.0 From: "Pedro Falcato" Date: Thu, 24 Mar 2022 22:32:29 +0000 Message-ID: Subject: Question about UEFI, AddressSanitizer and MMU mappings To: edk2-devel-groups-io Content-Type: multipart/alternative; boundary="0000000000007e693405dafe6ca1" --0000000000007e693405dafe6ca1 Content-Type: text/plain; charset="UTF-8" Hi! I've been thinking about adding sanitizer support (UBSan and KASAN), like coreboot already has, to the wiki's Tasks for the upcoming GSoC, but I'm a bit confused by something. Is there anything in the UEFI spec that stops us from doing non-identity memory mappings? I know it specifies the need for the identity mappings (in the architectures where it requires the MMU being enabled), but nowhere do I see anything about the other parts of the address space. Of course, UEFI supporting AddressSanitizer would be kind of dependent on fancier memory mappings. Thanks, Pedro --0000000000007e693405dafe6ca1 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hi!

I've been thinking a= bout adding sanitizer support (UBSan and KASAN), like coreboot already has,= to the wiki's Tasks for the upcoming GSoC, but I'm a bit confused = by something.
Is there anything in the UEFI spec that stops us fr= om doing non-identity memory mappings? I know it specifies the need for the= identity mappings (in the architectures where it requires the MMU being en= abled), but nowhere do I see anything about the other parts of the address = space.
Of course, UEFI supporting AddressSanitizer would be kind = of dependent on fancier memory mappings.

Thank= s,
Pedro
--0000000000007e693405dafe6ca1--