Addresssanitizer: a Fast Address Sanity Checker
AddressSanitizer: A Fast Address Sanity Checker Konstantin Serebryany, Derek Bruening, Alexander Potapenko, Dmitry Vyukov Google {kcc,bruening,glider,dvyukov}@google.com Abstract zones around stack and global objects to detect overflows and underflows. The current implementation is based on Memory access bugs, including buffer overflows and the LLVM [4] compiler infrastructure. The run-time li- uses of freed heap memory, remain a serious problem for brary replaces malloc, free and related functions, cre- programming languages like C and C++. Many memory ates poisoned redzones around allocated heap regions, error detectors exist, but most of them are either slow or delays the reuse of freed heap regions, and does error detect a limited set of bugs, or both. reporting. This paper presents AddressSanitizer, a new memory error detector. Our tool finds out-of-bounds accesses to heap, stack, and global objects, as well as use-after-free 1.1 Contributions bugs. It employs a specialized memory allocator and In this paper we: code instrumentation that is simple enough to be imple- mented in any compiler, binary translation system, or • show that a memory error detector can leverage the even in hardware. comprehensiveness of shadow memory with much AddressSanitizer achieves efficiency without sacrific- lower overhead than the conventional wisdom; ing comprehensiveness. Its average slowdown is just 73% yet it accurately detects bugs at the point of occur- • present a novel shadow state encoding that enables rence. It has found over 300 previously unknown bugs in compact shadow memory – as much as a 128-to- the Chromium browser and many bugs in other software.
[Show full text]