summaryrefslogtreecommitdiff
path: root/Kconfig
diff options
context:
space:
mode:
authorAndrew Scull <ascull@google.com>2022-05-30 10:00:05 +0000
committerTom Rini <trini@konsulko.com>2022-06-23 12:58:18 -0400
commit1e578ed20c733e7b2b6ac1e01a4e33338db45b5a (patch)
tree6624d7b1c589c06fb52c82a5faecbab90780855f /Kconfig
parent99e2fbcb69f0759432c4cfa0b6e1afa006f22930 (diff)
downloadu-boot-1e578ed20c733e7b2b6ac1e01a4e33338db45b5a.tar.gz
u-boot-1e578ed20c733e7b2b6ac1e01a4e33338db45b5a.tar.bz2
u-boot-1e578ed20c733e7b2b6ac1e01a4e33338db45b5a.zip
sandbox: Add support for Address Sanitizer
Add CONFIG_ASAN to build with the Address Sanitizer. This only works with the sandbox so the config is likewise dependent. The resulting executable will have ASAN instrumentation, including the leak detector that can be disabled with the ASAN_OPTIONS environment variable: ASAN_OPTIONS=detect_leaks=0 ./u-boot Since u-boot uses its own dlmalloc, dynamic allocations aren't automatically instrumented, but stack variables and globals are. Instrumentation could be added to dlmalloc to poison and unpoison memory as it is allocated and deallocated, and to introduce redzones between allocations. Alternatively, the sandbox may be able to play games with the system allocator and somehow still keep the required memory abstraction. No effort to address dynamic allocation is made by this patch. The config is not yet enabled for any targets by default. Signed-off-by: Andrew Scull <ascull@google.com> Reviewed-by: Simon Glass <sjg@chromium.org>
Diffstat (limited to 'Kconfig')
-rw-r--r--Kconfig7
1 files changed, 7 insertions, 0 deletions
diff --git a/Kconfig b/Kconfig
index 429b5f9a70..6b97a0236f 100644
--- a/Kconfig
+++ b/Kconfig
@@ -154,6 +154,13 @@ config CC_COVERAGE
Enabling this option will pass "--coverage" to gcc to compile
and link code instrumented for coverage analysis.
+config ASAN
+ bool "Enable AddressSanitizer"
+ depends on SANDBOX
+ help
+ Enables AddressSanitizer to discover out-of-bounds accesses,
+ use-after-free, double-free and memory leaks.
+
config CC_HAS_ASM_INLINE
def_bool $(success,echo 'void foo(void) { asm inline (""); }' | $(CC) -x c - -c -o /dev/null)