docs/fuzz: describe building fuzzers with enable-sanitizers
authorAlexander Bulekov <alxndr@bu.edu>
Mon, 6 Jul 2020 19:55:32 +0000 (15:55 -0400)
committerThomas Huth <thuth@redhat.com>
Tue, 21 Jul 2020 05:27:28 +0000 (07:27 +0200)
Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
Message-Id: <20200706195534.14962-3-alxndr@bu.edu>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
docs/devel/fuzzing.txt

index db5641de74afa8df7852e5980cfc8e81228e50ff..12bf6aa0ca9d663720f755fcaa203cf799c70861 100644 (file)
@@ -23,9 +23,12 @@ AddressSanitizer mmaps ~20TB of memory, as part of its detection. This results
 in a large page-map, and a much slower fork().
 
 To build the fuzzers, install a recent version of clang:
-Configure with (substitute the clang binaries with the version you installed):
+Configure with (substitute the clang binaries with the version you installed).
+Here, enable-sanitizers, is optional but it allows us to reliably detect bugs
+such as out-of-bounds accesses, use-after-frees, double-frees etc.
 
-    CC=clang-8 CXX=clang++-8 /path/to/configure --enable-fuzzing
+    CC=clang-8 CXX=clang++-8 /path/to/configure --enable-fuzzing \
+                                                --enable-sanitizers
 
 Fuzz targets are built similarly to system/softmmu: