summaryrefslogtreecommitdiff
path: root/Documentation/contributing
diff options
context:
space:
mode:
authorWerner Zeh <werner.zeh@siemens.com>2021-07-01 09:14:44 +0200
committerPatrick Georgi <pgeorgi@google.com>2021-07-14 08:15:20 +0000
commit06bc2c8498d392fe2eb1b9a8f8acfe9609996869 (patch)
treef57753a43b4de11ba80fdd0c7413475ddb9a2379 /Documentation/contributing
parent862064cc6741e07986fd4f910532e319745df20a (diff)
Documentation: Remove KASAN from the project ideas list
This project is already implemented and therefore should not be mentioned anymore as a new project idea in the documentation. Change-Id: I38c6e274e416b98485943d36536a57a14743945b Signed-off-by: Werner Zeh <werner.zeh@siemens.com> Reviewed-on: https://review.coreboot.org/c/coreboot/+/55991 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Paul Menzel <paulepanter@mailbox.org> Reviewed-by: Angel Pons <th3fanbus@gmail.com>
Diffstat (limited to 'Documentation/contributing')
-rw-r--r--Documentation/contributing/project_ideas.md19
1 files changed, 0 insertions, 19 deletions
diff --git a/Documentation/contributing/project_ideas.md b/Documentation/contributing/project_ideas.md
index 141023fd3d..2f6f73825c 100644
--- a/Documentation/contributing/project_ideas.md
+++ b/Documentation/contributing/project_ideas.md
@@ -66,25 +66,6 @@ across architectures.
### Mentors
* Timothy Pearson <tpearson@raptorengineering.com>
-## Add Kernel Address Sanitizer functionality to coreboot
-The Kernel Address Sanitizer (KASAN) is a runtime dynamic memory error detector.
-The idea is to check every memory access (variables) for its validity
-during runtime and find bugs like stack overflow or out-of-bounds accesses.
-Implementing this stub into coreboot like "Undefined behavior sanitizer support"
-would help to ensure code quality and make the runtime code more robust.
-
-### Requirements
-* knowledge in the coreboot build system and the concept of stages
-* the KASAN feature can be improved in a way so that the memory space needed
- during runtime is not on a fixed address provided during compile time but
- determined during runtime. For this to achieve a small patch to the GCC will
- be helpful. Therefore minor GCC knowledge would be beneficial.
-* Implementation can be initially done in QEMU and improved on different
- mainboards and platforms
-
-### Mentors
-* Werner Zeh <werner.zeh@gmx.net>
-
## Port payloads to ARM, AArch64 or RISC-V
While we have a rather big set of payloads for x86 based platforms, all other
architectures are rather limited. Improve the situation by porting a payload