Memory leak bugs are a major problem in C/C++ programs, which occur when memory objects are not deallocated. Developers need to manually deallocate these objects to prevent memory leaks.
AddressWatcher is a dynamic tool that proposes fix locations for such memory leaks. AddressWatcher employs the existing infrastructure of well-known sanitizer-based tools (i.e., ASAN and LSAN) to perform a light-weight compile instrumentation in the program. Then, AddressWatcher utilizes the instrumentation during the program execution to watch and track memory leaks address. For each leak, AddressWatcher tracks possible execution paths that a leaked object passes through, and collects all stack traces where the leaked object is used. Finally, a stack that involves the deepest point in the program flow is suggested as a potential fix location for the leak. We develop a tool prototype for our framework (i.e., AddressWatcher).
Instructions to build:
- For Debian based system including Ubuntu, Install libgmp-dev, libmpfr-dev and libmpc-dev packages. For RPM based system including Fedora and SUSE, install gmp-devel, and libmpc-devel(mpc-devel on SUSE) packages. This is a dependecy for the build.
- Next create a new directory called build/ which is not a subdirectory of AddressWatcher
- Change directory to build/
- run /path/to/AddressWatcher/configure --prefix=/path/to/compiled/binaries --enable-languages=c,c++ --disable-bootstrap --disable-multilib
- make -j4
- make install
- Check compiled binaries of gcc in /path/to/compiled/bin
To use the new compiled binaries with AddressWatcher mode on a C program test.c follow these steps:
- Change directory to test program
- export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/path/to/compiled/binaries/lib64
- export ASAN_OPTIONS="log_path=/path/to/test.c/asan:halt_on_error=0:detect_leaks=1:address_watcher=1"
- /path/to/compiled/binaries/bin/gcc -fsanitize=address -ggdb test.c
- Run the compiled binary twice to recieve AddressWatcher report in same directory.
The benchmarks can be found in benchmarks/ folder which is a collection of 50 memory leak bugs across openssl, tmux, openssh-portable, binutils and git.
Demo YouTube link:
To understand more on how to run the tool: https://www.youtube.com/watch?v=cGuefW925X4
To understand how you can automatically patch the memory leak using AddressWatcher output: https://www.youtube.com/watch?v=PIOPzy04eXw
First, clone this repo, and enter the root directory of the project.
You can now build the environment required for the tool from using the Dockerfile included by running the following command:
docker build -t addresswatcher .
The build command will both setup the environment and the 3 test repositories. To enter the container invoke:
docker run -it addresswatcher
Minimized Benchmark files are within /mem_leak/benchmarks/ folder. The following command below compiles binutils_leak_1.c
/mem_leak/goodgcc/bin/gcc -fsanitize=address -ggdb /mem_leak/AddressWatcher/benchmarks/binutils/leak_1/binutils_leak_1.c
All AddressWatcher logs are available after testing within the testing/ directory.