Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 1 | <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" |
| 2 | "http://www.w3.org/TR/html4/strict.dtd"> |
| 3 | <!-- Material used from: HTML 4.01 specs: http://www.w3.org/TR/html401/ --> |
| 4 | <html> |
| 5 | <head> |
| 6 | <META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"> |
| 7 | <title>AddressSanitizer, a fast memory error detector</title> |
| 8 | <link type="text/css" rel="stylesheet" href="../menu.css"> |
| 9 | <link type="text/css" rel="stylesheet" href="../content.css"> |
| 10 | <style type="text/css"> |
| 11 | td { |
| 12 | vertical-align: top; |
| 13 | } |
| 14 | </style> |
| 15 | </head> |
| 16 | <body> |
| 17 | |
| 18 | <!--#include virtual="../menu.html.incl"--> |
| 19 | |
Kostya Serebryany | 7a31d7b | 2011-11-28 22:34:10 +0000 | [diff] [blame] | 20 | <div id="content"> |
| 21 | |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 22 | <h1>AddressSanitizer</h1> |
| 23 | <ul> |
Kostya Serebryany | cef57e5 | 2012-04-23 09:05:50 +0000 | [diff] [blame] | 24 | <li> <a href="#intro">Introduction</a> |
| 25 | <li> <a href="#howtobuild">How to Build</a> |
| 26 | <li> <a href="#usage">Usage</a> |
| 27 | <ul><li> <a href="#has_feature">__has_feature(address_sanitizer)</a></ul> |
| 28 | <ul><li> <a href="#no_address_safety_analysis"> |
| 29 | __attribute__((no_address_safety_analysis))</a></ul> |
| 30 | <li> <a href="#platforms">Supported Platforms</a> |
| 31 | <li> <a href="#limitations">Limitations</a> |
| 32 | <li> <a href="#status">Current Status</a> |
| 33 | <li> <a href="#moreinfo">More Information</a> |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 34 | </ul> |
| 35 | |
| 36 | <h2 id="intro">Introduction</h2> |
| 37 | AddressSanitizer is a fast memory error detector. |
| 38 | It consists of a compiler instrumentation module and a run-time library. |
| 39 | The tool can detect the following types of bugs: |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 40 | <ul> <li> Out-of-bounds accesses to heap, stack and globals |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 41 | <li> Use-after-free |
| 42 | <li> Use-after-return (to some extent) |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 43 | <li> Double-free, invalid free |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 44 | </ul> |
| 45 | Typical slowdown introduced by AddressSanitizer is <b>2x</b>. |
| 46 | |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 47 | <h2 id="howtobuild">How to build</h2> |
Kostya Serebryany | abc31ca | 2012-03-15 16:20:29 +0000 | [diff] [blame] | 48 | Follow the <a href="../get_started.html">clang build instructions</a>. <BR> |
| 49 | Note: CMake build does not work yet. |
Kostya Serebryany | 684944e | 2012-03-15 16:22:06 +0000 | [diff] [blame] | 50 | See <a href="http://llvm.org/bugs/show_bug.cgi?id=12272">bug 12272</a>. |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 51 | |
Benjamin Kramer | 665a8dc | 2012-01-15 15:26:07 +0000 | [diff] [blame] | 52 | <h2 id="usage">Usage</h2> |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 53 | Simply compile and link your program with <tt>-faddress-sanitizer</tt> flag. <BR> |
| 54 | To get a reasonable performance add <tt>-O1</tt> or higher. <BR> |
Kostya Serebryany | e683fd9 | 2012-01-06 17:35:27 +0000 | [diff] [blame] | 55 | To get nicer stack traces in error messages add |
| 56 | <tt>-fno-omit-frame-pointer</tt>. <BR> |
Kostya Serebryany | f5249f5 | 2012-01-23 18:50:23 +0000 | [diff] [blame] | 57 | To get perfect stack traces you may need to disable inlining (just use <tt>-O1</tt>) and tail call |
| 58 | elimination (</tt>-fno-optimize-sibling-calls</tt>). |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 59 | |
| 60 | <pre> |
| 61 | % cat example_UseAfterFree.cc |
| 62 | int main(int argc, char **argv) { |
| 63 | int *array = new int[100]; |
| 64 | delete [] array; |
| 65 | return array[argc]; // BOOM |
| 66 | } |
| 67 | </pre> |
| 68 | |
| 69 | <pre> |
Kostya Serebryany | e683fd9 | 2012-01-06 17:35:27 +0000 | [diff] [blame] | 70 | % clang -O1 -g -faddress-sanitizer -fno-omit-frame-pointer example_UseAfterFree.cc |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 71 | </pre> |
| 72 | |
| 73 | If a bug is detected, the program will print an error message to stderr and exit with a |
Kostya Serebryany | b876993 | 2011-12-02 00:24:42 +0000 | [diff] [blame] | 74 | non-zero exit code. |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 75 | Currently, AddressSanitizer does not symbolize its output, so you may need to use a |
| 76 | separate script to symbolize the result offline (this will be fixed in future). |
| 77 | <pre> |
| 78 | % ./a.out 2> log |
| 79 | % projects/compiler-rt/lib/asan/scripts/asan_symbolize.py / < log | c++filt |
| 80 | ==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8 |
| 81 | READ of size 4 at 0x7f7ddab8c084 thread T0 |
| 82 | #0 0x403c8c in main example_UseAfterFree.cc:4 |
| 83 | #1 0x7f7ddabcac4d in __libc_start_main ??:0 |
| 84 | 0x7f7ddab8c084 is located 4 bytes inside of 400-byte region [0x7f7ddab8c080,0x7f7ddab8c210) |
| 85 | freed by thread T0 here: |
| 86 | #0 0x404704 in operator delete[](void*) ??:0 |
| 87 | #1 0x403c53 in main example_UseAfterFree.cc:4 |
| 88 | #2 0x7f7ddabcac4d in __libc_start_main ??:0 |
| 89 | previously allocated by thread T0 here: |
| 90 | #0 0x404544 in operator new[](unsigned long) ??:0 |
| 91 | #1 0x403c43 in main example_UseAfterFree.cc:2 |
| 92 | #2 0x7f7ddabcac4d in __libc_start_main ??:0 |
| 93 | ==9442== ABORTING |
| 94 | </pre> |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 95 | |
| 96 | <h3 id="has_feature">__has_feature(address_sanitizer)</h3> |
| 97 | In some cases one may need to execute different code depending on whether |
| 98 | AddressSanitizer is enabled. |
| 99 | <a href="LanguageExtensions.html#__has_feature_extension">__has_feature</a> |
| 100 | can be used for this purpose. |
| 101 | <pre> |
Benjamin Kramer | 665a8dc | 2012-01-15 15:26:07 +0000 | [diff] [blame] | 102 | #if defined(__has_feature) && __has_feature(address_sanitizer) |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 103 | code that runs only under AddressSanitizer |
| 104 | #else |
| 105 | code that does not run under AddressSanitizer |
| 106 | #endif |
| 107 | </pre> |
| 108 | |
Kostya Serebryany | cef57e5 | 2012-04-23 09:05:50 +0000 | [diff] [blame] | 109 | <h3 id="no_address_safety_analysis">__attribute__((no_address_safety_analysis))</h3> |
| 110 | Some code should not be instrumentated by AddressSanitizer. |
| 111 | One may use the function attribute |
| 112 | <a href="LanguageExtensions.html#address_sanitizer"> |
| 113 | <tt>no_address_safety_analysis</tt></a> |
| 114 | to disable instrumentation of a particular function. |
| 115 | Note: currently, this attribute will be lost if the function is inlined. |
| 116 | |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 117 | <h2 id="platforms">Supported Platforms</h2> |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 118 | AddressSanitizer is supported on |
| 119 | <ul><li>Linux x86_64 (tested on Ubuntu 10.04). |
| 120 | <li>MacOS 10.6 i386/x86_64. |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 121 | </ul> |
Kostya Serebryany | abc31ca | 2012-03-15 16:20:29 +0000 | [diff] [blame] | 122 | Support for Linux i386/ARM and MacOS 10.7 is in progress |
| 123 | (it may work, but is not guaranteed too). |
| 124 | |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 125 | |
| 126 | <h2 id="limitations">Limitations</h2> |
| 127 | <ul> |
Kostya Serebryany | cef57e5 | 2012-04-23 09:05:50 +0000 | [diff] [blame] | 128 | <li> AddressSanitizer uses more real memory than a native run. |
| 129 | How much -- depends on the allocations sizes. The smaller the |
| 130 | allocations you make the bigger the overhead. |
| 131 | <li> AddressSanitizer uses more stack memory. We have seen up to 3x increase. |
| 132 | <li> On 64-bit platforms AddressSanitizer maps (but not reserves) |
| 133 | 16+ Terabytes of virtual address space. |
| 134 | This means that tools like <tt>ulimit</tt> may not work as usually expected. |
| 135 | <li> Static linking is not supported. |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 136 | </ul> |
| 137 | |
| 138 | |
| 139 | <h2 id="status">Current Status</h2> |
Kostya Serebryany | 219cd6c | 2012-04-23 10:15:18 +0000 | [diff] [blame] | 140 | AddressSanitizer is fully functional on supported platforms starting from LLVM 3.1. |
Kostya Serebryany | 2e17322 | 2011-12-12 23:22:31 +0000 | [diff] [blame] | 141 | However, the test suite is not fully integrated yet and we lack the testing |
| 142 | process (buildbots). |
| 143 | |
| 144 | <h2 id="moreinfo">More Information</h2> |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 145 | <a href="http://code.google.com/p/address-sanitizer/">http://code.google.com/p/address-sanitizer</a>. |
| 146 | |
| 147 | |
Kostya Serebryany | 7a31d7b | 2011-11-28 22:34:10 +0000 | [diff] [blame] | 148 | </div> |
Kostya Serebryany | ce98c9b | 2011-11-28 20:51:02 +0000 | [diff] [blame] | 149 | </body> |
| 150 | </html> |