Home | History | Annotate | Download | only in docs
      1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" 
      2           "http://www.w3.org/TR/html4/strict.dtd">
      3 <!-- Material used from: HTML 4.01 specs: http://www.w3.org/TR/html401/ -->
      4 <html>
      5 <head>
      6   <META http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
      7   <title>AddressSanitizer, a fast memory error detector</title>
      8   <link type="text/css" rel="stylesheet" href="../menu.css">
      9   <link type="text/css" rel="stylesheet" href="../content.css">
     10   <style type="text/css">
     11     td {
     12             vertical-align: top;
     13     }
     14   </style>
     15 </head>
     16 <body>
     17 
     18 <!--#include virtual="../menu.html.incl"-->
     19 
     20 <div id="content">
     21 
     22 <h1>AddressSanitizer</h1>
     23 <ul> 
     24   <li> <a href="#intro">Introduction</a>
     25   <li> <a href="#howtobuild">How to Build</a>
     26   <li> <a href="#usage">Usage</a>
     27     <ul><li> <a href="#has_feature">__has_feature(address_sanitizer)</a></ul>
     28     <ul><li> <a href="#no_address_safety_analysis">
     29         __attribute__((no_address_safety_analysis))</a></ul>
     30   <li> <a href="#platforms">Supported Platforms</a>
     31   <li> <a href="#limitations">Limitations</a>
     32   <li> <a href="#status">Current Status</a>
     33   <li> <a href="#moreinfo">More Information</a>
     34 </ul>
     35 
     36 <h2 id="intro">Introduction</h2>
     37 AddressSanitizer is a fast memory error detector.
     38 It consists of a compiler instrumentation module and a run-time library.
     39 The tool can detect the following types of bugs:
     40 <ul> <li> Out-of-bounds accesses to  heap, stack and globals
     41   <li> Use-after-free
     42   <li> Use-after-return (to some extent)
     43   <li> Double-free, invalid free
     44 </ul>
     45 Typical slowdown introduced by AddressSanitizer is <b>2x</b>.
     46 
     47 <h2 id="howtobuild">How to build</h2>
     48 Follow the <a href="../get_started.html">clang build instructions</a>. <BR>
     49 
     50 <h2 id="usage">Usage</h2>
     51 Simply compile and link your program with <tt>-faddress-sanitizer</tt> flag. <BR>
     52 To get a reasonable performance add <tt>-O1</tt> or higher. <BR>
     53 To get nicer stack traces in error messages add
     54 <tt>-fno-omit-frame-pointer</tt>. <BR>
     55 To get perfect stack traces you may need to disable inlining (just use <tt>-O1</tt>) and tail call
     56 elimination (</tt>-fno-optimize-sibling-calls</tt>).
     57 
     58 <pre>
     59 % cat example_UseAfterFree.cc
     60 int main(int argc, char **argv) {
     61   int *array = new int[100];
     62   delete [] array;
     63   return array[argc];  // BOOM
     64 }
     65 </pre>
     66 
     67 <pre>
     68 % clang -O1 -g -faddress-sanitizer -fno-omit-frame-pointer example_UseAfterFree.cc
     69 </pre>
     70 
     71 If a bug is detected, the program will print an error message to stderr and exit with a
     72 non-zero exit code.
     73 Currently, AddressSanitizer does not symbolize its output, so you may need to use a
     74 separate script to symbolize the result offline (this will be fixed in future).
     75 <pre>
     76 % ./a.out 2> log
     77 % projects/compiler-rt/lib/asan/scripts/asan_symbolize.py / < log | c++filt
     78 ==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8
     79 READ of size 4 at 0x7f7ddab8c084 thread T0
     80     #0 0x403c8c in main example_UseAfterFree.cc:4
     81     #1 0x7f7ddabcac4d in __libc_start_main ??:0
     82 0x7f7ddab8c084 is located 4 bytes inside of 400-byte region [0x7f7ddab8c080,0x7f7ddab8c210)
     83 freed by thread T0 here:
     84     #0 0x404704 in operator delete[](void*) ??:0
     85     #1 0x403c53 in main example_UseAfterFree.cc:4
     86     #2 0x7f7ddabcac4d in __libc_start_main ??:0
     87 previously allocated by thread T0 here:
     88     #0 0x404544 in operator new[](unsigned long) ??:0
     89     #1 0x403c43 in main example_UseAfterFree.cc:2
     90     #2 0x7f7ddabcac4d in __libc_start_main ??:0
     91 ==9442== ABORTING
     92 </pre>
     93 
     94 <h3 id="has_feature">__has_feature(address_sanitizer)</h3>
     95 In some cases one may need to execute different code depending on whether
     96 AddressSanitizer is enabled.
     97 <a href="LanguageExtensions.html#__has_feature_extension">__has_feature</a>
     98 can be used for this purpose.
     99 <pre>
    100 #if defined(__has_feature)
    101 # if __has_feature(address_sanitizer)
    102   code that builds only under AddressSanitizer
    103 # endif
    104 #endif
    105 </pre>
    106 
    107 <h3 id="no_address_safety_analysis">__attribute__((no_address_safety_analysis))</h3>
    108 Some code should not be instrumentated by AddressSanitizer.
    109 One may use the function attribute 
    110 <a href="LanguageExtensions.html#address_sanitizer">
    111   <tt>no_address_safety_analysis</tt></a>
    112 to disable instrumentation of a particular function.
    113 This attribute may not be supported by other compilers, so we suggest to
    114 use it together with <tt>__has_feature(address_sanitizer)</tt>.
    115 Note: currently, this attribute will be lost if the function is inlined.
    116 
    117 <h2 id="platforms">Supported Platforms</h2>
    118 AddressSanitizer is supported on
    119 <ul><li>Linux x86_64 (tested on Ubuntu 10.04).
    120 <li>MacOS 10.6, 10.7 and 10.8 (i386/x86_64).
    121 </ul>
    122 Support for Linux i386/ARM is in progress
    123 (it may work, but is not guaranteed too).
    124 
    125 
    126 <h2 id="limitations">Limitations</h2>
    127 <ul>
    128 <li> AddressSanitizer uses more real memory than a native run.
    129 How much -- depends on the allocations sizes. The smaller the
    130 allocations you make the bigger the overhead.
    131 <li> AddressSanitizer uses more stack memory. We have seen up to 3x increase.
    132 <li> On 64-bit platforms AddressSanitizer maps (but not reserves)
    133 16+ Terabytes of virtual address space.
    134 This means that tools like <tt>ulimit</tt> may not work as usually expected.
    135 <li> Static linking is not supported.
    136 </ul>
    137 
    138 
    139 <h2 id="status">Current Status</h2>
    140 AddressSanitizer is fully functional on supported platforms starting from LLVM 3.1.
    141 The test suite is integrated into CMake build (can be run with "make
    142 check-asan" command).
    143 
    144 <h2 id="moreinfo">More Information</h2>
    145 <a href="http://code.google.com/p/address-sanitizer/">http://code.google.com/p/address-sanitizer</a>.
    146 
    147 
    148 </div>
    149 </body>
    150 </html>
    151