This change adds support for sanitizer build options in CI builds workflow. Currently `asan+ubsan` is enabled, while `tsan+ubsan` is left disabled as more changes are required.
8.0 KiB
Sanitizer Configuration for Rippled
This document explains how to properly configure and run sanitizers (AddressSanitizer, undefinedbehaviorSanitizer, ThreadSanitizer) with the xrpld project.
Corresponding suppression files are located in the sanitizers/suppressions directory.
- Sanitizer Configuration for Rippled
Building with Sanitizers
Summary
Follow the same instructions as mentioned in BUILD.md but with the following changes:
- Make sure you have a clean build directory.
- Set the
SANITIZERSenvironment variable before calling conan install and cmake. Only set it once. Make sure both conan and cmake read the same values. Example:export SANITIZERS=address,undefinedbehavior - Optionally use
--profile:all sanitizerswith Conan to build dependencies with sanitizer instrumentation. [!NOTE]Building with sanitizer-instrumented dependencies is slower but produces fewer false positives. - Set
ASAN_OPTIONS,LSAN_OPTIONS,UBSAN_OPTIONSandTSAN_OPTIONSenvironment variables to configure sanitizer behavior when running executables. More details below.
Build steps:
cd /path/to/rippled
rm -rf .build
mkdir .build
cd .build
Install dependencies
The SANITIZERS environment variable is used by both Conan and CMake.
export SANITIZERS=address,undefinedbehavior
# Standard build (without instrumenting dependencies)
conan install .. --output-folder . --build missing --settings build_type=Debug
# Or with sanitizer-instrumented dependencies (takes longer but fewer false positives)
conan install .. --output-folder . --profile:all sanitizers --build missing --settings build_type=Debug
[!CAUTION] Do not mix Address and Thread sanitizers - they are incompatible.
Since you already set the SANITIZERS environment variable when running Conan, same values will be read for the next part.
Call CMake
cmake .. -G Ninja \
-DCMAKE_TOOLCHAIN_FILE:FILEPATH=build/generators/conan_toolchain.cmake \
-DCMAKE_BUILD_TYPE=Debug \
-Dtests=ON -Dxrpld=ON
Build
cmake --build . --parallel 4
Running Tests with Sanitizers
AddressSanitizer (ASAN)
IMPORTANT: ASAN with Boost produces many false positives. Use these options:
export ASAN_OPTIONS="print_stacktrace=1:detect_container_overflow=0:suppressions=path/to/asan.supp:halt_on_error=0:log_path=asan.log"
export LSAN_OPTIONS="suppressions=path/to/lsan.supp:halt_on_error=0:log_path=lsan.log"
# Run tests
./xrpld --unittest --unittest-jobs=5
Why detect_container_overflow=0?
- Boost intrusive containers (used in
aged_unordered_container) trigger false positives - Boost context switching (used in
Workers.cpp) confuses ASAN's stack tracking - Since we usually don't build Boost (because we don't want to instrument Boost and detect issues in Boost code) with ASAN but use Boost containers in ASAN instrumented rippled code, it generates false positives.
- Building dependencies with ASAN instrumentation reduces false positives. But we don't want to instrument dependencies like Boost with ASAN because it is slow (to compile as well as run tests) and not necessary.
- See: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow
- More such flags are detailed here
ThreadSanitizer (TSan)
export TSAN_OPTIONS="suppressions=path/to/tsan.supp halt_on_error=0 log_path=tsan.log"
# Run tests
./xrpld --unittest --unittest-jobs=5
More details here.
LeakSanitizer (LSan)
LSan is automatically enabled with ASAN. To disable it:
export ASAN_OPTIONS="detect_leaks=0"
More details here.
UndefinedBehaviorSanitizer (UBSan)
export UBSAN_OPTIONS="suppressions=path/to/ubsan.supp:print_stacktrace=1:halt_on_error=0:log_path=ubsan.log"
# Run tests
./xrpld --unittest --unittest-jobs=5
More details here.
Suppression Files
[!NOTE] Attached files contain more details.
asan.supp
- Purpose: Suppress AddressSanitizer (ASAN) errors only
- Format:
interceptor_name:<pattern>where pattern matches file names. Supported suppression types are:- interceptor_name
- interceptor_via_fun
- interceptor_via_lib
- odr_violation
- More info: AddressSanitizer
- Note: Cannot suppress stack-buffer-overflow, container-overflow, etc.
lsan.supp
- Purpose: Suppress LeakSanitizer (LSan) errors only
- Format:
leak:<pattern>where pattern matches function/file names - More info: LeakSanitizer
ubsan.supp
- Purpose: Suppress undefinedbehaviorSanitizer errors
- Format:
<error_type>:<pattern>(e.g.,unsigned-integer-overflow:protobuf) - Covers: Intentional overflows in sanitizers/suppressions libraries (protobuf, gRPC, stdlib)
- More info UBSan suppressions.
tsan.supp
- Purpose: Suppress ThreadSanitizer data race warnings
- Format:
race:<pattern>where pattern matches function/file names - More info: ThreadSanitizer suppressions
sanitizer-ignorelist.txt
- Purpose: Compile-time ignorelist for all sanitizers
- Usage: Passed via
-fsanitize-ignorelist=absolute/path/to/sanitizer-ignorelist.txt - Format:
<level>:<pattern>(e.g.,src:Workers.cpp)
Troubleshooting
"ASAN is ignoring requested __asan_handle_no_return" warnings
These warnings appear when using Boost context switching and are harmless. They indicate potential false positives.
Sanitizer Mismatch Errors
If you see undefined symbols like ___tsan_atomic_load when building with ASAN:
Problem: Dependencies were built with a different sanitizer than the main project.
Solution: Rebuild everything with the same sanitizer:
rm -rf .build
# Then follow the build instructions above
Then review the log files: asan.log.*, ubsan.log.*, tsan.log.*