mirror of
https://github.com/intel/llvm.git
synced 2026-01-21 04:14:03 +08:00
docs: remote stale refs
Since the attribute documentation is now auto-generated, the previous references are no longer valid. This prevented the docs build from completing successfully. llvm-svn: 250674
This commit is contained in:
@@ -196,12 +196,11 @@ Disabling Instrumentation with ``__attribute__((no_sanitize("address")))``
|
||||
--------------------------------------------------------------------------
|
||||
|
||||
Some code should not be instrumented by AddressSanitizer. One may use the
|
||||
function attribute ``__attribute__((no_sanitize("address")))``
|
||||
(which has deprecated synonyms
|
||||
:ref:`no_sanitize_address <langext-address_sanitizer>` and
|
||||
`no_address_safety_analysis`) to disable instrumentation of a particular
|
||||
function. This attribute may not be supported by other compilers, so we suggest
|
||||
to use it together with ``__has_feature(address_sanitizer)``.
|
||||
function attribute ``__attribute__((no_sanitize("address")))`` (which has
|
||||
deprecated synonyms `no_sanitize_address` and `no_address_safety_analysis`) to
|
||||
disable instrumentation of a particular function. This attribute may not be
|
||||
supported by other compilers, so we suggest to use it together with
|
||||
``__has_feature(address_sanitizer)``.
|
||||
|
||||
Suppressing Errors in Recompiled Code (Blacklist)
|
||||
-------------------------------------------------
|
||||
|
||||
@@ -80,14 +80,11 @@ whether MemorySanitizer is enabled. :ref:`\_\_has\_feature
|
||||
``__attribute__((no_sanitize_memory))``
|
||||
-----------------------------------------------
|
||||
|
||||
Some code should not be checked by MemorySanitizer.
|
||||
One may use the function attribute
|
||||
:ref:`no_sanitize_memory <langext-memory_sanitizer>`
|
||||
to disable uninitialized checks in a particular function.
|
||||
MemorySanitizer may still instrument such functions to avoid false positives.
|
||||
This attribute may not be
|
||||
supported by other compilers, so we suggest to use it together with
|
||||
``__has_feature(memory_sanitizer)``.
|
||||
Some code should not be checked by MemorySanitizer. One may use the function
|
||||
attribute `no_sanitize_memory` to disable uninitialized checks in a particular
|
||||
function. MemorySanitizer may still instrument such functions to avoid false
|
||||
positives. This attribute may not be supported by other compilers, so we
|
||||
suggest to use it together with ``__has_feature(memory_sanitizer)``.
|
||||
|
||||
Blacklist
|
||||
---------
|
||||
|
||||
@@ -86,25 +86,22 @@ this purpose.
|
||||
``__attribute__((no_sanitize_thread))``
|
||||
-----------------------------------------------
|
||||
|
||||
Some code should not be instrumented by ThreadSanitizer.
|
||||
One may use the function attribute
|
||||
:ref:`no_sanitize_thread <langext-thread_sanitizer>`
|
||||
to disable instrumentation of plain (non-atomic) loads/stores in a particular function.
|
||||
ThreadSanitizer still instruments such functions to avoid false positives and
|
||||
provide meaningful stack traces.
|
||||
This attribute may not be
|
||||
supported by other compilers, so we suggest to use it together with
|
||||
``__has_feature(thread_sanitizer)``.
|
||||
Some code should not be instrumented by ThreadSanitizer. One may use the
|
||||
function attribute `no_sanitize_thread` to disable instrumentation of plain
|
||||
(non-atomic) loads/stores in a particular function. ThreadSanitizer still
|
||||
instruments such functions to avoid false positives and provide meaningful stack
|
||||
traces. This attribute may not be supported by other compilers, so we suggest
|
||||
to use it together with ``__has_feature(thread_sanitizer)``.
|
||||
|
||||
Blacklist
|
||||
---------
|
||||
|
||||
ThreadSanitizer supports ``src`` and ``fun`` entity types in
|
||||
:doc:`SanitizerSpecialCaseList`, that can be used to suppress data race reports in
|
||||
the specified source files or functions. Unlike functions marked with
|
||||
:ref:`no_sanitize_thread <langext-thread_sanitizer>` attribute,
|
||||
blacklisted functions are not instrumented at all. This can lead to false positives
|
||||
due to missed synchronization via atomic operations and missed stack frames in reports.
|
||||
:doc:`SanitizerSpecialCaseList`, that can be used to suppress data race reports
|
||||
in the specified source files or functions. Unlike functions marked with
|
||||
`no_sanitize_thread` attribute, blacklisted functions are not instrumented at
|
||||
all. This can lead to false positives due to missed synchronization via atomic
|
||||
operations and missed stack frames in reports.
|
||||
|
||||
Limitations
|
||||
-----------
|
||||
|
||||
Reference in New Issue
Block a user