Sanitizers: your new secret weapon to kill bugs
C++ will give you a job for life:
- Buffer overflows
- Data races
- Use after delete
- Invalid Pointer References
- Undefined Behaviors
- Memory Leaks
- Use of uninitialized memory
What scares me...
- Hard to reproduce, sporadic bugs
- Bugs that disappear when you compile in Debug mode
- Silent data corruption that doesn't trigger a SEGFAULT.
Welcome sanitizers
- AddressSanitizer: detects use-after-free and buffer overflows
- ThreadSanitizer: detects data races and deadlocks
- MemorySanitizer: detects uninitialized memory reads
- UndefinedBehaviorSanitizer: detects “simple” undefined behaviors
Sanitizers, AKA dynamic code analysis
- You must run your code (it is not static code analysis)
- Aims to zero false positives
- Usually 10X faster than Valgrind
- Very detailed error report, more convenient than GDB
- Start using them in 1 minute...
AddressSanitizer: buffer-overflow
int global_array[100];
int main(int argc, char **argv)
{
int stack_array[100];
int index = 101 + argc; //index not know at compilation time
global_array[index] = 42;
stack_array[index] = 42;
std::cout << global_array[index] << std::endl;
std::cout << stack_array[index] << std::endl;
return 0;
}
AddressSanitizer: heap-overflow and use after free
int main(int argc, char **argv)
{
int *array = new int[100];
int index = 100 + argc; //argc not know at compilation time
array[index] = 42; // BOOM?
std::cout << array[index] << std::endl;
delete [] array;
array[0] = 23; // BOOM?
std::cout << array[0] << std::endl;
return 0;
}
AddressSanitizer: container-overflow
int main(int argc, char **argv)
{
std::vector<int> V(8, 42);
V.resize(5); // capacity still 8
// The memory is still there, but we are not supposed to
// access this element
std::cout << V[6] << std::endl;
return 0;
}
Note: previous examples may crash, but not this one.
AddressSanitizer: dangling reference
const std::vector<int>& Vector42( int size )
{
std::vector<int> V(size, 42);
return V;
}
int main()
{
const std::vector<int>& V = Vector42(8);
// No problem, right?
std::cout << V[6] << std::endl;
// BOOOOM
return 0;
}
AddressSanitizer: memory leaks
int main()
{
int *g = new int;
g = nullptr; // Lost the pointer.
return 0;
}
Recently I found a bug like this in Qt, where you are not supposed to call delete explicitly...
AddressSanitizer overhead
- CPU: 2X slowdown
- RAM: 1.5X-3X memory overhead
ThreadSanitizer: example
struct A
{
virtual ~A()
{
F();
}
virtual void F()
{
printf("In A");
}
};
struct B : public A
{
virtual void F()
{
printf("In B");
}
};
// guess what it prints...
I recently fixed a bug like this one... if you don't see it, it is normal
class A {
public:
A() : done_(false) {}
virtual void F() { printf("A::F\n"); }
void Done() {
std::unique_lock<std::mutex> lk(m_);
done_ = true;
cv_.notify_one();
}
virtual ~A() {
std::unique_lock<std::mutex> lk(m_);
cv_.wait(lk, [this] {return done_;});
}
private:
std::mutex m_;
std::condition_variable cv_;
bool done_;
};
class B : public A {
public:
virtual void F() { printf("B::F\n"); }
virtual ~B() {}
};
int main() {
A *a = new B;
std::thread t1([a] {a->F(); a->Done();});
std::thread t2([a] {delete a;});
t1.join(); t2.join();
}
ThreadSanitizer overhead
- CPU: 4X-10X slowdown
- RAM: 5X-8X memory overhead
If you write multi-threaded code, it does have bugs. Deal with it and sanitize it.
UndefinedBehaviorSanitizer
int main(int argc, char **argv)
{
int t = 1 << 16;
std::cout << t * t << std::endl;
return 0;
}
Bugs makes you sad? Start being awesome with Sanitizers!
Sanitizers
By Davide Faconti
Sanitizers
- 655