Build using Address Sanitizer (asan), Leak Sanitizer (lsan), or Undefined Behavior Sanitizer (ubsan) by using one of these options for the configure script: --enable-asan --enable-lsan --enable-ubsan For each of these to work, the compiler must support the requested sanitizer and the requisite libraries must be installed (libasan, liblsan, libubsan). --- acinclude.m4 | 36 ++++++++++++++++++++++++++++++++++++ configure.ac | 45 +++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 81 insertions(+) diff --git a/acinclude.m4 b/acinclude.m4 index 0ba4287..8aab4ee 100644 --- a/acinclude.m4 +++ b/acinclude.m4 @@ -10,6 +10,42 @@ AC_DEFUN([AC_PROG_CC_PIE], [ ]) ]) +AC_DEFUN([AC_PROG_CC_ASAN], [ + AC_CACHE_CHECK([whether ${CC-cc} accepts -fsanitize=address], ac_cv_prog_cc_asan, [ + echo 'void f(){}' > conftest.c + if test -z "`${CC-cc} -fsanitize=address -c conftest.c 2>&1`"; then + ac_cv_prog_cc_asan=yes + else + ac_cv_prog_cc_asan=no + fi + rm -rf conftest* + ]) +]) + +AC_DEFUN([AC_PROG_CC_LSAN], [ + AC_CACHE_CHECK([whether ${CC-cc} accepts -fsanitize=leak], ac_cv_prog_cc_lsan, [ + echo 'void f(){}' > conftest.c + if test -z "`${CC-cc} -fsanitize=leak -c conftest.c 2>&1`"; then + ac_cv_prog_cc_lsan=yes + else + ac_cv_prog_cc_lsan=no + fi + rm -rf conftest* + ]) +]) + +AC_DEFUN([AC_PROG_CC_UBSAN], [ + AC_CACHE_CHECK([whether ${CC-cc} accepts -fsanitize=undefined], ac_cv_prog_cc_ubsan, [ + echo 'void f(){}' > conftest.c + if test -z "`${CC-cc} -fsanitize=undefined -c conftest.c 2>&1`"; then + ac_cv_prog_cc_ubsan=yes + else + ac_cv_prog_cc_ubsan=no + fi + rm -rf conftest* + ]) +]) + AC_DEFUN([COMPILER_FLAGS], [ if (test "${CFLAGS}" = ""); then CFLAGS="-Wall -O2 -fsigned-char" diff --git a/configure.ac b/configure.ac index 39755fe..e4ca5b2 100644 --- a/configure.ac +++ b/configure.ac @@ -20,6 +20,9 @@ AC_LANG_C AC_PROG_CC AC_PROG_CC_PIE +AC_PROG_CC_ASAN +AC_PROG_CC_LSAN +AC_PROG_CC_UBSAN AC_PROG_INSTALL AC_C_CHAR_UNSIGNED @@ -54,6 +57,48 @@ AC_ARG_ENABLE(pie, AC_HELP_STRING([--enable-pie], fi ]) +save_LIBS=$LIBS +AC_CHECK_LIB(asan, __sanitizer_cov_init) +LIBS=$save_LIBS + +AC_ARG_ENABLE(asan, AC_HELP_STRING([--enable-asan], + [enable linking with address sanitizer]), [ + if (test "${enableval}" = "yes" && + test "${ac_cv_lib_asan___sanitizer_cov_init}" = "yes" && + test "${ac_cv_prog_cc_asan}" = "yes"); then + CFLAGS="$CFLAGS -fsanitize=address"; + LDFLAGS="$LDFLAGS -fsanitize=address" + fi +]) + +save_LIBS=$LIBS +AC_CHECK_LIB(lsan, __sanitizer_cov_init) +LIBS=$save_LIBS + +AC_ARG_ENABLE(lsan, AC_HELP_STRING([--enable-lsan], + [enable linking with leak sanitizer]), [ + if (test "${enableval}" = "yes" && + test "${ac_cv_lib_lsan___sanitizer_cov_init}" = "yes" && + test "${ac_cv_prog_cc_lsan}" = "yes"); then + CFLAGS="$CFLAGS -fsanitize=leak"; + LDFLAGS="$LDFLAGS -fsanitize=leak" + fi +]) + +save_LIBS=$LIBS +AC_CHECK_LIB(ubsan, __sanitizer_cov_init) +LIBS=$save_LIBS + +AC_ARG_ENABLE(ubsan, AC_HELP_STRING([--enable-ubsan], + [enable linking with undefined behavior sanitizer]), [ + if (test "${enableval}" = "yes" && + test "${ac_cv_lib_ubsan___sanitizer_cov_init}" = "yes" && + test "${ac_cv_prog_cc_ubsan}" = "yes"); then + CFLAGS="$CFLAGS -fsanitize=undefined"; + LDFLAGS="$LDFLAGS -fsanitize=undefined" + fi +]) + AC_CHECK_FUNC(signalfd, dummy=yes, AC_MSG_ERROR(signalfd support is required)) -- 2.7.3