blob: d60cdd9d353c8b3f3dcd6eb6d12d1f08267d9302 [file] [log] [blame]
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +00001<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
2 "http://www.w3.org/TR/html4/strict.dtd">
3<!-- Material used from: HTML 4.01 specs: http://www.w3.org/TR/html401/ -->
4<html>
5<head>
6 <META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
7 <title>AddressSanitizer, a fast memory error detector</title>
8 <link type="text/css" rel="stylesheet" href="../menu.css">
9 <link type="text/css" rel="stylesheet" href="../content.css">
10 <style type="text/css">
11 td {
12 vertical-align: top;
13 }
14 </style>
15</head>
16<body>
17
18<!--#include virtual="../menu.html.incl"-->
19
Kostya Serebryany7a31d7b2011-11-28 22:34:10 +000020<div id="content">
21
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +000022<h1>AddressSanitizer</h1>
23<ul>
Kostya Serebryanycef57e52012-04-23 09:05:50 +000024 <li> <a href="#intro">Introduction</a>
25 <li> <a href="#howtobuild">How to Build</a>
26 <li> <a href="#usage">Usage</a>
27 <ul><li> <a href="#has_feature">__has_feature(address_sanitizer)</a></ul>
28 <ul><li> <a href="#no_address_safety_analysis">
29 __attribute__((no_address_safety_analysis))</a></ul>
30 <li> <a href="#platforms">Supported Platforms</a>
31 <li> <a href="#limitations">Limitations</a>
32 <li> <a href="#status">Current Status</a>
33 <li> <a href="#moreinfo">More Information</a>
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +000034</ul>
35
36<h2 id="intro">Introduction</h2>
37AddressSanitizer is a fast memory error detector.
38It consists of a compiler instrumentation module and a run-time library.
39The tool can detect the following types of bugs:
Kostya Serebryany2e173222011-12-12 23:22:31 +000040<ul> <li> Out-of-bounds accesses to heap, stack and globals
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +000041 <li> Use-after-free
42 <li> Use-after-return (to some extent)
Kostya Serebryany2e173222011-12-12 23:22:31 +000043 <li> Double-free, invalid free
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +000044</ul>
45Typical slowdown introduced by AddressSanitizer is <b>2x</b>.
46
Kostya Serebryany2e173222011-12-12 23:22:31 +000047<h2 id="howtobuild">How to build</h2>
Alexey Samsonovadea5172012-10-24 13:21:51 +000048Follow the <a href="../get_started.html">clang build instructions</a>.
49CMake build is supported.<BR>
Kostya Serebryany2e173222011-12-12 23:22:31 +000050
Benjamin Kramer665a8dc2012-01-15 15:26:07 +000051<h2 id="usage">Usage</h2>
Kostya Serebryany2e173222011-12-12 23:22:31 +000052Simply compile and link your program with <tt>-faddress-sanitizer</tt> flag. <BR>
Kostya Serebryany460e7a22012-10-19 07:00:46 +000053The AddressSanitizer run-time library should be linked to the final executable,
54so make sure to use <tt>clang</tt> (not <tt>ld</tt>) for the final link step.<BR>
55When linking shared libraries, the AddressSanitizer run-time is not linked,
56so <tt>-Wl,-z,defs</tt> may cause link errors (don't use it with AddressSanitizer). <BR>
57
Kostya Serebryany2e173222011-12-12 23:22:31 +000058To get a reasonable performance add <tt>-O1</tt> or higher. <BR>
Kostya Serebryanye683fd92012-01-06 17:35:27 +000059To get nicer stack traces in error messages add
60<tt>-fno-omit-frame-pointer</tt>. <BR>
Kostya Serebryanyf5249f52012-01-23 18:50:23 +000061To get perfect stack traces you may need to disable inlining (just use <tt>-O1</tt>) and tail call
Alexey Samsonovadea5172012-10-24 13:21:51 +000062elimination (<tt>-fno-optimize-sibling-calls</tt>).
Kostya Serebryany2e173222011-12-12 23:22:31 +000063
64<pre>
65% cat example_UseAfterFree.cc
66int main(int argc, char **argv) {
67 int *array = new int[100];
68 delete [] array;
69 return array[argc]; // BOOM
70}
71</pre>
72
73<pre>
Kostya Serebryany460e7a22012-10-19 07:00:46 +000074# Compile and link
Kostya Serebryanye683fd92012-01-06 17:35:27 +000075% clang -O1 -g -faddress-sanitizer -fno-omit-frame-pointer example_UseAfterFree.cc
Kostya Serebryany2e173222011-12-12 23:22:31 +000076</pre>
Kostya Serebryany460e7a22012-10-19 07:00:46 +000077OR
78<pre>
79# Compile
80% clang -O1 -g -faddress-sanitizer -fno-omit-frame-pointer -c example_UseAfterFree.cc
81# Link
82% clang -g -faddress-sanitizer example_UseAfterFree.o
83</pre>
Kostya Serebryany2e173222011-12-12 23:22:31 +000084
85If a bug is detected, the program will print an error message to stderr and exit with a
Kostya Serebryanyb8769932011-12-02 00:24:42 +000086non-zero exit code.
Kostya Serebryany2e173222011-12-12 23:22:31 +000087Currently, AddressSanitizer does not symbolize its output, so you may need to use a
88separate script to symbolize the result offline (this will be fixed in future).
89<pre>
90% ./a.out 2> log
91% projects/compiler-rt/lib/asan/scripts/asan_symbolize.py / < log | c++filt
92==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8
93READ of size 4 at 0x7f7ddab8c084 thread T0
94 #0 0x403c8c in main example_UseAfterFree.cc:4
95 #1 0x7f7ddabcac4d in __libc_start_main ??:0
960x7f7ddab8c084 is located 4 bytes inside of 400-byte region [0x7f7ddab8c080,0x7f7ddab8c210)
97freed by thread T0 here:
98 #0 0x404704 in operator delete[](void*) ??:0
99 #1 0x403c53 in main example_UseAfterFree.cc:4
100 #2 0x7f7ddabcac4d in __libc_start_main ??:0
101previously allocated by thread T0 here:
102 #0 0x404544 in operator new[](unsigned long) ??:0
103 #1 0x403c43 in main example_UseAfterFree.cc:2
104 #2 0x7f7ddabcac4d in __libc_start_main ??:0
105==9442== ABORTING
106</pre>
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000107
108<h3 id="has_feature">__has_feature(address_sanitizer)</h3>
109In some cases one may need to execute different code depending on whether
110AddressSanitizer is enabled.
111<a href="LanguageExtensions.html#__has_feature_extension">__has_feature</a>
112can be used for this purpose.
113<pre>
Kostya Serebryanyf45f2342012-07-02 11:00:33 +0000114#if defined(__has_feature)
115# if __has_feature(address_sanitizer)
116 code that builds only under AddressSanitizer
117# endif
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000118#endif
119</pre>
120
Kostya Serebryanycef57e52012-04-23 09:05:50 +0000121<h3 id="no_address_safety_analysis">__attribute__((no_address_safety_analysis))</h3>
Alexey Samsonovadea5172012-10-24 13:21:51 +0000122Some code should not be instrumented by AddressSanitizer.
123One may use the function attribute
Kostya Serebryanycef57e52012-04-23 09:05:50 +0000124<a href="LanguageExtensions.html#address_sanitizer">
125 <tt>no_address_safety_analysis</tt></a>
126to disable instrumentation of a particular function.
Kostya Serebryanyf45f2342012-07-02 11:00:33 +0000127This attribute may not be supported by other compilers, so we suggest to
128use it together with <tt>__has_feature(address_sanitizer)</tt>.
Kostya Serebryanycef57e52012-04-23 09:05:50 +0000129Note: currently, this attribute will be lost if the function is inlined.
130
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000131<h2 id="platforms">Supported Platforms</h2>
Kostya Serebryany2e173222011-12-12 23:22:31 +0000132AddressSanitizer is supported on
Kostya Serebryany460e7a22012-10-19 07:00:46 +0000133<ul><li>Linux i386/x86_64 (tested on Ubuntu 10.04 and 12.04).
Alexey Samsonova8ee4412012-09-06 09:49:03 +0000134<li>MacOS 10.6, 10.7 and 10.8 (i386/x86_64).
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000135</ul>
Kostya Serebryany460e7a22012-10-19 07:00:46 +0000136Support for Linux ARM (and Android ARM) is in progress
Kostya Serebryanyabc31ca2012-03-15 16:20:29 +0000137(it may work, but is not guaranteed too).
138
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000139
140<h2 id="limitations">Limitations</h2>
141<ul>
Kostya Serebryanycef57e52012-04-23 09:05:50 +0000142<li> AddressSanitizer uses more real memory than a native run.
Alexey Samsonovadea5172012-10-24 13:21:51 +0000143Exact overhead depends on the allocations sizes. The smaller the
144allocations you make the bigger the overhead is.
Kostya Serebryanycef57e52012-04-23 09:05:50 +0000145<li> AddressSanitizer uses more stack memory. We have seen up to 3x increase.
146<li> On 64-bit platforms AddressSanitizer maps (but not reserves)
14716+ Terabytes of virtual address space.
148This means that tools like <tt>ulimit</tt> may not work as usually expected.
149<li> Static linking is not supported.
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000150</ul>
151
152
153<h2 id="status">Current Status</h2>
Kostya Serebryany219cd6c2012-04-23 10:15:18 +0000154AddressSanitizer is fully functional on supported platforms starting from LLVM 3.1.
Alexey Samsonovadea5172012-10-24 13:21:51 +0000155The test suite is integrated into CMake build and can be run with
156<tt>make check-asan</tt> command.
Kostya Serebryany2e173222011-12-12 23:22:31 +0000157
158<h2 id="moreinfo">More Information</h2>
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000159<a href="http://code.google.com/p/address-sanitizer/">http://code.google.com/p/address-sanitizer</a>.
160
161
Kostya Serebryany7a31d7b2011-11-28 22:34:10 +0000162</div>
Kostya Serebryanyce98c9b2011-11-28 20:51:02 +0000163</body>
164</html>