]> git.ipfire.org Git - thirdparty/gcc.git/commitdiff
invoke.texi (-fsanitize): Update URLs.
authorTobias Burnus <burnus@net-b.de>
Fri, 25 Sep 2015 18:49:32 +0000 (20:49 +0200)
committerTobias Burnus <burnus@gcc.gnu.org>
Fri, 25 Sep 2015 18:49:32 +0000 (20:49 +0200)
2015-09-25  Tobias Burnus  <burnus@net-b.de>

* doc/invoke.texi (-fsanitize): Update URLs.

From-SVN: r228146

gcc/ChangeLog
gcc/doc/invoke.texi

index 69c3bce6394c45371ca6f7516c3c7ed93e449ca2..71eac58c748651d8f43b2af922f1d13264a4cc93 100644 (file)
@@ -1,3 +1,6 @@
+2015-09-25  Tobias Burnus  <burnus@net-b.de>
+
+       * doc/invoke.texi (-fsanitize): Update URLs.
 2015-09-21  Uros Bizjak  <ubizjak@gmail.com>
 
        PR middle-end/67619
index c9b86abd7fa74b107671f635680b616c908f05c4..23fe7df1372de9c1cb3052045d596f9c93c14f82 100644 (file)
@@ -5281,25 +5281,26 @@ many times it is given.  This is mainly intended to be used with
 Enable AddressSanitizer, a fast memory error detector.
 Memory access instructions will be instrumented to detect
 out-of-bounds and use-after-free bugs.
-See @uref{http://code.google.com/p/address-sanitizer/} for
+See @uref{https://github.com/google/sanitizers/wiki/AddressSanitizer} for
 more details.  The run-time behavior can be influenced using the
-@env{ASAN_OPTIONS} environment variable; see
-@url{https://code.google.com/p/address-sanitizer/wiki/Flags#Run-time_flags} for
-a list of supported options.
+@env{ASAN_OPTIONS} environment variable.  When set to @code{help=1},
+the available options are shown at startup of the instrumended program. See
+@url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags}
+for a list of supported options.
 
 @item -fsanitize=kernel-address
 @opindex fsanitize=kernel-address
 Enable AddressSanitizer for Linux kernel.
-See @uref{http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerForKernel} for more details.
+See @uref{https://github.com/google/sanitizers/wiki#threadsanitizer} for more details.
 
 @item -fsanitize=thread
 @opindex fsanitize=thread
 Enable ThreadSanitizer, a fast data race detector.
 Memory access instructions will be instrumented to detect
-data race bugs.  See @uref{http://code.google.com/p/thread-sanitizer/} for more
+data race bugs.  See @uref{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for more
 details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS}
 environment variable; see
-@url{https://code.google.com/p/thread-sanitizer/wiki/Flags} for a list of
+@url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of
 supported options.
 
 @item -fsanitize=leak
@@ -5309,7 +5310,7 @@ This option only matters for linking of executables and if neither
 @option{-fsanitize=address} nor @option{-fsanitize=thread} is used.  In that
 case it will link the executable against a library that overrides @code{malloc}
 and other allocator functions.  See
-@uref{https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer} for more
+@uref{https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer} for more
 details.  The run-time behavior can be influenced using the
 @env{LSAN_OPTIONS} environment variable.