On September 1, 2017 1:19:34 PM GMT+02:00, Jakub Jelinek <ja...@redhat.com> wrote: >Hi! > >Martin Sebor reported I forgot to document this new sanitizer option. >Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok >for >trunk?
OK. Also do a changes. HTML entry? Richard. >2017-09-01 Jakub Jelinek <ja...@redhat.com> > > PR sanitizer/81902 > * doc/invoke.texi: Document -fsanitize=pointer-overflow. > >--- gcc/doc/invoke.texi.jj 2017-08-29 19:03:08.000000000 +0200 >+++ gcc/doc/invoke.texi 2017-08-29 20:30:36.563053682 +0200 >@@ -11074,6 +11074,12 @@ This option enables instrumentation of C >accesses and some conversions between pointers to base and derived >classes, > to verify the referenced object has the correct dynamic type. > >+@item -fsanitize=pointer-overflow >+@opindex fsanitize=pointer-overflow >+ >+This option enables instrumentation of pointer arithmetics. If the >pointer >+arithmetics overflows, a run-time error is issued. >+ > @end table > >While @option{-ftrapv} causes traps for signed overflows to be emitted, > > Jakub