Commit 6c841832 by Martin Liska Committed by Martin Liska

Document options that can't be combined with -fcheck-pointer-bounds.

2017-03-14  Martin Liska  <mliska@suse.cz>

	* doc/invoke.texi: Document options that can't be combined with
	-fcheck-pointer-bounds.

From-SVN: r246130
parent 54d5850a
2017-03-14 Martin Liska <mliska@suse.cz> 2017-03-14 Martin Liska <mliska@suse.cz>
* doc/invoke.texi: Document options that can't be combined with
-fcheck-pointer-bounds.
2017-03-14 Martin Liska <mliska@suse.cz>
PR middle-end/79831 PR middle-end/79831
* doc/invoke.texi (-Wchkp): Document the option. * doc/invoke.texi (-Wchkp): Document the option.
......
...@@ -10733,12 +10733,14 @@ more details. The run-time behavior can be influenced using the ...@@ -10733,12 +10733,14 @@ more details. The run-time behavior can be influenced using the
the available options are shown at startup of the instrumented program. See the available options are shown at startup of the instrumented program. See
@url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags} @url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags}
for a list of supported options. for a list of supported options.
The option can't be combined with @option{-fsanitize=thread}. The option can't be combined with @option{-fsanitize=thread}
and/or @option{-fcheck-pointer-bounds}.
@item -fsanitize=kernel-address @item -fsanitize=kernel-address
@opindex fsanitize=kernel-address @opindex fsanitize=kernel-address
Enable AddressSanitizer for Linux kernel. Enable AddressSanitizer for Linux kernel.
See @uref{https://github.com/google/kasan/wiki} for more details. See @uref{https://github.com/google/kasan/wiki} for more details.
The option can't be combined with @option{-fcheck-pointer-bounds}.
@item -fsanitize=thread @item -fsanitize=thread
@opindex fsanitize=thread @opindex fsanitize=thread
...@@ -10749,8 +10751,8 @@ details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS} ...@@ -10749,8 +10751,8 @@ details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS}
environment variable; see environment variable; see
@url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of @url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of
supported options. supported options.
The option can't be combined with @option{-fsanitize=address} The option can't be combined with @option{-fsanitize=address},
and/or @option{-fsanitize=leak}. @option{-fsanitize=leak} and/or @option{-fcheck-pointer-bounds}.
@item -fsanitize=leak @item -fsanitize=leak
@opindex fsanitize=leak @opindex fsanitize=leak
...@@ -10839,13 +10841,15 @@ a++; ...@@ -10839,13 +10841,15 @@ a++;
This option enables instrumentation of array bounds. Various out of bounds This option enables instrumentation of array bounds. Various out of bounds
accesses are detected. Flexible array members, flexible array member-like accesses are detected. Flexible array members, flexible array member-like
arrays, and initializers of variables with static storage are not instrumented. arrays, and initializers of variables with static storage are not instrumented.
The option can't be combined with @option{-fcheck-pointer-bounds}.
@item -fsanitize=bounds-strict @item -fsanitize=bounds-strict
@opindex fsanitize=bounds-strict @opindex fsanitize=bounds-strict
This option enables strict instrumentation of array bounds. Most out of bounds This option enables strict instrumentation of array bounds. Most out of bounds
accesses are detected, including flexible array members and flexible array accesses are detected, including flexible array members and flexible array
member-like arrays. Initializers of variables with static storage are not member-like arrays. Initializers of variables with static storage are not
instrumented. instrumented. The option can't be combined
with @option{-fcheck-pointer-bounds}.
@item -fsanitize=alignment @item -fsanitize=alignment
@opindex fsanitize=alignment @opindex fsanitize=alignment
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment