diff mbox

[ASAN/KSAN/TSAN,doc] Fix broken sanitizer links in docs/invoke.texi

Message ID 20150925083007.GA2462@physik.fu-berlin.de
State New
Headers show

Commit Message

Tobias Burnus Sept. 25, 2015, 8:30 a.m. UTC
Dear all,

the attached patch fixes the broken sanitizer links, coming from Google's
move from code.google.com to GitHub. I additionally added "help=1" to the
ASAN options as that shows the really supported options of the installed
ASAN library (the web page can be newer/older or just incomplete) and it
also works without internet access.

I intent to install it for GCC 6, 5 and 4.9.

Gerald: The gcc-4.8/changes.html is also affected. Does it make sense to
update the links there as well?

Comments, suggestions?

Cheers,

Tobias

Comments

Tobias Burnus Sept. 25, 2015, 7:04 p.m. UTC | #1
Tobias Burnus wrote:
> I intent to install it for GCC 6, 5 and 4.9.

I have now committed it to the trunk and the two branches - including a 
wording change (When setting it to -> When set to; plus adding a second 
space after the end-of-sentence period.)

Tobias
diff mbox

Patch

diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi
index 844d254..fc49bfe 100644
--- a/gcc/doc/invoke.texi
+++ b/gcc/doc/invoke.texi
@@ -5857,25 +5857,26 @@  many times it is given.  This is mainly intended to be used with
 Enable AddressSanitizer, a fast memory error detector.
 Memory access instructions are instrumented to detect
 out-of-bounds and use-after-free bugs.
-See @uref{http://code.google.com/p/address-sanitizer/} for
+See @uref{https://github.com/google/sanitizers/wiki/AddressSanitizer} for
 more details.  The run-time behavior can be influenced using the
-@env{ASAN_OPTIONS} environment variable; see
-@url{https://code.google.com/p/address-sanitizer/wiki/Flags#Run-time_flags} for
-a list of supported options.
+@env{ASAN_OPTIONS} environment variable. When setting it to @code{help=1},
+the available options are shown at startup of the instrumended program. See
+@url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags}
+for a list of supported options.
 
 @item -fsanitize=kernel-address
 @opindex fsanitize=kernel-address
 Enable AddressSanitizer for Linux kernel.
-See @uref{http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerForKernel} for more details.
+See @uref{https://github.com/google/kasan/wiki} for more details.
 
 @item -fsanitize=thread
 @opindex fsanitize=thread
 Enable ThreadSanitizer, a fast data race detector.
 Memory access instructions are instrumented to detect
-data race bugs.  See @uref{http://code.google.com/p/thread-sanitizer/} for more
+data race bugs.  See @uref{https://github.com/google/sanitizers/wiki#threadsanitizer} for more
 details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS}
 environment variable; see
-@url{https://code.google.com/p/thread-sanitizer/wiki/Flags} for a list of
+@url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of
 supported options.
 
 @item -fsanitize=leak
@@ -5885,7 +5886,7 @@  This option only matters for linking of executables and if neither
 @option{-fsanitize=address} nor @option{-fsanitize=thread} is used.  In that
 case the executable is linked against a library that overrides @code{malloc}
 and other allocator functions.  See
-@uref{https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer} for more
+@uref{https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer} for more
 details.  The run-time behavior can be influenced using the
 @env{LSAN_OPTIONS} environment variable.