On September 1, 2017 1:19:34 PM GMT+02:00, Jakub Jelinek <ja...@redhat.com> 
wrote:
>Hi!
>
>Martin Sebor reported I forgot to document this new sanitizer option.
>Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok
>for
>trunk?

OK. Also do a changes. HTML entry? 

Richard. 

>2017-09-01  Jakub Jelinek  <ja...@redhat.com>
>
>       PR sanitizer/81902
>       * doc/invoke.texi: Document -fsanitize=pointer-overflow.
>
>--- gcc/doc/invoke.texi.jj     2017-08-29 19:03:08.000000000 +0200
>+++ gcc/doc/invoke.texi        2017-08-29 20:30:36.563053682 +0200
>@@ -11074,6 +11074,12 @@ This option enables instrumentation of C
>accesses and some conversions between pointers to base and derived
>classes,
> to verify the referenced object has the correct dynamic type.
> 
>+@item -fsanitize=pointer-overflow
>+@opindex fsanitize=pointer-overflow
>+
>+This option enables instrumentation of pointer arithmetics.  If the
>pointer
>+arithmetics overflows, a run-time error is issued.
>+
> @end table
> 
>While @option{-ftrapv} causes traps for signed overflows to be emitted,
>
>       Jakub

Reply via email to