From: Gerald Pfeifer Date: Sun, 26 Feb 2017 22:10:27 +0000 (+0000) Subject: invoke.texi (Optimize Options): Refine the description of asan-use-after-return. X-Git-Url: https://git.libre-soc.org/?a=commitdiff_plain;h=b4242a79f96072df84b88cfd9913becc6f60229b;p=gcc.git invoke.texi (Optimize Options): Refine the description of asan-use-after-return. * doc/invoke.texi (Optimize Options): Refine the description of asan-use-after-return. From-SVN: r245747 --- diff --git a/gcc/ChangeLog b/gcc/ChangeLog index fd75430d5cf..1dc82c185e7 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,8 @@ +2017-02-26 Gerald Pfeifer + + * doc/invoke.texi (Optimize Options): Refine the description + of asan-use-after-return. + 2017-02-25 Alan Modra PR rtl-optimization/79584 diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 5285f04ec6f..1b9fdfe71bb 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -10468,13 +10468,12 @@ To disable built-in functions protection use @item asan-use-after-return Enable detection of use-after-return. This kind of protection -is enabled by default when using @option{-fsanitize=address} option. -To disable use-after-return detection use -@option{--param asan-use-after-return=0}. +is enabled by default when using the @option{-fsanitize=address} option. +To disable it use @option{--param asan-use-after-return=0}. -Note: The check is disabled by default at runtime. To enable the check, -you should set environment variable @env{ASAN_OPTIONS} to -@code{detect_stack_use_after_return=1}. +Note: By default the check is disabled at run time. To enable it, +add @code{detect_stack_use_after_return=1} to the environment variable +@env{ASAN_OPTIONS}. @item asan-instrumentation-with-call-threshold If number of memory accesses in function being instrumented