|
1 | 1 | ---
|
2 | 2 | title: "AddressSanitizer"
|
3 | 3 | description: "Top-level description of the AddressSanitizer feature for Microsoft C/C++."
|
4 |
| -ms.date: 06/13/2023 |
| 4 | +ms.date: 09/06/2024 |
5 | 5 | f1_keywords: ["AddressSanitizer"]
|
6 | 6 | helpviewer_keywords: ["ASan", "AddressSanitizer", "Address Sanitizer", "compiling for AddressSanitizer"]
|
7 | 7 | ---
|
@@ -77,10 +77,10 @@ Microsoft recommends you use AddressSanitizer in these three standard workflows:
|
77 | 77 | - [Azure OneFuzz](https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/)
|
78 | 78 | - Local Machine
|
79 | 79 |
|
80 |
| -This article covers the information you require to enable the three workflows listed previously. The information is specific to the **platform-dependent** Windows 10 implementation of AddressSanitizer. This documentation supplements the excellent documentation from [Google, Apple, and GCC](#external-docs) already published. |
| 80 | +This article covers the information you require to enable the three workflows listed previously. The information is specific to the **platform-dependent** Windows 10 (and later) implementation of AddressSanitizer. This documentation supplements the excellent documentation from [Google, Apple, and GCC](#external-docs) already published. |
81 | 81 |
|
82 | 82 | > [!NOTE]
|
83 |
| -> Current support is limited to x86 and x64 on Windows 10. [Send us feedback](https://aka.ms/vsfeedback/browsecpp) on what you'd like to see in future releases. Your feedback helps us prioritize other sanitizers for the future, such as **`/fsanitize=thread`**, **`/fsanitize=leak`**, **`/fsanitize=memory`**, **`/fsanitize=undefined`**, or **`/fsanitize=hwaddress`**. You can [report bugs here](https://aka.ms/feedback/report?space=62) if you run into issues. |
| 83 | +> Support is limited to x86 and x64 on Windows 10 and later. [Send us feedback](https://aka.ms/vsfeedback/browsecpp) on what you'd like to see in future releases. Your feedback helps us prioritize other sanitizers for the future, such as **`/fsanitize=thread`**, **`/fsanitize=leak`**, **`/fsanitize=memory`**, **`/fsanitize=undefined`**, or **`/fsanitize=hwaddress`**. You can [report bugs here](https://aka.ms/feedback/report?space=62) if you run into issues. |
84 | 84 |
|
85 | 85 | ## <a name="command-prompt"></a> Use AddressSanitizer from a developer command prompt
|
86 | 86 |
|
@@ -286,7 +286,7 @@ Extensive documentation already exists for these language and platform-dependent
|
286 | 286 | - [Apple](https://developer.apple.com/documentation/xcode/diagnosing_memory_thread_and_crash_issues_early)
|
287 | 287 | - [GCC](https://gcc.gnu.org/onlinedocs/gcc/Instrumentation-Options.html)
|
288 | 288 |
|
289 |
| -This seminal paper on the [AddressSanitizer](https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf) describes the implementation. |
| 289 | +This seminal paper on the [AddressSanitizer (external)](https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf) describes the implementation. |
290 | 290 |
|
291 | 291 | ## See also
|
292 | 292 |
|
|
0 commit comments