diff options
author | Richard Leach <richardleach@users.noreply.github.com> | 2020-06-03 22:28:14 +0100 |
---|---|---|
committer | Karl Williamson <khw@cpan.org> | 2020-06-03 17:59:18 -0600 |
commit | 53b3ccc999480996153a80c5411dcbd9d109262a (patch) | |
tree | f50ed18dd5d3b61ff917620f6c1a6ddd79296458 | |
parent | fe34d5041acc644bca5368a5089f858196ad2491 (diff) | |
download | perl-53b3ccc999480996153a80c5411dcbd9d109262a.tar.gz |
perlhacktips.pod - don't explicitly list supported ASan combinations
As suggested in #16910
-rw-r--r-- | pod/perlhacktips.pod | 9 |
1 files changed, 4 insertions, 5 deletions
diff --git a/pod/perlhacktips.pod b/pod/perlhacktips.pod index 99caf25311..d66869f92b 100644 --- a/pod/perlhacktips.pod +++ b/pod/perlhacktips.pod @@ -1270,11 +1270,10 @@ To get valgrind and for more information see =head2 AddressSanitizer AddressSanitizer ("ASan") consists of a compiler instrumentation module -and a run-time C<malloc> library. AddressSanitizer is available for -Linux, Mac OS X and Windows. Specifically, it has been included in clang -since v3.1, gcc since v4.8, and Visual Studio 2019 since v16.1. It checks -for unsafe memory usage, such as use after free and buffer overflow -conditions, and is fast enough that you can easily compile your +and a run-time C<malloc> library. ASan is available for a variety of +architectures, operating systems, and compilers (see project link below). +It checks for unsafe memory usage, such as use after free and buffer +overflow conditions, and is fast enough that you can easily compile your debugging or optimized perl with it. Modern versions of ASan check for memory leaks by default on most platforms, otherwise (e.g. x86_64 OS X) this feature can be enabled via C<ASAN_OPTIONS=detect_leaks=1>. |