Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(181)

Unified Diff: native_client_sdk/doc_generated/reference/ideas.html

Issue 976053003: NaCl docs: add sanitizers to GSoC ideas (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | native_client_sdk/src/doc/reference/ideas.rst » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: native_client_sdk/doc_generated/reference/ideas.html
diff --git a/native_client_sdk/doc_generated/reference/ideas.html b/native_client_sdk/doc_generated/reference/ideas.html
index 69422c76faea5ecb0dc8cbd43af6ba6cb8b8f3b4..c611b5f22067ad8670f2d2af525b370408b2238c 100644
--- a/native_client_sdk/doc_generated/reference/ideas.html
+++ b/native_client_sdk/doc_generated/reference/ideas.html
@@ -33,13 +33,14 @@
<li><a class="reference internal" href="#vector-support" id="id27">Vector Support</a></li>
<li><a class="reference internal" href="#atomics" id="id28">Atomics</a></li>
<li><a class="reference internal" href="#security-enhanced-pnacl" id="id29">Security-enhanced PNaCl</a></li>
+<li><a class="reference internal" href="#sanitizer-support" id="id30">Sanitizer Support</a></li>
</ul>
</li>
-<li><p class="first"><a class="reference internal" href="#nacl" id="id30">NaCl</a></p>
+<li><p class="first"><a class="reference internal" href="#nacl" id="id31">NaCl</a></p>
<ul class="small-gap">
-<li><a class="reference internal" href="#auto-sandboxing" id="id31">Auto-Sandboxing</a></li>
-<li><a class="reference internal" href="#new-sandbox" id="id32">New Sandbox</a></li>
-<li><a class="reference internal" href="#bit-sandbox" id="id33">64-bit Sandbox</a></li>
+<li><a class="reference internal" href="#auto-sandboxing" id="id32">Auto-Sandboxing</a></li>
+<li><a class="reference internal" href="#new-sandbox" id="id33">New Sandbox</a></li>
+<li><a class="reference internal" href="#bit-sandbox" id="id34">64-bit Sandbox</a></li>
</ul>
</li>
</ul>
@@ -287,6 +288,20 @@ a review with the Chrome security team.</li>
<li><strong>Knowledge Prerequisite:</strong> Security.</li>
<li><strong>Mentor:</strong> JF Bastien.</li>
</ul>
+<h4 id="sanitizer-support">Sanitizer Support</h4>
+<ul class="small-gap">
+<li><strong>Project:</strong> Sanitizer support for untrusted code.</li>
+<li><strong>Brief explanation:</strong> LLVM supports many <a class="reference external" href="http://clang.llvm.org/docs/UsersManual.html#controlling-code-generation">sanitizers</a> for C/C++ using the
+<code>-fsanitize=&lt;name&gt;</code>. Some of these sanitizers currently work, and some don&#8217;t
+because they use clever tricks to perform their work, such as using <code>mmap</code>
+to allocate a special shadow memory region with a specific address. This
+project requires adding full support to all of LLVM&#8217;s sanitizers for untrusted
+user code within PNaCl.</li>
+<li><strong>Expected results:</strong> The sanitizer tests successfully run as untrusted code
+within PNaCl.</li>
+<li><strong>Knowledge Prerequisite:</strong> Compilers.</li>
+<li><strong>Mentor:</strong> JF Bastien.</li>
+</ul>
<h3 id="nacl">NaCl</h3>
<h4 id="auto-sandboxing">Auto-Sandboxing</h4>
<ul class="small-gap">
« no previous file with comments | « no previous file | native_client_sdk/src/doc/reference/ideas.rst » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698