vitalybuka added inline comments.

================
Comment at: clang/docs/AddressSanitizer.rst:19
+    * Enable ``runtime`` with: ``ASAN_OPTIONS=detect_stack_use_after_return=1``
+* Use-after-scope (clang flag ``-fsanitize-address-use-after-scope``)
 * Double-free, invalid free
----------------
seems overloaded for the list of bug types:

Please create section, similar to 

```
Stack Use After Return
---------------------
...
...
...
Memory leak detection
---------------------
```

and include additional information there


================
Comment at: clang/docs/ClangCommandLineReference.rst:894
 .. option:: -fsanitize-ignorelist=<arg>
 
 Path to ignorelist file for sanitizers
----------------
I believe the best solution for now is just revert changes in this file and 
replace it with auto-generated version in a separate patch.


================
Comment at: clang/docs/UsersManual.rst:3737
                               Enable poisoning array cookies when using custom 
operator new[] in AddressSanitizer
+      -fsanitize-address-use-after-return=<mode>
+                              Select the mode of detecting stack 
use-after-return in AddressSanitizer
----------------
How about we update Options.td (in this patch) with:
HelpText<"Select the mode of detecting stack use-after-return in 
AddressSanitizer: never | runtime (default) | always">,

then we put corresponding text here and move block from UsersManual.rst:1851 
into AddressSanitizer.rst (separate section)


Repository:
  rG LLVM Github Monorepo

CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D104155/new/

https://reviews.llvm.org/D104155

_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to