diff options
author | burnus <burnus@138bc75d-0d04-0410-961f-82ee72b054a4> | 2015-09-25 18:41:07 +0000 |
---|---|---|
committer | burnus <burnus@138bc75d-0d04-0410-961f-82ee72b054a4> | 2015-09-25 18:41:07 +0000 |
commit | f8183c5bc1b9ddbadac4faa2779752921f270826 (patch) | |
tree | 6159f08c411b8a1a249905c65e2a1434a5241c4b | |
parent | b07d28879f94c779e20ee32cde9855068db3fa1b (diff) | |
download | gcc-f8183c5bc1b9ddbadac4faa2779752921f270826.tar.gz |
2015-09-25 Tobias Burnus <burnus@net-b.de>
* doc/invoke.texi (-fsanitize): Update URLs.
git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@228144 138bc75d-0d04-0410-961f-82ee72b054a4
-rw-r--r-- | gcc/ChangeLog | 4 | ||||
-rw-r--r-- | gcc/doc/invoke.texi | 17 |
2 files changed, 13 insertions, 8 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog index 11424466667..64840b181a2 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,7 @@ +2015-09-25 Tobias Burnus <burnus@net-b.de> + + * doc/invoke.texi (-fsanitize): Update URLs. + 2015-09-25 Teresa Johnson <tejohnson@google.com> * opts.c (finish_options): Unset -freorder-blocks-and-partition diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 19413cf5af9..d4260d88268 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -5857,25 +5857,26 @@ many times it is given. This is mainly intended to be used with Enable AddressSanitizer, a fast memory error detector. Memory access instructions are instrumented to detect out-of-bounds and use-after-free bugs. -See @uref{http://code.google.com/p/address-sanitizer/} for +See @uref{https://github.com/google/sanitizers/wiki/AddressSanitizer} for more details. The run-time behavior can be influenced using the -@env{ASAN_OPTIONS} environment variable; see -@url{https://code.google.com/p/address-sanitizer/wiki/Flags#Run-time_flags} for -a list of supported options. +@env{ASAN_OPTIONS} environment variable. When setting it to @code{help=1}, +the available options are shown at startup of the instrumended program. See +@url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags} +for a list of supported options. @item -fsanitize=kernel-address @opindex fsanitize=kernel-address Enable AddressSanitizer for Linux kernel. -See @uref{http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerForKernel} for more details. +See @uref{https://github.com/google/kasan/wiki} for more details. @item -fsanitize=thread @opindex fsanitize=thread Enable ThreadSanitizer, a fast data race detector. Memory access instructions are instrumented to detect -data race bugs. See @uref{http://code.google.com/p/thread-sanitizer/} for more +data race bugs. See @uref{https://github.com/google/sanitizers/wiki#threadsanitizer} for more details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS} environment variable; see -@url{https://code.google.com/p/thread-sanitizer/wiki/Flags} for a list of +@url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of supported options. @item -fsanitize=leak @@ -5885,7 +5886,7 @@ This option only matters for linking of executables and if neither @option{-fsanitize=address} nor @option{-fsanitize=thread} is used. In that case the executable is linked against a library that overrides @code{malloc} and other allocator functions. See -@uref{https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer} for more +@uref{https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer} for more details. The run-time behavior can be influenced using the @env{LSAN_OPTIONS} environment variable. |