diff options
author | Damian Szuberski <[email protected]> | 2022-02-03 23:35:38 +0100 |
---|---|---|
committer | GitHub <[email protected]> | 2022-02-03 14:35:38 -0800 |
commit | 63652e154643cfe596fe077c13de0e7be34dd863 (patch) | |
tree | a357fcff504f2b8fbdce59b236788435556b45f8 /config/always-compiler-options.m4 | |
parent | aa9905d89b3559e1cd280d018615d392f57a18d0 (diff) |
Add `--enable-asan` and `--enable-ubsan` switches
`configure` now accepts `--enable-asan` and `--enable-ubsan` switches
which results in passing `-fsanitize=address`
and `-fsanitize=undefined`, respectively, to the compiler. Those
flags are enabled in GitHub workflows for ZTS and zloop. Errors
reported by both instrumentations are corrected, except for:
- Memory leak reporting is (temporarily) suppressed. The cost of
fixing them is relatively high compared to the gains.
- Checksum computing functions in `module/zcommon/zfs_fletcher*`
have UBSan errors suppressed. It is completely impractical
to enforce 64-byte payload alignment there due to performance
impact.
- There's no ASan heap poisoning in `module/zstd/lib/zstd.c`. A custom
memory allocator is used there rendering that measure
unfeasible.
- Memory leaks detection has to be suppressed for `cmd/zvol_id`.
`zvol_id` is run by udev with the help of `ptrace(2)`. Tracing is
incompatible with memory leaks detection.
Reviewed-by: Ahelenia ZiemiaĆska <[email protected]>
Reviewed-by: George Melikov <[email protected]>
Reviewed-by: Brian Behlendorf <[email protected]>
Signed-off-by: szubersk <[email protected]>
Closes #12928
Diffstat (limited to 'config/always-compiler-options.m4')
-rw-r--r-- | config/always-compiler-options.m4 | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/config/always-compiler-options.m4 b/config/always-compiler-options.m4 index ce84f7e60..82b351c6e 100644 --- a/config/always-compiler-options.m4 +++ b/config/always-compiler-options.m4 @@ -46,6 +46,53 @@ AC_DEFUN([ZFS_AC_CONFIG_ALWAYS_CC_ASAN], [ ]) dnl # +dnl # Enabled -fsanitize=undefined if supported by gcc. +dnl # +dnl # LDFLAGS needs -fsanitize=undefined at all times so libraries compiled with +dnl # it will be linked successfully. CFLAGS will vary by binary being built. +dnl # +dnl # The UBSAN_OPTIONS environment variable can be used to further control +dnl # the behavior of binaries and libraries build with -fsanitize=undefined. +dnl # +AC_DEFUN([ZFS_AC_CONFIG_ALWAYS_CC_UBSAN], [ + AC_MSG_CHECKING([whether to build with -fsanitize=undefined support]) + AC_ARG_ENABLE([ubsan], + [AS_HELP_STRING([--enable-ubsan], + [Enable -fsanitize=undefined support @<:@default=no@:>@])], + [], + [enable_ubsan=no]) + + AM_CONDITIONAL([UBSAN_ENABLED], [test x$enable_ubsan = xyes]) + AC_SUBST([UBSAN_ENABLED], [$enable_ubsan]) + AC_MSG_RESULT($enable_ubsan) + + AS_IF([ test "$enable_ubsan" = "yes" ], [ + AC_MSG_CHECKING([whether $CC supports -fsanitize=undefined]) + saved_cflags="$CFLAGS" + CFLAGS="$CFLAGS -Werror -fsanitize=undefined" + AC_LINK_IFELSE([ + AC_LANG_SOURCE([[ int main() { return 0; } ]]) + ], [ + UBSAN_CFLAGS="-fsanitize=undefined" + UBSAN_LDFLAGS="-fsanitize=undefined" + UBSAN_ZFS="_with_ubsan" + AC_MSG_RESULT([yes]) + ], [ + AC_MSG_ERROR([$CC does not support -fsanitize=undefined]) + ]) + CFLAGS="$saved_cflags" + ], [ + UBSAN_CFLAGS="" + UBSAN_LDFLAGS="" + UBSAN_ZFS="_without_ubsan" + ]) + + AC_SUBST([UBSAN_CFLAGS]) + AC_SUBST([UBSAN_LDFLAGS]) + AC_SUBST([UBSAN_ZFS]) +]) + +dnl # dnl # Check if gcc supports -Wframe-larger-than=<size> option. dnl # AC_DEFUN([ZFS_AC_CONFIG_ALWAYS_CC_FRAME_LARGER_THAN], [ |