||This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (May 2016) (Learn how and when to remove this template message)|
|This article needs additional citations for verification. (May 2016) (Learn how and when to remove this template message)|
Shadow memory is a technique used to track and store information on computer memory used by a program during its execution. Shadow memory consists of shadow bytes that map to individual bits or one or more bytes in main memory. These shadow bytes are typically invisible to the original program and are used to record information about the original piece of data.
The technique is utilized by memory-error checkers that can store information on which parts of memory have been allocated to the program being checked. This shadow memory is then used for detecting and reporting incorrect accesses of memory, even though the program may not be crashing due to a segmentation fault or similar. An error checker may also store additional information on memory such as which bits have defined and which ones do not. Memcheck, part of the Valgrind suite uses this to detect undefined behavior resulting from acting on or printing undefined memory values.
Use of shadow memory is however not limited to memory-error checkers, as what information is stored in these shadow bytes is not fixed. It is for instance used by ThreadSanitizer, a data race detector.
Shadow memory can be both implemented and used a lot of different ways, and have different performance characteristics. Memcheck for instance tracks values with bit precision, while AddressSanitizer, part of the clang compiler, is comparatively very fast. Memcheck, as all Valgrind tools, use binary translation and instrumentation to run code manipulating the shadow memory corresponding to program memory use. AddressSanitizer on the other hand is created on compile-time and inserts error-checking code inline into a program during compilation. Its shadow-memory implementation uses a huge reservation of virtual memory for its shadow memory, giving very different performance characteristics.
- Nethercote, N.; Seward, J. (2007), "How to shadow every byte of memory used by a program. In Proceedings of the 3rd international Conference on Virtual Execution Environments (San Diego, California, USA)", VEE '07, ACM New York (published June 13–15, 2007), pp. 65–74, doi:10.1145/1254810.1254820