diff options
author | Tobias Burnus <burnus@net-b.de> | 2013-11-30 10:11:13 +0100 |
---|---|---|
committer | Tobias Burnus <burnus@gcc.gnu.org> | 2013-11-30 10:11:13 +0100 |
commit | 483b0aa49b3fc3f981f5bf33a88d100783ee2ed9 (patch) | |
tree | 186d799a4f0be61a0c5b0668814321d37535d6f8 /gcc | |
parent | fe23d8ce4f57061a8d1d57689a54a61bdfe03108 (diff) | |
download | gcc-483b0aa49b3fc3f981f5bf33a88d100783ee2ed9.zip gcc-483b0aa49b3fc3f981f5bf33a88d100783ee2ed9.tar.gz gcc-483b0aa49b3fc3f981f5bf33a88d100783ee2ed9.tar.bz2 |
re PR sanitizer/59275 (Document environment variables used by the sanitizers)
2013-11-30 Tobias Burnus <burnus@net-b.de>
PR sanitizer/59275
* doc/invoke.texi (-fsanitize=address,leak): Mention the
* associated
environment variable and link to a list with flags.
(-fsanitize=thread): Ditto and update link.
From-SVN: r205548
Diffstat (limited to 'gcc')
-rw-r--r-- | gcc/ChangeLog | 7 | ||||
-rw-r--r-- | gcc/doc/invoke.texi | 17 |
2 files changed, 19 insertions, 5 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog index 74bbc8d..3e11726 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,10 @@ +2013-11-30 Tobias Burnus <burnus@net-b.de> + + PR sanitizer/59275 + * doc/invoke.texi (-fsanitize=address,leak): Mention the associated + environment variable and link to a list with flags. + (-fsanitize=thread): Ditto and update link. + 2013-11-29 Vladimir Makarov <vmakarov@redhat.com> PR rtl-optimization/59340 diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 54aa8b3..f865b61d 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -5276,14 +5276,20 @@ many times it is given. This is mainly intended to be used with Enable AddressSanitizer, a fast memory error detector. Memory access instructions will be instrumented to detect out-of-bounds and use-after-free bugs. -See @uref{http://code.google.com/p/address-sanitizer/} for more details. +See @uref{http://code.google.com/p/address-sanitizer/} for +more details. The run-time behavior can be influenced using the +@env{ASAN_OPTIONS} environment variable; see +@url{https://code.google.com/p/address-sanitizer/wiki/Flags#Run-time_flags} for +a list of supported options. @item -fsanitize=thread Enable ThreadSanitizer, a fast data race detector. Memory access instructions will be instrumented to detect -data race bugs. -See @uref{http://code.google.com/p/data-race-test/wiki/ThreadSanitizer} for -more details. +data race bugs. See @uref{http://code.google.com/p/thread-sanitizer/} for more +details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS} +environment variable; see +@url{https://code.google.com/p/thread-sanitizer/wiki/Flags} for a list of +supported options. @item -fsanitize=leak Enable LeakSanitizer, a memory leak detector. @@ -5292,7 +5298,8 @@ This option only matters for linking of executables and if neither case it will link the executable against a library that overrides @code{malloc} and other allocator functions. See @uref{https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer} for more -details. +details. The run-time behavior can be influenced using the +@env{LSAN_OPTIONS} environment variable. @item -fsanitize=undefined Enable UndefinedBehaviorSanitizer, a fast undefined behavior detector. |