From: Maria Guseva Date: Wed, 5 Jul 2017 08:51:45 +0000 (+0300) Subject: Remove the libsancov_cb hack X-Git-Tag: submit/tizen/20170714.013956~3 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=a2bc3eb28bba95ca936e7a6cd9a21d5bf2bf8cc6;p=tools%2FlibFuzzer.git Remove the libsancov_cb hack Removed as the __sanitizer_cov_trace_pc stub is available now in GCC for Tizen 4.0 (Tizen:Base). --- diff --git a/packaging/libFuzzer.spec b/packaging/libFuzzer.spec index 37d20f9..02787b5 100644 --- a/packaging/libFuzzer.spec +++ b/packaging/libFuzzer.spec @@ -18,17 +18,10 @@ LibFuzzer is in-process, coverage-guided, evolutionary fuzzing engine. %build cd lib/Fuzzer CXX=gcc ./build.sh -# Build a dummy lib for sancov usage -# TODO: remove the libsancov_cb hack once __sanitizer_cov_trace_pc stub is available in GCC -cd - -gcc -c sancov_cb.c -o sancov_cb.o -ar rcs libsancov_cb.a sancov_cb.o %install mkdir -p %{buildroot}%{_libdir} cp lib/Fuzzer/libFuzzer.a %{buildroot}%{_libdir} -# TODO: remove the libsancov_cb hack once __sanitizer_cov_trace_pc stub is available in GCC -cp libsancov_cb.a %{buildroot}%{_libdir} mkdir -p %{buildroot}%{_prefix}/bin cp scripts/sancov.py %{buildroot}%{_prefix}/bin cp scripts/sancov_symbolize.py %{buildroot}%{_prefix}/bin @@ -51,8 +44,7 @@ Scripts for ASan and SanCov instrumentation needed for fuzzing. %post -n fuzz-force-options # Change mode to allow all users to run gcc-force/unforce-options chmod a+w /usr/bin -# TODO: remove the libsancov_cb hack once __sanitizer_cov_trace_pc stub is available in GCC -/usr/bin/gcc-force-options -fsanitize-coverage=trace-pc -fsanitize=address -fno-common -fno-omit-frame-pointer -U_FORTIFY_SOURCE -lsancov_cb +/usr/bin/gcc-force-options -fsanitize-coverage=trace-pc -fsanitize=address -fno-common -fno-omit-frame-pointer -U_FORTIFY_SOURCE chmod a-w /usr/bin %preun -n fuzz-force-options @@ -63,8 +55,6 @@ chmod a-w /usr/bin %files -n fuzz-force-options %{_prefix}/bin/gcc-force-options %{_prefix}/bin/gcc-unforce-options -# TODO: remove the libsancov_cb hack once __sanitizer_cov_trace_pc stub is available in GCC -%{_libdir}/libsancov_cb.a %package -n sancov Summary: Scripts to process coverage information diff --git a/sancov_cb.c b/sancov_cb.c deleted file mode 100644 index 7ea63cf..0000000 --- a/sancov_cb.c +++ /dev/null @@ -1 +0,0 @@ -__attribute__((weak)) void __sanitizer_cov_trace_pc() {}