det*_*tly 11 c clang address-sanitizer
我正在尝试调试由clangwith 检测到的内存错误asan,但是错过了valgrind.但我不能得到我的clang构建二进制文件给我任何有用的调试信息.我可以用一个简短的测试程序证明这一点:
#include <stdlib.h>
#include <string.h>
int main(void)
{
char *a = malloc(8);
memset(a, 0, 9);
free(a);
return 0;
}
Run Code Online (Sandbox Code Playgroud)
(显然这个错误会被接收valgrind,它纯粹是为了显示问题clang.)
我用Clang 3.4-1ubuntu1编译它是这样的:
clang -fsanitize=address -fno-sanitize-recover -o test -O0 -g test.c
Run Code Online (Sandbox Code Playgroud)
果然,./test中止,我看到一些调试信息:
==3309==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000eff8 at pc 0x43e950 bp 0x7fff168724f0 sp 0x7fff168724e8
WRITE of size 9 at 0x60200000eff8 thread T0
#0 0x43e94f (/home/jason/Code/astest/test+0x43e94f)
#1 0x7faa43c47de4 (/lib/x86_64-linux-gnu/libc.so.6+0x21de4)
#2 0x43e6ac (/home/jason/Code/astest/test+0x43e6ac)
0x60200000eff8 is located 0 bytes to the right of 8-byte region [0x60200000eff0,0x60200000eff8)
allocated by thread T0 here:
#0 0x42cc25 (/home/jason/Code/astest/test+0x42cc25)
#1 0x43e874 (/home/jason/Code/astest/test+0x43e874)
#2 0x7faa43c47de4 (/lib/x86_64-linux-gnu/libc.so.6+0x21de4)
Run Code Online (Sandbox Code Playgroud)
但我真正想知道的是发生错误的行号以及分配内存的位置.
我如何从clang+ 获取此信息asan?
Sha*_*our 15
如果我们查看clang AddressSanitizer文档,它会说:
要使AddressSanitizer符号化其输出,您需要将ASAN_SYMBOLIZER_PATH环境变量设置为指向llvm-symbolizer二进制文件(或确保llvm-symbolizer在$ PATH中):
并显示以下示例:
ASAN_SYMBOLIZER_PATH =/usr/local/bin/llvm-symbolizer ./a.out
正如OP所指出的那样,安装位置可能会有所不同,但一旦您知道llvm-symbolizer位于何处,步骤就会相同.
kay*_*kay 11
是addr2line你在找什么?
$ addr2line -e ./test 0x43e94f
some/file.c:1234
Run Code Online (Sandbox Code Playgroud)
有时使用带有版本号的符号器会给出错误:
ERROR: External symbolizer path is set to '/usr/bin/llvm-symbolizer-5.0' which isn't a known symbolizer. Please set the path to the llvm-symbolizer binary or other known tool.
Run Code Online (Sandbox Code Playgroud)
这可以通过指向未修饰的二进制llvm-symbolizer文件来修复:
export ASAN_SYMBOLIZER_PATH=/usr/lib/llvm-5.0/bin/llvm-symbolizer
Run Code Online (Sandbox Code Playgroud)
然后像平常一样运行您的可执行文件。