vitalybuka added inline comments.
================ Comment at: clang/docs/AddressSanitizer.rst:19 + * Enable ``runtime`` with: ``ASAN_OPTIONS=detect_stack_use_after_return=1`` +* Use-after-scope (clang flag ``-fsanitize-address-use-after-scope``) * Double-free, invalid free ---------------- seems overloaded for the list of bug types: Please create section, similar to ``` Stack Use After Return --------------------- ... ... ... Memory leak detection --------------------- ``` and include additional information there ================ Comment at: clang/docs/ClangCommandLineReference.rst:894 .. option:: -fsanitize-ignorelist=<arg> Path to ignorelist file for sanitizers ---------------- I believe the best solution for now is just revert changes in this file and replace it with auto-generated version in a separate patch. ================ Comment at: clang/docs/UsersManual.rst:3737 Enable poisoning array cookies when using custom operator new[] in AddressSanitizer + -fsanitize-address-use-after-return=<mode> + Select the mode of detecting stack use-after-return in AddressSanitizer ---------------- How about we update Options.td (in this patch) with: HelpText<"Select the mode of detecting stack use-after-return in AddressSanitizer: never | runtime (default) | always">, then we put corresponding text here and move block from UsersManual.rst:1851 into AddressSanitizer.rst (separate section) Repository: rG LLVM Github Monorepo CHANGES SINCE LAST ACTION https://reviews.llvm.org/D104155/new/ https://reviews.llvm.org/D104155 _______________________________________________ cfe-commits mailing list cfe-commits@lists.llvm.org https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits