diff options
author | Martin Liska <mliska@suse.cz> | 2017-03-14 16:32:23 +0100 |
---|---|---|
committer | Martin Liska <marxin@gcc.gnu.org> | 2017-03-14 15:32:23 +0000 |
commit | 6c841832df663667e5938de3ca0d8a6602920477 (patch) | |
tree | 32702e0177b2b95afb65dcdbcfdc962681155dd3 | |
parent | 54d5850a75d560c456c34267fc34d05b5a27e1ca (diff) | |
download | gcc-6c841832df663667e5938de3ca0d8a6602920477.zip gcc-6c841832df663667e5938de3ca0d8a6602920477.tar.gz gcc-6c841832df663667e5938de3ca0d8a6602920477.tar.bz2 |
Document options that can't be combined with -fcheck-pointer-bounds.
2017-03-14 Martin Liska <mliska@suse.cz>
* doc/invoke.texi: Document options that can't be combined with
-fcheck-pointer-bounds.
From-SVN: r246130
-rw-r--r-- | gcc/ChangeLog | 5 | ||||
-rw-r--r-- | gcc/doc/invoke.texi | 12 |
2 files changed, 13 insertions, 4 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog index 4a6c93c..29987fe 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,5 +1,10 @@ 2017-03-14 Martin Liska <mliska@suse.cz> + * doc/invoke.texi: Document options that can't be combined with + -fcheck-pointer-bounds. + +2017-03-14 Martin Liska <mliska@suse.cz> + PR middle-end/79831 * doc/invoke.texi (-Wchkp): Document the option. diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index 04ce03d..cda570d 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -10733,12 +10733,14 @@ more details. The run-time behavior can be influenced using the the available options are shown at startup of the instrumented program. See @url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags} for a list of supported options. -The option can't be combined with @option{-fsanitize=thread}. +The option can't be combined with @option{-fsanitize=thread} +and/or @option{-fcheck-pointer-bounds}. @item -fsanitize=kernel-address @opindex fsanitize=kernel-address Enable AddressSanitizer for Linux kernel. See @uref{https://github.com/google/kasan/wiki} for more details. +The option can't be combined with @option{-fcheck-pointer-bounds}. @item -fsanitize=thread @opindex fsanitize=thread @@ -10749,8 +10751,8 @@ details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS} environment variable; see @url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of supported options. -The option can't be combined with @option{-fsanitize=address} -and/or @option{-fsanitize=leak}. +The option can't be combined with @option{-fsanitize=address}, +@option{-fsanitize=leak} and/or @option{-fcheck-pointer-bounds}. @item -fsanitize=leak @opindex fsanitize=leak @@ -10839,13 +10841,15 @@ a++; This option enables instrumentation of array bounds. Various out of bounds accesses are detected. Flexible array members, flexible array member-like arrays, and initializers of variables with static storage are not instrumented. +The option can't be combined with @option{-fcheck-pointer-bounds}. @item -fsanitize=bounds-strict @opindex fsanitize=bounds-strict This option enables strict instrumentation of array bounds. Most out of bounds accesses are detected, including flexible array members and flexible array member-like arrays. Initializers of variables with static storage are not -instrumented. +instrumented. The option can't be combined +with @option{-fcheck-pointer-bounds}. @item -fsanitize=alignment @opindex fsanitize=alignment |