当前位置: 首页 > news >正文

C/C++:AddressSanitizer内存检测工具

AddressSanitizer是gcc自带的内存检测工具,无需额外安装

常见问题

#include <stdlib.h>// 越界访问
void stack_buffer_overflow()
{char buffer[1];int i = 10;buffer[i] = 'A'; // 访问越界
}// 野指针
void use_after_free()
{char *text = (char *)malloc(sizeof(char) * 5);free(text);text[0] = '1'; // 访问已释放内存
}// 内存泄漏
void leak_memory()
{char *text = (char *)malloc(sizeof(char) * 5);
}

AddressSanitizer使用示例

// main.c
#include <stdlib.h>// 野指针
void use_after_free()
{char *text = (char *)malloc(sizeof(char) * 5);free(text);text[0] = '1'; // 访问已释放内存
}int main(int argc, char const *argv[])
{use_after_free();return 0;
}

运行就能输出对应的错误信息

$ gcc main.c -o main -fsanitize=address  -g && ./main=================================================================
==25561==ERROR: AddressSanitizer: heap-use-after-free on address 0x6020000000d0 at pc 0x000109372ee1 bp 0x7ff7b6b8cef0 sp 0x7ff7b6b8cee8
WRITE of size 1 at 0x6020000000d0 thread T0#0 0x109372ee0 in use_after_free main.c:17#1 0x109372f2a in main main.c:28#2 0x7ff80bb45365 in start+0x795 (dyld:x86_64+0xfffffffffff5c365)0x6020000000d0 is located 0 bytes inside of 5-byte region [0x6020000000d0,0x6020000000d5)
freed by thread T0 here:#0 0x109e18b69 in wrap_free+0xa9 (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0xdcb69)#1 0x109372e9e in use_after_free main.c:15#2 0x109372f2a in main main.c:28#3 0x7ff80bb45365 in start+0x795 (dyld:x86_64+0xfffffffffff5c365)previously allocated by thread T0 here:#0 0x109e18a20 in wrap_malloc+0xa0 (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0xdca20)#1 0x109372e91 in use_after_free main.c:14#2 0x109372f2a in main main.c:28#3 0x7ff80bb45365 in start+0x795 (dyld:x86_64+0xfffffffffff5c365)SUMMARY: AddressSanitizer: heap-use-after-free main.c:17 in use_after_free
Shadow bytes around the buggy address:0x601ffffffe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 000x601ffffffe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 000x601fffffff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 000x601fffffff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 000x602000000000: fa fa fd fd fa fa 00 00 fa fa 00 04 fa fa 00 00
=>0x602000000080: fa fa 00 04 fa fa 00 00 fa fa[fd]fa fa fa fa fa0x602000000100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa0x602000000180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa0x602000000200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa0x602000000280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa0x602000000300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):Addressable:           00Partially addressable: 01 02 03 04 05 06 07 Heap left redzone:       faFreed heap region:       fdStack left redzone:      f1Stack mid redzone:       f2Stack right redzone:     f3Stack after return:      f5Stack use after scope:   f8Global redzone:          f9Global init order:       f6Poisoned by user:        f7Container overflow:      fcArray cookie:            acIntra object redzone:    bbASan internal:           feLeft alloca redzone:     caRight alloca redzone:    cb
==25561==ABORTING
zsh: abort      ./main
http://www.dtcms.com/a/358411.html

相关文章:

  • 《以奋斗者为本》读书笔记(上篇:价值管理)
  • Ethan开发者创新项目日报 | 2025-08-30
  • MySQL之事务
  • 渲染数据列表:`map` 方法与 `key` 的奥秘
  • Rust 泛型:抽象与性能的完美融合(零成本抽象的终极指南)
  • sql简单练习——随笔记
  • Deepseek法务提示指令收集
  • 【前端教程】MIUI 官网界面设计与实现全解析
  • ceph配置集群
  • 详情Redis的Zset结构
  • STM32 之BMP280的应用--基于RTOS的环境
  • React学习教程,从入门到精通, ReactJS - 优点与缺点(5)
  • 学习stm32 窗口看门狗
  • 鸿蒙ArkUI 基础篇-12-List/ListItem-界面布局案例歌曲列表
  • Shell脚本命令扩展
  • 回归问题的损失函数
  • 06.《STP 基础原理与配置详解》
  • 学习python第14天
  • Spark mapGroups 函数详解与多种用法示例
  • 神经网络正则化三重奏:Weight Decay, Dropout, 和LayerNorm
  • 嵌入式硬件电路分析---AD采集电路
  • pyqt5的简单开发可视化界面的例子
  • 【重学 MySQL】九十三、MySQL的字符集的修改与底层原理详解
  • Linux学习----归档和传输文件实用指南
  • java报错问题解析
  • 在 MyBatis 中oracle基本数值类型的 JDBC 类型映射
  • Let‘s Encrypt证书自动续期
  • 【数据分享】上市公司-创新投入、研发投入数据(2007-2022)
  • 【Python 后端框架】总结
  • Transformer:从入门到精通