This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

LAUNCHXL-F2800157: Address Sanitizer and Static Code Analysis

Part Number: LAUNCHXL-F2800157
Other Parts Discussed in Thread: C2000WARE

Using CCS 12.7, C2000 5.2 and Dev Board LAUNCHXL-F2800157

I want to run Address Sanitizer and Static Code Analysis on my examples on LAUNCHXL-F2800157, How can I do so?

I used the link below to add Address Sanitizer to my code but since the code not compiled by GCC, it is unable to use the Address Sanitizer.

https://e2e.ti.com/support/processors-group/processors/f/processors-forum/958978/compiler-am5726-address-sanitizer-not-included-in-the-sdk

For Static Code Analysis, I used this link to see the process. It is already enable on my project and no further modifications are needed. Right?

e2e.ti.com/.../ccs-looking-for-code-analyzer-codan-in-the-properties-pages

  • Hi Sheershak,

    For Static Code Analysis, I used this link to see the process. It is already enable on my project and no further modifications are needed. Right?

    This is correct, for static code analysis you can enable or disable any of the available options in the Code Analysis tab.

    I want to run Address Sanitizer and Static Code Analysis on my examples on LAUNCHXL-F2800157, How can I do so?

    Is Address Sanitizer the same as checking for memory leaks?

    If so please refer to this thread.

    There is something called HeapTrack which is a buffer management module that tracks all currently allocated blocks for any heap instance. HeapTrack is useful for detecting memory leaks, buffer overflows, and double frees of memory blocks. This is useful if using RTOS.

    Other ways for checking any invalid memory writes or reads, you could use the ERAD for stack over flow detection, we have an example for this in our C2000WARE SDK.

    Here is also another resource for CCS debugging for checking stack overflow.