diff options
author | Alexey Samsonov <samsonov@google.com> | 2012-11-29 22:36:21 +0000 |
---|---|---|
committer | Alexey Samsonov <samsonov@google.com> | 2012-11-29 22:36:21 +0000 |
commit | 4d1a6e41e1eaeaf5a4672c802519f15c8fb91e91 (patch) | |
tree | 7c55765b4b0f845e8b0c51db5eb510dc6fce42ef /docs/UsersManual.html | |
parent | 2ec5f551cc455df30183e796a91498c5325b17f2 (diff) |
This patch exposes to Clang users three more sanitizers are experimental features of ASan:
1) init-order sanitizer: initialization-order checker.
Status: usable, but may produce false positives w/o proper blacklisting.
2) use-after-return sanitizer
Status: implemented, but heavily understed.
Should be optional, as it significanlty slows program down.
3) use-after-scope sanitizer
Status: in progress.
git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@168950 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'docs/UsersManual.html')
-rw-r--r-- | docs/UsersManual.html | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/docs/UsersManual.html b/docs/UsersManual.html index 967d0dbf7b..e4f44044c2 100644 --- a/docs/UsersManual.html +++ b/docs/UsersManual.html @@ -886,6 +886,8 @@ main checks are: <li id="opt_fsanitize_address"><tt>-fsanitize=address</tt>: <a href="AddressSanitizer.html">AddressSanitizer</a>, a memory error detector.</li> +<li id="opt_fsanitize_address_full"><tt>-fsanitize=address-full</tt>: + AddressSanitizer with all the experimental features listed below. <li id="opt_fsanitize_integer"><tt>-fsanitize=integer</tt>: Enables checks for undefined or suspicious integer behavior.</li> <li id="opt_fsanitize_thread"><tt>-fsanitize=thread</tt>: @@ -941,6 +943,20 @@ The following more fine-grained checks are also available: <tt>-fno-rtti</tt>.</li> </ul> +Experimental features of AddressSanitizer (not ready for widespread use, +require explicit <tt>-fsanitize=address</tt>): + +<ul> +<li id="opt_fsanitize_init_order"><tt>-fsanitize=init-order</tt>: +Check for dynamic initialization order problems.</li> +<li id="opt_fsanitize_use_after_return"><tt>-fsanitize=use-after-return</tt>: +Check for use-after-return errors (accessing local variable after the function +exit). +<li id="opt_fsanitize_use_after_scope"><tt>-fsanitize=use-after-scope</tt>: +Check for use-after-scope errors (accesing local variable after it went out of +scope). +</ul> + The <tt>-fsanitize=</tt> argument must also be provided when linking, in order to link to the appropriate runtime library. It is not possible to combine the <tt>-fsanitize=address</tt> and <tt>-fsanitize=thread</tt> checkers in the same |