aboutsummaryrefslogtreecommitdiff
path: root/docs/UsersManual.html
diff options
context:
space:
mode:
authorAlexey Samsonov <samsonov@google.com>2012-11-29 22:36:21 +0000
committerAlexey Samsonov <samsonov@google.com>2012-11-29 22:36:21 +0000
commit4d1a6e41e1eaeaf5a4672c802519f15c8fb91e91 (patch)
tree7c55765b4b0f845e8b0c51db5eb510dc6fce42ef /docs/UsersManual.html
parent2ec5f551cc455df30183e796a91498c5325b17f2 (diff)
This patch exposes to Clang users three more sanitizers are experimental features of ASan:
1) init-order sanitizer: initialization-order checker. Status: usable, but may produce false positives w/o proper blacklisting. 2) use-after-return sanitizer Status: implemented, but heavily understed. Should be optional, as it significanlty slows program down. 3) use-after-scope sanitizer Status: in progress. git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@168950 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'docs/UsersManual.html')
-rw-r--r--docs/UsersManual.html16
1 files changed, 16 insertions, 0 deletions
diff --git a/docs/UsersManual.html b/docs/UsersManual.html
index 967d0dbf7b..e4f44044c2 100644
--- a/docs/UsersManual.html
+++ b/docs/UsersManual.html
@@ -886,6 +886,8 @@ main checks are:
<li id="opt_fsanitize_address"><tt>-fsanitize=address</tt>:
<a href="AddressSanitizer.html">AddressSanitizer</a>, a memory error
detector.</li>
+<li id="opt_fsanitize_address_full"><tt>-fsanitize=address-full</tt>:
+ AddressSanitizer with all the experimental features listed below.
<li id="opt_fsanitize_integer"><tt>-fsanitize=integer</tt>:
Enables checks for undefined or suspicious integer behavior.</li>
<li id="opt_fsanitize_thread"><tt>-fsanitize=thread</tt>:
@@ -941,6 +943,20 @@ The following more fine-grained checks are also available:
<tt>-fno-rtti</tt>.</li>
</ul>
+Experimental features of AddressSanitizer (not ready for widespread use,
+require explicit <tt>-fsanitize=address</tt>):
+
+<ul>
+<li id="opt_fsanitize_init_order"><tt>-fsanitize=init-order</tt>:
+Check for dynamic initialization order problems.</li>
+<li id="opt_fsanitize_use_after_return"><tt>-fsanitize=use-after-return</tt>:
+Check for use-after-return errors (accessing local variable after the function
+exit).
+<li id="opt_fsanitize_use_after_scope"><tt>-fsanitize=use-after-scope</tt>:
+Check for use-after-scope errors (accesing local variable after it went out of
+scope).
+</ul>
+
The <tt>-fsanitize=</tt> argument must also be provided when linking, in order
to link to the appropriate runtime library. It is not possible to combine the
<tt>-fsanitize=address</tt> and <tt>-fsanitize=thread</tt> checkers in the same