diff options
author | Uros Bizjak <ubizjak@gmail.com> | 2015-06-18 10:31:43 +0200 |
---|---|---|
committer | Uros Bizjak <uros@gcc.gnu.org> | 2015-06-18 10:31:43 +0200 |
commit | d38052e048a04a21beedcf61822f4a494be3a747 (patch) | |
tree | 02f1568535f6f67d46732a7c91752a14abf6a595 | |
parent | acd170827c34280bdf697b2bfc8ff584b745cbc4 (diff) | |
download | gcc-d38052e048a04a21beedcf61822f4a494be3a747.zip gcc-d38052e048a04a21beedcf61822f4a494be3a747.tar.gz gcc-d38052e048a04a21beedcf61822f4a494be3a747.tar.bz2 |
invoke.texi (-fsanitize-sections): Split @var to avoid "unlikely character , in @var" warning.
* doc/invoke.texi (-fsanitize-sections): Split @var to avoid
"unlikely character , in @var" warning.
From-SVN: r224596
-rw-r--r-- | gcc/ChangeLog | 5 | ||||
-rw-r--r-- | gcc/doc/invoke.texi | 4 |
2 files changed, 7 insertions, 2 deletions
diff --git a/gcc/ChangeLog b/gcc/ChangeLog index e710217..17e1c31 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,8 @@ +2015-06-18 Uros Bizjak <ubizjak@gmail.com> + + * doc/invoke.texi (-fsanitize-sections): Split @var to avoid + "unlikely character , in @var" warning. + 2015-06-17 Uros Bizjak <ubizjak@gmail.com> * config/i386/i386.c (ix86_function_arg): Nest TARGET_64BIT code. diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi index d8e982c..b99ab1c 100644 --- a/gcc/doc/invoke.texi +++ b/gcc/doc/invoke.texi @@ -303,7 +303,7 @@ Objective-C and Objective-C++ Dialects}. @xref{Debugging Options,,Options for Debugging Your Program or GCC}. @gccoptlist{-d@var{letters} -dumpspecs -dumpmachine -dumpversion @gol -fsanitize=@var{style} -fsanitize-recover -fsanitize-recover=@var{style} @gol --fasan-shadow-offset=@var{number} -fsanitize-sections=@var{s1,s2,...} @gol +-fasan-shadow-offset=@var{number} -fsanitize-sections=@var{s1},@var{s2},... @gol -fsanitize-undefined-trap-on-error @gol -fcheck-pointer-bounds -fchkp-check-incomplete-type @gol -fchkp-first-field-has-own-bounds -fchkp-narrow-bounds @gol @@ -5890,7 +5890,7 @@ This option forces GCC to use custom shadow offset in AddressSanitizer checks. It is useful for experimenting with different shadow memory layouts in Kernel AddressSanitizer. -@item -fsanitize-sections=@var{s1,s2,...} +@item -fsanitize-sections=@var{s1},@var{s2},... @opindex fsanitize-sections Sanitize global variables in selected user-defined sections. @var{si} may contain wildcards. |