From patchwork Mon Dec 26 20:50:23 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jonny Grant X-Patchwork-Id: 62419 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 873E03858C54 for ; Mon, 26 Dec 2022 20:50:42 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from mail-wm1-x331.google.com (mail-wm1-x331.google.com [IPv6:2a00:1450:4864:20::331]) by sourceware.org (Postfix) with ESMTPS id 7D6393858C83 for ; Mon, 26 Dec 2022 20:50:26 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 7D6393858C83 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=jguk.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=jguk.org Received: by mail-wm1-x331.google.com with SMTP id l26so6615506wme.5 for ; Mon, 26 Dec 2022 12:50:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jguk.org; s=google; h=content-transfer-encoding:to:subject:from:content-language :user-agent:mime-version:date:message-id:from:to:cc:subject:date :message-id:reply-to; bh=WeZSXuj9Ljb2C7a0suj5IftkjyG04rmG3uA9DvCxkKs=; b=Ab0WgT7Z7WGQtLhNpjTjvaFsnDvvzAftMQWxEAnEloNtSCfB1ZUYF+SK/S0g3EFnBV Y7dNTJh1m7Rb3vc8mcR3VuCqocyVkQILi9fkK1/qeTiZVPIhf7NHvYdwEO5z+o3+qUFM T9xa1CZMkaXcLyPKmbI5+4RaUAqw56uBNNLxCU7Wgd5mYtniu69VZPQ34UUYqLKSlfyM oEnVB4yCc9gZbw4TYyCOEn0L/Z32nv9sJsaBzFZiVCKQJySOk838oC5BwTXzAL3ALBIs eBnxCZjFqORuSM33Gpc/qPq4pCBal4WqK9HJtvIYUNIZnTd8SqzE0WqhYNNgZzzucrXO 6jPg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:to:subject:from:content-language :user-agent:mime-version:date:message-id:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WeZSXuj9Ljb2C7a0suj5IftkjyG04rmG3uA9DvCxkKs=; b=RSLU3Hkx5/5HyLXkyvxxPb3F1nzf7SlmK92BxpdZmcXJeGwjI5bECMYPUlnuBP/vdV gAAT7osOXyc7zpQ1ka4oE5YHnM+/enxteAuopULJlOqy0fz481FgjLnmpHHPM1i/XKxV +OXhK2nRdmyeMbgjXYRmcesDYcdfS5iNdq9mEnjTmrpX/wSQ4d5u9YSGBZVSWy7VpDa8 7ABoAsMhSBlk9jH6cB/T/dDsmhEgCzk1OtmAXQP7USTDosqkoz1NgUs1zvAqGfpkaHVS sryaPq1b8n+75o2e07IRyIpwEFRn+6deBTYBHq61JGV8/UlU5cgwIg+2TVIIeRbvioU9 XQAw== X-Gm-Message-State: AFqh2koskK4YdNaM1ZQLgQJwA+gylPxz6hGwAV7EU/ghesRAS0LlxdAe yjGDF4YCGiV4a55MYBpYDeiYRZL5q8Z0UVJb X-Google-Smtp-Source: AMrXdXtOh9UnHbebAN48E3iNf1NjHTA1CE+KeXzyRkTwAz5ru84MdLYVjoOxs8G0NCkgROmMHsYqVA== X-Received: by 2002:a05:600c:44d4:b0:3cf:7925:7a3 with SMTP id f20-20020a05600c44d400b003cf792507a3mr13667752wmo.24.1672087825174; Mon, 26 Dec 2022 12:50:25 -0800 (PST) Received: from [192.168.0.12] (cpc87345-slou4-2-0-cust172.17-4.cable.virginm.net. [81.101.252.173]) by smtp.gmail.com with ESMTPSA id iv7-20020a05600c548700b003d35c09d4b9sm22486432wmb.40.2022.12.26.12.50.24 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 26 Dec 2022 12:50:24 -0800 (PST) Message-ID: <2bc4729d-77dc-ff59-81ed-ee617ac20fb1@jguk.org> Date: Mon, 26 Dec 2022 20:50:23 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.2 Content-Language: en-GB From: Jonny Grant Subject: Bugzilla Bug 81649 [PATCH]: Clarify LeakSanitizer in documentation To: gcc-patches@gcc.gnu.org X-Spam-Status: No, score=-9.3 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+patchwork=sourceware.org@gcc.gnu.org Sender: "Gcc-patches" My ticket, but text change proposed by Jakub Jelinek. 2022-12-26 Jonathan Grant * gcc/doc/invoke.texi: Clarify LeakSanitizer in documentation From 2d70a3728536151c4c2f78b6c5d5281ce2233d43 Mon Sep 17 00:00:00 2001 From: Jonathan Grant Date: Mon, 26 Dec 2022 20:46:23 +0000 Subject: [PATCH] Bugzilla 81649 clarify LeakSanitizer onlinedocs Signed-off-by: Jonathan Grant --- gcc/doc/invoke.texi | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index da9ad1068fb..6743204adc0 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -16668,8 +16668,8 @@ operating on invalid memory addresses with non-call exceptions @item -fsanitize=leak @opindex fsanitize=leak Enable LeakSanitizer, a memory leak detector. -This option only matters for linking of executables and -the executable is linked against a library that overrides @code{malloc} +This option only matters for linking of executables. +The executable is linked against a library that overrides @code{malloc} and other allocator functions. See @uref{https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer} for more details. The run-time behavior can be influenced using the