prog:gcc
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
prog:gcc [2017/11/03 01:14] – Ajout du sanitizer undefined root | prog:gcc [2024/11/12 12:48] (Version actuelle) – Déplacement des sanitizer vers une page dédiée root | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | =====Diagnostic===== | + | Nightly pour [[https:// |
- | ====-fdump-class-hierarchy==== | + | |
- | Taille des classes et tables virtuelles. | + | |
- | g++ -I… -fdump-class-hierarchy -c visitor1.cc | + | [[https:// |
- | < | + | ====Ubuntu==== |
- | Vtable for pattern:: | + | |
- | pattern:: | + | |
- | 0 (int (*)(...))0 | + | |
- | 8 (int (*)(...))(& | + | |
- | 16 0 | + | |
- | 24 0 | + | |
- | 32 (int (*)(...))__cxa_pure_virtual | + | |
- | Class pattern:: | + | |
- | | + | |
- | base size=8 base align=8 | + | |
- | pattern:: | + | |
- | vptr=((& | + | |
- | </ | + | |
- | =====Commun avec clang===== | + | Ubuntu ne fournit pas de méthode 100% automatique. |
- | ====Sanitizer==== | + | |
- | Il existe | + | |
- | ===address=== | + | |
- | Il détecte des erreurs de type global-buffer-overflow, | + | |
- | [[https:// | + | |
- | * global-buffer-overflow | + | <code bash> |
- | <file c main.c> | + | sudo update-alternatives |
- | int global_array[100] = {-1}; | + | </code> |
- | int main(int argc, char **argv) { | + | Utiliser pour switcher entre les versions : |
- | return global_array[argc+100]; | + | |
- | } | + | |
- | </ | + | |
- | gcc main.c | + | <code bash> |
+ | sudo update-alternatives | ||
+ | </code> | ||
- | ================================================================= | + | =====Diagnostic===== |
- | ==2500==ERROR: AddressSanitizer: | + | ====Information et taille des classes et tables virtuelles==== |
- | READ of size 4 at 0x000000740cf4 thread T0 | + | |
- | #0 0x50d9be in main / | + | |
- | #1 0x7f1208faa461 in __libc_start_main / | + | |
- | #2 0x419709 in _start (/ | + | |
- | + | ||
- | 0x000000740cf4 is located 4 bytes to the right of global variable ' | + | |
- | SUMMARY: AddressSanitizer: | + | |
- | Shadow bytes around the buggy address: | + | |
- | 0x0000800e0140: | + | |
- | 0x0000800e0150: | + | |
- | 0x0000800e0160: | + | |
- | 0x0000800e0170: | + | |
- | 0x0000800e0180: | + | |
- | => | + | |
- | 0x0000800e01a0: | + | |
- | 0x0000800e01b0: | + | |
- | 0x0000800e01c0: | + | |
- | 0x0000800e01d0: | + | |
- | 0x0000800e01e0: | + | |
- | Shadow byte legend (one shadow byte represents 8 application bytes): | + | |
- | Addressable: | + | |
- | Partially addressable: | + | |
- | Heap left redzone: | + | |
- | Freed heap region: | + | |
- | Stack left redzone: | + | |
- | Stack mid redzone: | + | |
- | Stack right redzone: | + | |
- | Stack after return: | + | |
- | Stack use after scope: | + | |
- | Global redzone: | + | |
- | Global init order: | + | |
- | Poisoned by user: f7 | + | |
- | Container overflow: | + | |
- | Array cookie: | + | |
- | Intra object redzone: | + | |
- | ASan internal: | + | |
- | Left alloca redzone: | + | |
- | Right alloca redzone: | + | |
- | | + | |
- | [[prog:valgrind|valgrind]] ne détecte pas l' | + | <code cpp> |
+ | class VirtualBase | ||
+ | { | ||
+ | public | ||
+ | virtual int tick(int n) = 0; | ||
+ | }; | ||
+ | |||
+ | class VirtualDerived : public VirtualBase | ||
+ | { | ||
+ | public : | ||
+ | int m_counter; | ||
+ | public : | ||
+ | VirtualDerived() : m_counter(0) {} | ||
+ | int tick(int n) { m_counter += n; return m_counter; } | ||
+ | }; | ||
+ | </ | ||
- | * heap-use-after-free | + | * Jusqu' |
- | < | + | * A partir de gcc 8 : '' |
- | int main(int argc, char **argv) { | + | |
- | | + | |
- | delete [] array; | + | |
- | return array[argc]; | + | |
- | } | + | |
- | </ | + | |
- | g++ main2.c -g -fsanitize=address -o main2 && ./main2 | + | < |
+ | Vtable for VirtualBase | ||
+ | VirtualBase:: | ||
+ | 0 (int (*)(...))0 | ||
+ | 8 (int (*)(...))(& _ZTI11VirtualBase) | ||
+ | 16 (int (*)(...))__cxa_pure_virtual | ||
- | ================================================================= | + | Class VirtualBase |
- | ==2765==ERROR: | + | |
- | READ of size 4 at 0x614000000044 thread T0 | + | base size=8 base align=8 |
- | #0 0x512444 in main / | + | VirtualBase |
- | #1 0x7fd8d0086461 in __libc_start_main / | + | |
- | #2 0x419d29 in _start | + | |
- | + | ||
- | 0x614000000044 is located 4 bytes inside of 400-byte region [0x614000000040, | + | |
- | freed by thread T0 here: | + | |
- | #0 0x50ef30 in operator delete[](void*) / | + | |
- | #1 0x5123f6 in main / | + | |
- | #2 0x7fd8d0086461 in __libc_start_main / | + | |
- | #3 0x419d29 in _start (/ | + | |
- | | + | |
- | previously allocated by thread T0 here: | + | |
- | #0 0x50e1c8 in operator new[](unsigned long) / | + | |
- | #1 0x5123d4 in main / | + | |
- | #2 0x7fd8d0086461 in __libc_start_main / | + | |
- | #3 0x419d29 in _start (/ | + | |
- | + | ||
- | SUMMARY: AddressSanitizer: | + | |
- | Shadow bytes around the buggy address: | + | |
- | 0x0c287fff7fb0: | + | |
- | 0x0c287fff7fc0: | + | |
- | 0x0c287fff7fd0: | + | |
- | 0x0c287fff7fe0: | + | |
- | 0x0c287fff7ff0: | + | |
- | => | + | |
- | 0x0c287fff8010: | + | |
- | 0x0c287fff8020: | + | |
- | 0x0c287fff8030: | + | |
- | 0x0c287fff8040: | + | |
- | 0x0c287fff8050: | + | |
- | [[prog:valgrind|valgrind]] détecte l' | + | Vtable for VirtualDerived |
+ | VirtualDerived:: | ||
+ | 0 (int (*)(...))0 | ||
+ | 8 (int (*)(...))(& | ||
+ | 16 (int (*)(...))VirtualDerived:: | ||
- | ==2787== Command: ./main2 | + | Class VirtualDerived |
- | | + | |
- | | + | base size=12 base align=8 |
- | ==2787== | + | VirtualDerived |
- | ==2787== | + | vptr=((& VirtualDerived: |
- | ==2787== | + | |
- | | + | |
- | | + | </ |
- | ==2787== | + | |
- | | + | |
- | * stack-use-after-return | + | * clang : '' |
- | <file c main3.c> | + | |
- | int *g; | + | |
- | void LeakLocal() { | + | Ci-dessous, on affiche que le contenu des '' |
- | int local; | + | |
- | g = & | + | |
- | } | + | |
- | int main(){ | + | < |
- | | + | *** Dumping AST Record Layout |
- | | + | 0 | class VirtualBase |
- | } | + | 0 | (VirtualBase vtable pointer) |
- | </ | + | | [sizeof=8, dsize=8, align=8, |
+ | | nvsize=8, nvalign=8] | ||
- | | + | *** Dumping AST Record Layout |
- | | + | 0 | class VirtualDerived |
+ | 0 | | ||
+ | 0 | | ||
+ | 8 | int m_counter | ||
+ | | [sizeof=16, dsize=12, align=8, | ||
+ | | nvsize=12, nvalign=8] | ||
+ | </code> | ||
- | L'utilisation de '' | + | * Table virtuelle uniquement : '' |
- | ================================================================= | + | < |
- | | + | Vtable for ' |
- | READ of size 4 at 0x7f57b2a00020 thread T0 | + | |
- | #0 0x50db24 in main / | + | |
- | #1 0x7f57b604d461 in __libc_start_main / | + | -- (VirtualBase, |
- | #2 0x419709 in _start | + | -- (VirtualDerived, |
- | + | 2 | int VirtualDerived::tick(int) | |
- | Address 0x7f57b2a00020 is located in stack of thread T0 at offset 32 in frame | + | |
- | #0 0x50d95f in LeakLocal / | + | |
- | + | ||
- | This frame has 1 object(s): | + | |
- | [32, 36) ' | + | |
- | HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext | + | |
- | (longjmp and C++ exceptions *are* supported) | + | |
- | SUMMARY: AddressSanitizer: | + | |
- | | + | |
- | 0x0feb76537fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | + | |
- | 0x0feb76537fc0: | + | |
- | 0x0feb76537fd0: | + | |
- | 0x0feb76537fe0: | + | |
- | 0x0feb76537ff0: | + | |
- | => | + | |
- | 0x0feb76538010: | + | |
- | 0x0feb76538020: | + | |
- | 0x0feb76538030: | + | |
- | 0x0feb76538040: | + | |
- | 0x0feb76538050: | + | |
- | [[prog: | + | VTable indices for 'VirtualDerived' |
+ | 0 | int VirtualDerived:: | ||
- | | + | Vtable for ' |
+ | | ||
+ | 1 | VirtualBase RTTI | ||
+ | -- (VirtualBase, | ||
+ | 2 | int VirtualBase:: | ||
- | ==2961== Syscall param exit_group(status) contains uninitialised byte(s) | + | VTable indices for ' |
- | | + | 0 | int VirtualBase::tick(int) |
- | ==2961== by 0x4E70423: __run_exit_handlers (exit.c: | + | </ |
- | | + | ====gprof==== |
- | | + | Génère un graphe de l' |
- | ==2961== | + | |
- | ==2961== | + | |
- | ===thread=== | + | [[https:// |
- | <file cpp main4.cc> | + | |
- | #include < | + | |
- | int main() { | + | ====Couverture de code==== |
- | int x; | + | |
- | std::thread t([&]{x=42;}); | + | |
- | x = 43; | + | |
- | t.join(); | + | |
- | return 0; | + | Options à ajouter à la compilation : '' |
- | } | + | |
- | </ | + | |
- | g++ -std=c++11 main4.c | + | Options à ajouter au lieur : '' |
- | <note important> | + | Puis exécuter le ou les programmes. Attention, pas d' |
- | </ | + | |
- | ================== | + | <code bash> |
- | WARNING: ThreadSanitizer: | + | lcov --capture |
- | Write of size 4 at 0x7ffd04d5b144 by thread T1: | + | lcov --remove build/coverage.info "/usr/include/*" |
- | #0 operator() / | + | genhtml |
- | #1 __invoke_impl< | + | find build/coverage -name "*.html" -exec sed -i -r "s#headerValue"" |
- | #2 __invoke< | + | </code> |
- | #3 _M_invoke< | + | |
- | #4 operator() / | + | |
- | #5 _M_run / | + | |
- | #6 < | + | |
- | + | ||
- | Previous write of size 4 at 0x7ffd04d5b144 by main thread: | + | |
- | #0 main /tmp/main4.c:6 (main4+0x000000400d75) | + | |
- | + | ||
- | Location is stack of main thread. | + | |
- | + | ||
- | Thread T1 (tid=3228, running) created by main thread at: | + | |
- | | + | |
- | #1 std:: | + | |
- | #2 main / | + | |
- | + | ||
- | SUMMARY: ThreadSanitizer: | + | |
- | ================== | + | |
- | ThreadSanitizer: | + | |
- | + | ||
- | [[prog:valgrind|valgrind]] ne détecte pas l' | + | |
- | + | ||
- | ===undefined=== | + | |
- | <file c main5.c> | + | |
- | int main(int argc, char **argv) | + | |
- | int t = argc << 16; | + | |
- | return t*t; | + | |
- | } | + | |
- | </file> | + | |
- | | + | Attention, la version de gcov doit correspondre à celle de gcc. |
- | main6.c:3:11: runtime error: signed integer overflow: 65536 * 65536 cannot be represented in type ' | + | En option, on supprime la date pour qu'un diff simple puisse se faire. |
- | [[prog: |
prog/gcc.1509668053.txt.gz · Dernière modification : 2017/11/03 01:14 de root