* [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902)
@ 2017-09-01 11:19 Jakub Jelinek
2017-09-01 12:31 ` Richard Biener
0 siblings, 1 reply; 2+ messages in thread
From: Jakub Jelinek @ 2017-09-01 11:19 UTC (permalink / raw)
To: Richard Biener; +Cc: gcc-patches
Hi!
Martin Sebor reported I forgot to document this new sanitizer option.
Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok for
trunk?
2017-09-01 Jakub Jelinek <jakub@redhat.com>
PR sanitizer/81902
* doc/invoke.texi: Document -fsanitize=pointer-overflow.
--- gcc/doc/invoke.texi.jj 2017-08-29 19:03:08.000000000 +0200
+++ gcc/doc/invoke.texi 2017-08-29 20:30:36.563053682 +0200
@@ -11074,6 +11074,12 @@ This option enables instrumentation of C
accesses and some conversions between pointers to base and derived classes,
to verify the referenced object has the correct dynamic type.
+@item -fsanitize=pointer-overflow
+@opindex fsanitize=pointer-overflow
+
+This option enables instrumentation of pointer arithmetics. If the pointer
+arithmetics overflows, a run-time error is issued.
+
@end table
While @option{-ftrapv} causes traps for signed overflows to be emitted,
Jakub
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902)
2017-09-01 11:19 [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902) Jakub Jelinek
@ 2017-09-01 12:31 ` Richard Biener
0 siblings, 0 replies; 2+ messages in thread
From: Richard Biener @ 2017-09-01 12:31 UTC (permalink / raw)
To: Jakub Jelinek; +Cc: gcc-patches
On September 1, 2017 1:19:34 PM GMT+02:00, Jakub Jelinek <jakub@redhat.com> wrote:
>Hi!
>
>Martin Sebor reported I forgot to document this new sanitizer option.
>Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok
>for
>trunk?
OK. Also do a changes. HTML entry?
Richard.
>2017-09-01 Jakub Jelinek <jakub@redhat.com>
>
> PR sanitizer/81902
> * doc/invoke.texi: Document -fsanitize=pointer-overflow.
>
>--- gcc/doc/invoke.texi.jj 2017-08-29 19:03:08.000000000 +0200
>+++ gcc/doc/invoke.texi 2017-08-29 20:30:36.563053682 +0200
>@@ -11074,6 +11074,12 @@ This option enables instrumentation of C
>accesses and some conversions between pointers to base and derived
>classes,
> to verify the referenced object has the correct dynamic type.
>
>+@item -fsanitize=pointer-overflow
>+@opindex fsanitize=pointer-overflow
>+
>+This option enables instrumentation of pointer arithmetics. If the
>pointer
>+arithmetics overflows, a run-time error is issued.
>+
> @end table
>
>While @option{-ftrapv} causes traps for signed overflows to be emitted,
>
> Jakub
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2017-09-01 12:31 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-09-01 11:19 [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902) Jakub Jelinek
2017-09-01 12:31 ` Richard Biener
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).