summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorAlexey Samsonov <vonosmas@gmail.com>2014-06-13 17:53:44 +0000
committerAlexey Samsonov <vonosmas@gmail.com>2014-06-13 17:53:44 +0000
commitee5a39f2cf1dce6408eea925fab7312572b421f5 (patch)
tree2812d2b97202309624c8802c05e8fc4c13256cba /docs
parent1b302fa91419e4cff29f340372aa18d1443a4a96 (diff)
downloadclang-ee5a39f2cf1dce6408eea925fab7312572b421f5.tar.gz
clang-ee5a39f2cf1dce6408eea925fab7312572b421f5.tar.bz2
clang-ee5a39f2cf1dce6408eea925fab7312572b421f5.tar.xz
Remove top-level Clang -fsanitize= flags for optional ASan features.
Init-order and use-after-return modes can currently be enabled by runtime flags. use-after-scope mode is not really working at the moment. The only problem I see is that users won't be able to disable extra instrumentation for init-order and use-after-scope by a top-level Clang flag. But this instrumentation was implicitly enabled for quite a while and we didn't hear from users hurt by it. git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@210924 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'docs')
-rw-r--r--docs/UsersManual.rst12
1 files changed, 0 insertions, 12 deletions
diff --git a/docs/UsersManual.rst b/docs/UsersManual.rst
index 90ba22cff8..b716c0a982 100644
--- a/docs/UsersManual.rst
+++ b/docs/UsersManual.rst
@@ -938,10 +938,6 @@ are listed below.
``-fsanitize=address``:
:doc:`AddressSanitizer`, a memory error
detector.
- - ``-fsanitize=init-order``: Make AddressSanitizer check for
- dynamic initialization order problems. Implied by ``-fsanitize=address``.
- - ``-fsanitize=address-full``: AddressSanitizer with all the
- experimental features listed below.
- ``-fsanitize=integer``: Enables checks for undefined or
suspicious integer behavior.
- .. _opt_fsanitize_thread:
@@ -1024,14 +1020,6 @@ are listed below.
- ``-fno-sanitize-blacklist``: don't use blacklist file, if it was
specified earlier in the command line.
- Experimental features of AddressSanitizer (not ready for widespread
- use, require explicit ``-fsanitize=address``):
-
- - ``-fsanitize=use-after-return``: Check for use-after-return
- errors (accessing local variable after the function exit).
- - ``-fsanitize=use-after-scope``: Check for use-after-scope errors
- (accesing local variable after it went out of scope).
-
Extra features of MemorySanitizer (require explicit
``-fsanitize=memory``):