From patchwork Wed Mar 1 12:53:18 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jonny Grant X-Patchwork-Id: 65836 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 7DA2B3858033 for ; Wed, 1 Mar 2023 12:53:41 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from mail-wr1-x42e.google.com (mail-wr1-x42e.google.com [IPv6:2a00:1450:4864:20::42e]) by sourceware.org (Postfix) with ESMTPS id 451C83858D3C for ; Wed, 1 Mar 2023 12:53:21 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 451C83858D3C Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=jguk.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=jguk.org Received: by mail-wr1-x42e.google.com with SMTP id j2so13087336wrh.9 for ; Wed, 01 Mar 2023 04:53:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jguk.org; s=google; h=content-transfer-encoding:in-reply-to:from:cc:to:references :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=QOx52DZ92IfgXiHDgF9TORBlo484EaiSZnQSnnKXOdA=; b=Jlv2eM8Y/sowPqTS/466t2zOJg7EdnkU636eGWDtI4r4vzyqJQIePd/eMV+EhNpwJ/ hMSGxb4VsxolDPelYegCu/4hjBkvCvRJMzY1/KaiO6KPejAa2QgE0MbN9kNTTLTY/g69 fEHy+hi5Kws2tj/ovWHdHQKaDpax0nIjqXUDUomTz81IgW63JoDIjklmSj6UAmA8yH8Q v1L0KZg/ExXcf9qkfch2VHni0ibJjif3lR111f7an+FcR+MHQvSndE1oiDB9VoWEfjib oYXnDMxEVuRy2VWaLCPoOwJ0pNnMAYbKsqaw9FlFss16TR+vv4NuDmt2mMHgeUu9N7WN aRCg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:cc:to:references :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=QOx52DZ92IfgXiHDgF9TORBlo484EaiSZnQSnnKXOdA=; b=MUMVhj7hDejXJHI4jpZGLuGzS69A5vKYXKgHtl2JCRZ1Q0tp/4QqluCB+ALJptV5TZ 5hiovXxvIvvVZMrO50SQuMeeQnnMMjpjJJL5YoQ2LEWuHBmcSVsMdOrB7kD7DNg/Uxvb fTeBxzvgNjvEa5g0itOskeaElepsFcUlot7QV27ntm5yjvphJgqHa/SIF3U8ienHeR/O g8qZTtP1QMR/hsRpIMbJXLnurFyqHvSuTEjoU73ArkH8u2hGyUvMSBHXgn/FwuKI0JFX b8j888Os3wb+QVO9FZUY7BXxP1AZ2WyxiARcMNeuUUpqCK+IObIIsmJLDyAwZ+M0SfQk wXMg== X-Gm-Message-State: AO0yUKUM2GoNJE1o4POHTt30LtN1K1dND2oEuaNIp7fnsrzzf7VkZUhq 49joBi8SRtHBJ9SQq2VmmJlb53XookYSW7GX X-Google-Smtp-Source: AK7set9wMZ6um+P5XOYm0SFYxgI7UgkBZvFVzpAE1wp6nuFP/x9Hx4cfw7BujdyG9vTbbb28fOoD6Q== X-Received: by 2002:a05:6000:c3:b0:2c5:510b:8f9c with SMTP id q3-20020a05600000c300b002c5510b8f9cmr5472989wrx.52.1677675199924; Wed, 01 Mar 2023 04:53:19 -0800 (PST) Received: from [192.168.0.12] (cpc87345-slou4-2-0-cust172.17-4.cable.virginm.net. [81.101.252.173]) by smtp.gmail.com with ESMTPSA id a18-20020a5d53d2000000b002c70ce264bfsm13081879wrw.76.2023.03.01.04.53.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 01 Mar 2023 04:53:19 -0800 (PST) Message-ID: <73790291-35fa-df87-38a5-7fcb6cd7d1cf@jguk.org> Date: Wed, 1 Mar 2023 12:53:18 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Subject: Fwd: Bugzilla Bug 81649 [PATCH]: Clarify LeakSanitizer in documentation Content-Language: en-GB References: <2bc4729d-77dc-ff59-81ed-ee617ac20fb1@jguk.org> To: gcc-patches@gcc.gnu.org Cc: Jonny Grant , Jakub Jelinek From: Jonny Grant In-Reply-To: <2bc4729d-77dc-ff59-81ed-ee617ac20fb1@jguk.org> X-Forwarded-Message-Id: <2bc4729d-77dc-ff59-81ed-ee617ac20fb1@jguk.org> X-Spam-Status: No, score=-9.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+patchwork=sourceware.org@gcc.gnu.org Sender: "Gcc-patches" Hello I don't have write access, could someone review and apply this please? Kind regards Jonny -------- Forwarded Message -------- Subject: Bugzilla Bug 81649 [PATCH]: Clarify LeakSanitizer in documentation Date: Mon, 26 Dec 2022 20:50:23 +0000 From: Jonny Grant To: gcc-patches@gcc.gnu.org My ticket, but text change proposed by Jakub Jelinek. 2022-12-26 Jonathan Grant * gcc/doc/invoke.texi: Clarify LeakSanitizer in documentation >From 2d70a3728536151c4c2f78b6c5d5281ce2233d43 Mon Sep 17 00:00:00 2001 From: Jonathan Grant Date: Mon, 26 Dec 2022 20:46:23 +0000 Subject: [PATCH] Bugzilla 81649 clarify LeakSanitizer onlinedocs Signed-off-by: Jonathan Grant --- gcc/doc/invoke.texi | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index da9ad1068fb..6743204adc0 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -16668,8 +16668,8 @@ operating on invalid memory addresses with non-call exceptions @item -fsanitize=leak @opindex fsanitize=leak Enable LeakSanitizer, a memory leak detector. -This option only matters for linking of executables and -the executable is linked against a library that overrides @code{malloc} +This option only matters for linking of executables. +The executable is linked against a library that overrides @code{malloc} and other allocator functions. See @uref{https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer} for more details. The run-time behavior can be influenced using the