aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMartin Liska <mliska@suse.cz>2017-03-14 16:32:23 +0100
committerMartin Liska <marxin@gcc.gnu.org>2017-03-14 15:32:23 +0000
commit6c841832df663667e5938de3ca0d8a6602920477 (patch)
tree32702e0177b2b95afb65dcdbcfdc962681155dd3
parent54d5850a75d560c456c34267fc34d05b5a27e1ca (diff)
downloadgcc-6c841832df663667e5938de3ca0d8a6602920477.zip
gcc-6c841832df663667e5938de3ca0d8a6602920477.tar.gz
gcc-6c841832df663667e5938de3ca0d8a6602920477.tar.bz2
Document options that can't be combined with -fcheck-pointer-bounds.
2017-03-14 Martin Liska <mliska@suse.cz> * doc/invoke.texi: Document options that can't be combined with -fcheck-pointer-bounds. From-SVN: r246130
-rw-r--r--gcc/ChangeLog5
-rw-r--r--gcc/doc/invoke.texi12
2 files changed, 13 insertions, 4 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog
index 4a6c93c..29987fe 100644
--- a/gcc/ChangeLog
+++ b/gcc/ChangeLog
@@ -1,5 +1,10 @@
2017-03-14 Martin Liska <mliska@suse.cz>
+ * doc/invoke.texi: Document options that can't be combined with
+ -fcheck-pointer-bounds.
+
+2017-03-14 Martin Liska <mliska@suse.cz>
+
PR middle-end/79831
* doc/invoke.texi (-Wchkp): Document the option.
diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi
index 04ce03d..cda570d 100644
--- a/gcc/doc/invoke.texi
+++ b/gcc/doc/invoke.texi
@@ -10733,12 +10733,14 @@ more details. The run-time behavior can be influenced using the
the available options are shown at startup of the instrumented program. See
@url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags}
for a list of supported options.
-The option can't be combined with @option{-fsanitize=thread}.
+The option can't be combined with @option{-fsanitize=thread}
+and/or @option{-fcheck-pointer-bounds}.
@item -fsanitize=kernel-address
@opindex fsanitize=kernel-address
Enable AddressSanitizer for Linux kernel.
See @uref{https://github.com/google/kasan/wiki} for more details.
+The option can't be combined with @option{-fcheck-pointer-bounds}.
@item -fsanitize=thread
@opindex fsanitize=thread
@@ -10749,8 +10751,8 @@ details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS}
environment variable; see
@url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of
supported options.
-The option can't be combined with @option{-fsanitize=address}
-and/or @option{-fsanitize=leak}.
+The option can't be combined with @option{-fsanitize=address},
+@option{-fsanitize=leak} and/or @option{-fcheck-pointer-bounds}.
@item -fsanitize=leak
@opindex fsanitize=leak
@@ -10839,13 +10841,15 @@ a++;
This option enables instrumentation of array bounds. Various out of bounds
accesses are detected. Flexible array members, flexible array member-like
arrays, and initializers of variables with static storage are not instrumented.
+The option can't be combined with @option{-fcheck-pointer-bounds}.
@item -fsanitize=bounds-strict
@opindex fsanitize=bounds-strict
This option enables strict instrumentation of array bounds. Most out of bounds
accesses are detected, including flexible array members and flexible array
member-like arrays. Initializers of variables with static storage are not
-instrumented.
+instrumented. The option can't be combined
+with @option{-fcheck-pointer-bounds}.
@item -fsanitize=alignment
@opindex fsanitize=alignment