diff options
author | Alexey Samsonov <vonosmas@gmail.com> | 2014-06-13 17:53:44 +0000 |
---|---|---|
committer | Alexey Samsonov <vonosmas@gmail.com> | 2014-06-13 17:53:44 +0000 |
commit | ee5a39f2cf1dce6408eea925fab7312572b421f5 (patch) | |
tree | 2812d2b97202309624c8802c05e8fc4c13256cba /docs | |
parent | 1b302fa91419e4cff29f340372aa18d1443a4a96 (diff) | |
download | clang-ee5a39f2cf1dce6408eea925fab7312572b421f5.tar.gz clang-ee5a39f2cf1dce6408eea925fab7312572b421f5.tar.bz2 clang-ee5a39f2cf1dce6408eea925fab7312572b421f5.tar.xz |
Remove top-level Clang -fsanitize= flags for optional ASan features.
Init-order and use-after-return modes can currently be enabled
by runtime flags. use-after-scope mode is not really working at the
moment.
The only problem I see is that users won't be able to disable extra
instrumentation for init-order and use-after-scope by a top-level Clang flag.
But this instrumentation was implicitly enabled for quite a while and
we didn't hear from users hurt by it.
git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@210924 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'docs')
-rw-r--r-- | docs/UsersManual.rst | 12 |
1 files changed, 0 insertions, 12 deletions
diff --git a/docs/UsersManual.rst b/docs/UsersManual.rst index 90ba22cff8..b716c0a982 100644 --- a/docs/UsersManual.rst +++ b/docs/UsersManual.rst @@ -938,10 +938,6 @@ are listed below. ``-fsanitize=address``: :doc:`AddressSanitizer`, a memory error detector. - - ``-fsanitize=init-order``: Make AddressSanitizer check for - dynamic initialization order problems. Implied by ``-fsanitize=address``. - - ``-fsanitize=address-full``: AddressSanitizer with all the - experimental features listed below. - ``-fsanitize=integer``: Enables checks for undefined or suspicious integer behavior. - .. _opt_fsanitize_thread: @@ -1024,14 +1020,6 @@ are listed below. - ``-fno-sanitize-blacklist``: don't use blacklist file, if it was specified earlier in the command line. - Experimental features of AddressSanitizer (not ready for widespread - use, require explicit ``-fsanitize=address``): - - - ``-fsanitize=use-after-return``: Check for use-after-return - errors (accessing local variable after the function exit). - - ``-fsanitize=use-after-scope``: Check for use-after-scope errors - (accesing local variable after it went out of scope). - Extra features of MemorySanitizer (require explicit ``-fsanitize=memory``): |