From patchwork Sun Nov 24 16:44:18 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tobias Burnus X-Patchwork-Id: 293753 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by ozlabs.org (Postfix) with ESMTPS id 1374A2C00CC for ; Mon, 25 Nov 2013 03:44:40 +1100 (EST) DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender :message-id:date:from:mime-version:to:subject:content-type; q= dns; s=default; b=ueqMtXH4UE/5zGtblge9t8QJGHy19C6Ssd+5Mn6CzPNGLS iuf507kY0NOgdY2v+q7WYkUNxllIN1DWgoWii2T6Hbi0DZ1oHU2DLM/Lxtwwg96A AX+o8AMF1q61HUjRRHJFFzPyjtxx6GwinN8qQ59btV3wzULF/qe66I7r22sFs= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender :message-id:date:from:mime-version:to:subject:content-type; s= default; bh=fbvoxeasODCrqGVHURcu9Tq91ug=; b=aCTtqIzogBmHDxNkYvXL Ch0epZot9p6BGmXUG+zHwxLs88854YLDsRAMpViD2QPL2PndF1F6qw0AnRAfCGdj K/Qupw1OeNyA/V1i7TEwhVpE7icX5nFBq8a4iBrpmZcCkFgS/o6wkZbic2zzhK+H MwPuttG7P4w6SjkGEM/gf1k= Received: (qmail 22629 invoked by alias); 24 Nov 2013 16:44:30 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 22619 invoked by uid 89); 24 Nov 2013 16:44:29 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=4.0 required=5.0 tests=AWL, BAYES_50, GARBLED_SUBJECT, RDNS_NONE, URIBL_BLOCKED autolearn=no version=3.3.2 X-HELO: mx02.qsc.de Received: from Unknown (HELO mx02.qsc.de) (213.148.130.14) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-SHA encrypted) ESMTPS; Sun, 24 Nov 2013 16:44:28 +0000 Received: from archimedes.net-b.de (port-92-194-51-180.dynamic.qsc.de [92.194.51.180]) by mx02.qsc.de (Postfix) with ESMTP id B616A2C4CC; Sun, 24 Nov 2013 17:44:18 +0100 (CET) Message-ID: <52922CE2.100@net-b.de> Date: Sun, 24 Nov 2013 17:44:18 +0100 From: Tobias Burnus User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: gcc patches , Kostya Serebryany , Jakub Jelinek Subject: invoke.texi: Sanitizer =?UTF-8?B?4oCTIHVwZGF0ZSBsaW5rLCBtZW50aW9u?= =?UTF-8?B?IGVudmlyb25tZW50IHZhcmlhYmxlcyBhbmQgbGluayB0byB3aWtpIHBhZ2Ugd2k=?= =?UTF-8?B?dGggdGhlIGZsYWdz?= As the subject says. OK for the trunk? Tobias 2013-11-24 Tobias Burnus PR sanitizer/59275 * doc/invoke.texi (-fsanitize=address,leak): Mention the associated environment variable and link to a list with flags. (-fsanitize=thread): Ditto and update link. diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 568c90d..fbf111c 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -5261,14 +5261,20 @@ many times it is given. This is mainly intended to be used with Enable AddressSanitizer, a fast memory error detector. Memory access instructions will be instrumented to detect out-of-bounds and use-after-free bugs. -See @uref{http://code.google.com/p/address-sanitizer/} for more details. +See @uref{http://code.google.com/p/address-sanitizer/} for +more details. The run-time behavior can be influenced using the +@env{ASAN_OPTIONS} environment variable; see +@url{https://code.google.com/p/address-sanitizer/wiki/Flags#Run-time_flags} for +a list of supported options. @item -fsanitize=thread Enable ThreadSanitizer, a fast data race detector. Memory access instructions will be instrumented to detect -data race bugs. -See @uref{http://code.google.com/p/data-race-test/wiki/ThreadSanitizer} for -more details. +data race bugs. See @uref{http://code.google.com/p/thread-sanitizer/} for more +details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS} +environment variable; see +@url{https://code.google.com/p/thread-sanitizer/wiki/Flags} for a list of +supported options. @item -fsanitize=leak Enable LeakSanitizer, a memory leak detector. @@ -5277,7 +5283,9 @@ This option only matters for linking of executables and if neither case it will link the executable against a library that overrides @code{malloc} and other allocator functions. See @uref{https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer} for more -details. +details. The run-time behavior can be influenced using the +@env{LSAN_OPTIONS} environment variable; see @option{-fsanitize=address} +for the supported options. @item -fsanitize=undefined Enable UndefinedBehaviorSanitizer, a fast undefined behavior detector.