Commit b4242a79 by Gerald Pfeifer Committed by Gerald Pfeifer

invoke.texi (Optimize Options): Refine the description of asan-use-after-return.

	* doc/invoke.texi (Optimize Options): Refine the description
	of asan-use-after-return.

From-SVN: r245747
parent 734ca1c2
2017-02-26 Gerald Pfeifer <gerald@pfeifer.com>
* doc/invoke.texi (Optimize Options): Refine the description
of asan-use-after-return.
2017-02-25 Alan Modra <amodra@gmail.com> 2017-02-25 Alan Modra <amodra@gmail.com>
PR rtl-optimization/79584 PR rtl-optimization/79584
......
...@@ -10468,13 +10468,12 @@ To disable built-in functions protection use ...@@ -10468,13 +10468,12 @@ To disable built-in functions protection use
@item asan-use-after-return @item asan-use-after-return
Enable detection of use-after-return. This kind of protection Enable detection of use-after-return. This kind of protection
is enabled by default when using @option{-fsanitize=address} option. is enabled by default when using the @option{-fsanitize=address} option.
To disable use-after-return detection use To disable it use @option{--param asan-use-after-return=0}.
@option{--param asan-use-after-return=0}.
Note: The check is disabled by default at runtime. To enable the check, Note: By default the check is disabled at run time. To enable it,
you should set environment variable @env{ASAN_OPTIONS} to add @code{detect_stack_use_after_return=1} to the environment variable
@code{detect_stack_use_after_return=1}. @env{ASAN_OPTIONS}.
@item asan-instrumentation-with-call-threshold @item asan-instrumentation-with-call-threshold
If number of memory accesses in function being instrumented If number of memory accesses in function being instrumented
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment