diff options
author | Gerald Pfeifer <gerald@pfeifer.com> | 2017-02-26 22:10:27 +0000 |
---|---|---|
committer | Gerald Pfeifer <gerald@gcc.gnu.org> | 2017-02-26 22:10:27 +0000 |
commit | b4242a79f96072df84b88cfd9913becc6f60229b (patch) | |
tree | 696f6c42ec3ca483dec2b96fcbaf2d4009ad1ab2 /gcc | |
parent | 734ca1c209d81ee2a162cc0293d82450bc2e9a94 (diff) | |
download | gcc-b4242a79f96072df84b88cfd9913becc6f60229b.zip gcc-b4242a79f96072df84b88cfd9913becc6f60229b.tar.gz gcc-b4242a79f96072df84b88cfd9913becc6f60229b.tar.bz2 |
invoke.texi (Optimize Options): Refine the description of asan-use-after-return.
* doc/invoke.texi (Optimize Options): Refine the description
of asan-use-after-return.
From-SVN: r245747
Diffstat (limited to 'gcc')
-rw-r--r-- | gcc/ChangeLog | 5 | ||||
-rw-r--r-- | gcc/doc/invoke.texi | 11 |
2 files changed, 10 insertions, 6 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog index fd75430..1dc82c1 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,8 @@ +2017-02-26 Gerald Pfeifer <gerald@pfeifer.com> + + * doc/invoke.texi (Optimize Options): Refine the description + of asan-use-after-return. + 2017-02-25 Alan Modra <amodra@gmail.com> PR rtl-optimization/79584 diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 5285f04..1b9fdfe 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -10468,13 +10468,12 @@ To disable built-in functions protection use @item asan-use-after-return Enable detection of use-after-return. This kind of protection -is enabled by default when using @option{-fsanitize=address} option. -To disable use-after-return detection use -@option{--param asan-use-after-return=0}. +is enabled by default when using the @option{-fsanitize=address} option. +To disable it use @option{--param asan-use-after-return=0}. -Note: The check is disabled by default at runtime. To enable the check, -you should set environment variable @env{ASAN_OPTIONS} to -@code{detect_stack_use_after_return=1}. +Note: By default the check is disabled at run time. To enable it, +add @code{detect_stack_use_after_return=1} to the environment variable +@env{ASAN_OPTIONS}. @item asan-instrumentation-with-call-threshold If number of memory accesses in function being instrumented |