From patchwork Tue Sep 1 01:04:06 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mike Frysinger X-Patchwork-Id: 512666 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 802D514056B for ; Tue, 1 Sep 2015 11:04:21 +1000 (AEST) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b=N0gul8YW; dkim-atps=neutral DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:subject:date:message-id; q=dns; s=default; b=I4tv6s7Ib0YovvM uig4J5Dmyk/vhpdaOd4HCgJu/2zyciF9wC6IRjgC03osN5gHoefWQt8wWpYgewuK 8/sRZxcfOszf59eiFmbeMPCLhxwXA1Q6fzbSSaumenJKdlG8UazR50Msek8Kf7It pZ5QKvqOqzoPp69iuY7+yUF7snTM= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:subject:date:message-id; s=default; bh=4VqEk18TpCjeM4NPpOjVL DKMR84=; b=N0gul8YWwRei080JmcFVduIrM+RmxAR3hoTlEDkBF2p4Atd20WxaQ NzNRduLWBml07k6Dte4AWQWRktuSCi2P63WsX2MSYCxBIeEGLt85kLSjxPaB1GVW J7Ub6Eu2FjPoypXOgW3vt7Ao2EspvXU4NdtqBBOuZfl/+O6tH8gYqE= Received: (qmail 14114 invoked by alias); 1 Sep 2015 01:04:13 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 14085 invoked by uid 89); 1 Sep 2015 01:04:11 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=AWL, BAYES_00, SPF_PASS, T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-HELO: smtp.gentoo.org Received: from smtp.gentoo.org (HELO smtp.gentoo.org) (140.211.166.183) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Tue, 01 Sep 2015 01:04:10 +0000 Received: from localhost.localdomain (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id 8FA3E34076D for ; Tue, 1 Sep 2015 01:04:08 +0000 (UTC) From: Mike Frysinger To: gcc-patches@gcc.gnu.org Subject: [PATCH] gcc: doc: add missing space in asan-stack desc Date: Mon, 31 Aug 2015 21:04:06 -0400 Message-Id: <1441069446-4572-1-git-send-email-vapier@gentoo.org> Committed as obvious. --- gcc/ChangeLog | 4 ++++ gcc/doc/invoke.texi | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/gcc/ChangeLog b/gcc/ChangeLog index fdc0209..2e7230b 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,7 @@ +2015-08-31 Mike Frysinger + + * doc/invoke.texi (asan-stack): Add space before option. + 2015-08-31 Marc Glisse * tree.h (zerop): New function. diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index c0ec0fd..101335e 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -10949,7 +10949,7 @@ To disable global objects protection use @option{--param asan-globals=0}. @item asan-stack Enable buffer overflow detection for stack objects. This kind of -protection is enabled by default when using@option{-fsanitize=address}. +protection is enabled by default when using @option{-fsanitize=address}. To disable stack protection use @option{--param asan-stack=0} option. @item asan-instrument-reads