public inbox for gcc-patches@gcc.gnu.org
 help / color / mirror / Atom feed
* [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902)
@ 2017-09-01 11:19 Jakub Jelinek
  2017-09-01 12:31 ` Richard Biener
  0 siblings, 1 reply; 2+ messages in thread
From: Jakub Jelinek @ 2017-09-01 11:19 UTC (permalink / raw)
  To: Richard Biener; +Cc: gcc-patches

Hi!

Martin Sebor reported I forgot to document this new sanitizer option.
Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok for
trunk?

2017-09-01  Jakub Jelinek  <jakub@redhat.com>

	PR sanitizer/81902
	* doc/invoke.texi: Document -fsanitize=pointer-overflow.

--- gcc/doc/invoke.texi.jj	2017-08-29 19:03:08.000000000 +0200
+++ gcc/doc/invoke.texi	2017-08-29 20:30:36.563053682 +0200
@@ -11074,6 +11074,12 @@ This option enables instrumentation of C
 accesses and some conversions between pointers to base and derived classes,
 to verify the referenced object has the correct dynamic type.
 
+@item -fsanitize=pointer-overflow
+@opindex fsanitize=pointer-overflow
+
+This option enables instrumentation of pointer arithmetics.  If the pointer
+arithmetics overflows, a run-time error is issued.
+
 @end table
 
 While @option{-ftrapv} causes traps for signed overflows to be emitted,

	Jakub

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902)
  2017-09-01 11:19 [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902) Jakub Jelinek
@ 2017-09-01 12:31 ` Richard Biener
  0 siblings, 0 replies; 2+ messages in thread
From: Richard Biener @ 2017-09-01 12:31 UTC (permalink / raw)
  To: Jakub Jelinek; +Cc: gcc-patches

On September 1, 2017 1:19:34 PM GMT+02:00, Jakub Jelinek <jakub@redhat.com> wrote:
>Hi!
>
>Martin Sebor reported I forgot to document this new sanitizer option.
>Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok
>for
>trunk?

OK. Also do a changes. HTML entry? 

Richard. 

>2017-09-01  Jakub Jelinek  <jakub@redhat.com>
>
>	PR sanitizer/81902
>	* doc/invoke.texi: Document -fsanitize=pointer-overflow.
>
>--- gcc/doc/invoke.texi.jj	2017-08-29 19:03:08.000000000 +0200
>+++ gcc/doc/invoke.texi	2017-08-29 20:30:36.563053682 +0200
>@@ -11074,6 +11074,12 @@ This option enables instrumentation of C
>accesses and some conversions between pointers to base and derived
>classes,
> to verify the referenced object has the correct dynamic type.
> 
>+@item -fsanitize=pointer-overflow
>+@opindex fsanitize=pointer-overflow
>+
>+This option enables instrumentation of pointer arithmetics.  If the
>pointer
>+arithmetics overflows, a run-time error is issued.
>+
> @end table
> 
>While @option{-ftrapv} causes traps for signed overflows to be emitted,
>
>	Jakub

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2017-09-01 12:31 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-09-01 11:19 [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902) Jakub Jelinek
2017-09-01 12:31 ` Richard Biener

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).