diff options
author | Mark Wielaard <mjw@redhat.com> | 2015-05-21 23:36:51 +0200 |
---|---|---|
committer | Mark Wielaard <mjw@redhat.com> | 2015-05-27 15:09:36 +0200 |
commit | 2b250b759799eaa43bce1643b7072be8c5c19c01 (patch) | |
tree | 9adec3f0c274efbf2c759fd8caa9d9a48a1c4de4 | |
parent | c2297eab17b7dbb98021b51f063f71d1cdc7893a (diff) | |
download | elfutils-2b250b759799eaa43bce1643b7072be8c5c19c01.tar.gz |
configure: Add --enable-sanitize-undefined.
Now that we are -fsanitize=undefined clean make sure we keep it that way.
We do have to disable alignment checking. Because we might explicitly
use unaligned accesses (see ALLOW_UNALIGNED).
Rename DISTCHECK_CONFIGURE_FLAGS to AM_DISTCHECK_CONFIGURE_FLAGS, so the
user can override. And add --enable-sanitize-undefined.
Signed-off-by: Mark Wielaard <mjw@redhat.com>
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | Makefile.am | 4 | ||||
-rw-r--r-- | configure.ac | 18 |
3 files changed, 26 insertions, 2 deletions
@@ -1,3 +1,9 @@ +2015-05-21 Mark Wielaard <mjw@redhat.com> + + * configure.ac: Add --enable-sanitize-undefined. + * Makefile.am (DISTCHECK_CONFIGURE_FLAGS): Rename to... + (AM_DISTCHECK_CONFIGURE_FLAGS): this. Add --enable-sanitize-undefined. + 2015-05-04 Anthony G. Basile <blueness@gentoo.org> * configure.ac (argp_LDADD): Check if libc has argp and set diff --git a/Makefile.am b/Makefile.am index d044a7cb..1454d043 100644 --- a/Makefile.am +++ b/Makefile.am @@ -33,9 +33,9 @@ EXTRA_DIST = elfutils.spec GPG-KEY NOTES CONTRIBUTING \ # Make sure the test build uses the same compiler, which on e.g. ppc64 # determines which platform we are actually testing. # Run all tests under valgrind. -DISTCHECK_CONFIGURE_FLAGS = \ +AM_DISTCHECK_CONFIGURE_FLAGS = \ --libdir=`echo $(libdir) | sed "s,^$(exec_prefix),$$dc_install_base,"`\ - --enable-valgrind \ + --enable-valgrind --enable-sanitize-undefined \ CC="$(CC)" distcheck-hook: diff --git a/configure.ac b/configure.ac index 68b7f5b5..e0adad7d 100644 --- a/configure.ac +++ b/configure.ac @@ -193,6 +193,23 @@ if test "$use_gcov" = yes; then fi AM_CONDITIONAL(GCOV, test "$use_gcov" = yes) +AC_ARG_ENABLE([sanitize-undefined], + AS_HELP_STRING([--enable-sanitize-undefined], + [Use gcc undefined behaviour sanitizer]), + [use_undefined=$enableval], [use_undefined=no]) +if test "$use_undefined" = yes; then + old_CFLAGS="$CFLAGS" + old_CXXFLAGS="$CXXFLAGS" + # We explicitly use unaligned access when possible (see ALLOW_UNALIGNED) + # We want to fail immediately on first error, don't try to recover. + CFLAGS="$CFLAGS -fsanitize=undefined -fno-sanitize=alignment -fno-sanitize-recover" + CXXFLAGS="$CXXFLAGS -fsanitize=undefined -fno-sanitize=alignment -fno-sanitize-recover" + AC_COMPILE_IFELSE([AC_LANG_SOURCE([])], use_undefined=yes, use_undefined=no) + AS_IF([test "x$use_undefined" != xyes], + AC_MSG_WARN([gcc undefined behaviour sanitizer not available]) + CFLAGS="$old_CFLAGS" CXXFLAGS="$old_CXXFLAGS") +fi + AC_ARG_ENABLE([valgrind], AS_HELP_STRING([--enable-valgrind],[run all tests under valgrind]), [use_valgrind=$enableval], [use_valgrind=no]) @@ -421,6 +438,7 @@ AC_MSG_NOTICE([ gprof support : ${use_gprof} gcov support : ${use_gcov} run all tests under valgrind : ${use_valgrind} + gcc undefined behaviour sanitizer : ${use_undefined} use rpath in tests : ${tests_use_rpath} test biarch : ${utrace_cv_cc_biarch} ]) |