fuzz: build without AddressSanitizer, by default
We already have a nice --enable-sanitizers option to enable AddressSanitizer. There is no reason to duplicate and force this functionality in --enable-fuzzing. In the future, if more sanitizers are added to --enable-sanitizers, it might be impossible to build with both --enable-sanitizers and --enable-fuzzing, since not all sanitizers are compatible with libFuzzer. In that case, we could enable ASAN with --extra-cflags="-fsanitize=address" Signed-off-by: Alexander Bulekov <alxndr@bu.edu> Message-Id: <20200706195534.14962-2-alxndr@bu.edu> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Reviewed-by: Thomas Huth <thuth@redhat.com> [thuth: Added missing $CFLAGS] Signed-off-by: Thomas Huth <thuth@redhat.com>
This commit is contained in:
parent
48eac10197
commit
dd0162653c
|
@ -6337,7 +6337,7 @@ fi
|
||||||
# checks for fuzzer
|
# checks for fuzzer
|
||||||
if test "$fuzzing" = "yes" ; then
|
if test "$fuzzing" = "yes" ; then
|
||||||
write_c_fuzzer_skeleton
|
write_c_fuzzer_skeleton
|
||||||
if compile_prog "$CPU_CFLAGS -Werror -fsanitize=address,fuzzer" ""; then
|
if compile_prog "$CPU_CFLAGS -Werror -fsanitize=fuzzer" ""; then
|
||||||
have_fuzzer=yes
|
have_fuzzer=yes
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
@ -7893,11 +7893,11 @@ if test "$have_mlockall" = "yes" ; then
|
||||||
fi
|
fi
|
||||||
if test "$fuzzing" = "yes" ; then
|
if test "$fuzzing" = "yes" ; then
|
||||||
if test "$have_fuzzer" = "yes"; then
|
if test "$have_fuzzer" = "yes"; then
|
||||||
FUZZ_LDFLAGS=" -fsanitize=address,fuzzer"
|
FUZZ_LDFLAGS=" -fsanitize=fuzzer"
|
||||||
FUZZ_CFLAGS=" -fsanitize=address,fuzzer"
|
FUZZ_CFLAGS=" -fsanitize=fuzzer"
|
||||||
CFLAGS="$CFLAGS -fsanitize=address,fuzzer-no-link"
|
CFLAGS="$CFLAGS -fsanitize=fuzzer-no-link"
|
||||||
else
|
else
|
||||||
error_exit "Your compiler doesn't support -fsanitize=address,fuzzer"
|
error_exit "Your compiler doesn't support -fsanitize=fuzzer"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
Loading…
Reference in New Issue