| Using AddressSanitizer in Subzero | 
 | ================================= | 
 |  | 
 | AddressSanitizer is a powerful compile-time tool used to detect and report | 
 | illegal memory accesses. For a full description of the tool, see the original | 
 | `paper | 
 | <https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf>`_. | 
 | AddressSanitizer is only supported on native builds of .pexe files and cannot be | 
 | used in production. | 
 |  | 
 | In Subzero, AddressSanitizer depends on being able to find and instrument calls | 
 | to various functions such as malloc() and free(), and as such the .pexe file | 
 | being translated must not have had those symbols stripped or inlined. Subzero | 
 | will not complain if it is told to translate a .pexe file with its symbols | 
 | stripped, but it will not be able to find calls to malloc(), calloc(), free(), | 
 | etc., so AddressSanitizer will not work correctly in the final executable. | 
 |  | 
 | Furthermore, pnacl-clang automatically inlines some calls to calloc(), | 
 | even with inlining turned off, so we provide wrapper scripts, | 
 | sz-clang.py and sz-clang++.py, that normally just pass their arguments | 
 | through to pnacl-clang or pnacl-clang++, but add instrumentation to | 
 | replace calls to calloc() at the source level if they are passed | 
 | -fsanitize-address. | 
 |  | 
 | These are the steps to compile hello.c to an instrumented object file:: | 
 |  | 
 |     sz-clang.py -fsanitize-address -o hello.nonfinal.pexe hello.c | 
 |     pnacl-finalize --no-strip-syms -o hello.pexe hello.nonfinal.pexe | 
 |     pnacl-sz -fsanitize-address -filetype=obj -o hello.o hello.pexe | 
 |  | 
 | The resulting object file must be linked with the Subzero-specific | 
 | AddressSanitizer runtime to work correctly. A .pexe file can be compiled with | 
 | AddressSanitizer and properly linked into a final executable using | 
 | subzero/pydir/szbuild.py with the --fsanitize-address flag, i.e.:: | 
 |  | 
 |     pydir/szbuild.py --fsanitize-address hello.pexe | 
 |  | 
 | Handling Wide Loads | 
 | =================== | 
 |  | 
 | Since AddressSanitizer is implemented only in Subzero, the target .pexe may | 
 | contain widened loads that would cause false positives. To avoid reporting such | 
 | loads as errors, we treat any word-aligned, four byte load as a potentially | 
 | widened load and only check the first byte of the loaded word against shadow | 
 | memory. | 
 |  | 
 | Building SPEC2000 Benchmark Suite | 
 | ================================= | 
 |  | 
 | Most of the SPEC2000 benchmarks can be built with Subzero and AddressSanitizer, | 
 | however due to the nature of our solution for LLVM's aggressive inlining of | 
 | calloc, 300.twolf and 252.eon will not build. AddressSanitizer correctly finds | 
 | bugs in 197.parser and 253.perlbmk. 176.gcc crashes for unknown reasons. Among | 
 | the benchmarks that do run to completion, the average slowdown introduced is | 
 | 4.6x. | 
 |  | 
 | To build the benchmarks with AddressSanitizer, some small changes to the | 
 | Makefile are needed. They can be found `here | 
 | <https://codereview.chromium.org/2266553002/>`_. | 
 |  | 
 | Once the Makefile has been patched, build and run with these commands:: | 
 |  | 
 |   cd native_client/tests/spec2k | 
 |   ./run_all.sh BuildBenchmarks 0 SetupPnaclX8632Opt <benchmarks> | 
 |   ../../toolchain_build/src/subzero/pydir/szbuild_spec2k.py -v -O2 \ | 
 |       --fsanitize-address <benchmarks> | 
 |   ./run_all.sh RunTimedBenchmarks SetupGccX8632Opt train <benchmarks> |