http://gcc.gnu.org/bugzilla/show_bug.cgi?id=59257
Manuel López-Ibáñez <manu at gcc dot gnu.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |manu at gcc dot gnu.org --- Comment #2 from Manuel López-Ibáñez <manu at gcc dot gnu.org> --- (In reply to Tobias Burnus from comment #1) > (In reply to Tobias Burnus from comment #0) > > *<-fsanitize=shift> > > This option enables checking that the result of a > > The < > look odd. > > @item @option{-fsanitize=shift} > > Maybe there shouldn't be an @option{}? > > Testing shows that it won't help for "man" but makes the string no longer > bold. Seems as if one has to live with it. Can you try with the following (plus your opindex fixes)? Index: gcc/doc/invoke.texi =================================================================== --- gcc/doc/invoke.texi (revision 205090) +++ gcc/doc/invoke.texi (working copy) @@ -5274,39 +5274,39 @@ Various computations will be instrumented to detect undefined behavior at runtime. Current suboptions are: -@itemize @bullet +@table @gcctabopt -@item @option{-fsanitize=shift} +@item -fsanitize=shift This option enables checking that the result of a shift operation is not undefined. Note that what exactly is considered undefined differs slightly between C and C++, as well as between ISO C90 and C99, etc. -@item @option{-fsanitize=integer-divide-by-zero} +@item -fsanitize=integer-divide-by-zero Detect integer division by zero as well as @code{INT_MIN / -1} division. -@item @option{-fsanitize=unreachable} +@item -fsanitize=unreachable With this option, the compiler will turn the @code{__builtin_unreachable} call into a diagnostics message call instead. When reaching the @code{__builtin_unreachable} call, the behavior is undefined. -@item @option{-fsanitize=vla-bound} +@item -fsanitize=vla-bound This option instructs the compiler to check that the size of a variable length array is positive. This option does not have any effect in @option{-std=c++1y} mode, as the standard requires the exception be thrown instead. -@item @option{-fsanitize=null} +@item -fsanitize=null This option enables pointer checking. Particularly, the application built with this option turned on will issue an error message when it tries to dereference a NULL pointer, or if a reference (possibly an rvalue reference) is bound to a NULL pointer. -@end itemize +@end table While @option{-ftrapv} causes traps for signed overflows to be emitted, @option{-fsanitize=undefined} gives a diagnostic message.