From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 127699 invoked by alias); 1 Sep 2017 12:31:03 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Received: (qmail 127106 invoked by uid 89); 1 Sep 2017 12:31:02 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-16.9 required=5.0 tests=BAYES_00,GIT_PATCH_1,GIT_PATCH_2,GIT_PATCH_3,RP_MATCHES_RCVD,SPF_PASS autolearn=ham version=3.3.2 spammy= X-HELO: mx1.suse.de Received: from mx2.suse.de (HELO mx1.suse.de) (195.135.220.15) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 01 Sep 2017 12:30:58 +0000 Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2ACE7AC0B; Fri, 1 Sep 2017 12:30:56 +0000 (UTC) Date: Fri, 01 Sep 2017 12:31:00 -0000 User-Agent: K-9 Mail for Android In-Reply-To: <20170901111934.GF2323@tucnak> References: <20170901111934.GF2323@tucnak> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: [PATCH] Document -fsanitize=pointer-overflow (PR sanitizer/81902) To: Jakub Jelinek CC: gcc-patches@gcc.gnu.org From: Richard Biener Message-ID: X-SW-Source: 2017-09/txt/msg00039.txt.bz2 On September 1, 2017 1:19:34 PM GMT+02:00, Jakub Jelinek = wrote: >Hi! > >Martin Sebor reported I forgot to document this new sanitizer option. >Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok >for >trunk? OK. Also do a changes. HTML entry?=20 Richard.=20 >2017-09-01 Jakub Jelinek > > PR sanitizer/81902 > * doc/invoke.texi: Document -fsanitize=3Dpointer-overflow. > >--- gcc/doc/invoke.texi.jj 2017-08-29 19:03:08.000000000 +0200 >+++ gcc/doc/invoke.texi 2017-08-29 20:30:36.563053682 +0200 >@@ -11074,6 +11074,12 @@ This option enables instrumentation of C >accesses and some conversions between pointers to base and derived >classes, > to verify the referenced object has the correct dynamic type. >=20 >+@item -fsanitize=3Dpointer-overflow >+@opindex fsanitize=3Dpointer-overflow >+ >+This option enables instrumentation of pointer arithmetics. If the >pointer >+arithmetics overflows, a run-time error is issued. >+ > @end table >=20 >While @option{-ftrapv} causes traps for signed overflows to be emitted, > > Jakub