r177062 - [ASan] Update docs for -fsanitize=init-order option

Alexey Samsonov samsonov at google.com
Thu Mar 14 05:26:21 PDT 2013

Author: samsonov
Date: Thu Mar 14 07:26:21 2013
New Revision: 177062

URL: http://llvm.org/viewvc/llvm-project?rev=177062&view=rev
[ASan] Update docs for -fsanitize=init-order option


Modified: cfe/trunk/docs/AddressSanitizer.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/AddressSanitizer.rst?rev=177062&r1=177061&r2=177062&view=diff
--- cfe/trunk/docs/AddressSanitizer.rst (original)
+++ cfe/trunk/docs/AddressSanitizer.rst Thu Mar 14 07:26:21 2013
@@ -117,6 +117,15 @@ supported by other compilers, so we sugg
 ``__has_feature(address_sanitizer)``. Note: currently, this attribute will be
 lost if the function is inlined.
+``Initialization order checking``
+AddressSanitizer can optionally detect dynamic initialization order problems,
+when initialization of globals defined in one translation unit uses
+globals defined in another translation unit. To enable this check at runtime,
+you should set environment variable
 Supported Platforms

Modified: cfe/trunk/docs/UsersManual.rst
URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/docs/UsersManual.rst?rev=177062&r1=177061&r2=177062&view=diff
--- cfe/trunk/docs/UsersManual.rst (original)
+++ cfe/trunk/docs/UsersManual.rst Thu Mar 14 07:26:21 2013
@@ -842,6 +842,8 @@ are listed below.
       :doc:`AddressSanitizer`, a memory error
+   -  ``-fsanitize=init-order``: Make AddressSanitizer check for
+      dynamic initialization order problems. Implied by ``-fsanitize=address``.
    -  ``-fsanitize=address-full``: AddressSanitizer with all the
       experimental features listed below.
    -  ``-fsanitize=integer``: Enables checks for undefined or
@@ -917,8 +919,6 @@ are listed below.
    Experimental features of AddressSanitizer (not ready for widespread
    use, require explicit ``-fsanitize=address``):
-   -  ``-fsanitize=init-order``: Check for dynamic initialization order
-      problems.
    -  ``-fsanitize=use-after-return``: Check for use-after-return
       errors (accessing local variable after the function exit).
    -  ``-fsanitize=use-after-scope``: Check for use-after-scope errors

More information about the cfe-commits mailing list