diff options
Diffstat (limited to 'gcc')
-rw-r--r-- | gcc/ChangeLog | 5 | ||||
-rw-r--r-- | gcc/doc/invoke.texi | 11 |
2 files changed, 10 insertions, 6 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog index fd75430..1dc82c1 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,8 @@ +2017-02-26 Gerald Pfeifer <gerald@pfeifer.com> + + * doc/invoke.texi (Optimize Options): Refine the description + of asan-use-after-return. + 2017-02-25 Alan Modra <amodra@gmail.com> PR rtl-optimization/79584 diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 5285f04..1b9fdfe 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -10468,13 +10468,12 @@ To disable built-in functions protection use @item asan-use-after-return Enable detection of use-after-return. This kind of protection -is enabled by default when using @option{-fsanitize=address} option. -To disable use-after-return detection use -@option{--param asan-use-after-return=0}. +is enabled by default when using the @option{-fsanitize=address} option. +To disable it use @option{--param asan-use-after-return=0}. -Note: The check is disabled by default at runtime. To enable the check, -you should set environment variable @env{ASAN_OPTIONS} to -@code{detect_stack_use_after_return=1}. +Note: By default the check is disabled at run time. To enable it, +add @code{detect_stack_use_after_return=1} to the environment variable +@env{ASAN_OPTIONS}. @item asan-instrumentation-with-call-threshold If number of memory accesses in function being instrumented |