Commit d38052e0 by Uros Bizjak Committed by Uros Bizjak

invoke.texi (-fsanitize-sections): Split @var to avoid "unlikely character , in @var" warning.

        * doc/invoke.texi (-fsanitize-sections): Split @var to avoid
        "unlikely character , in @var" warning.

From-SVN: r224596
parent acd17082
2015-06-18 Uros Bizjak <ubizjak@gmail.com>
* doc/invoke.texi (-fsanitize-sections): Split @var to avoid
"unlikely character , in @var" warning.
2015-06-17 Uros Bizjak <ubizjak@gmail.com> 2015-06-17 Uros Bizjak <ubizjak@gmail.com>
* config/i386/i386.c (ix86_function_arg): Nest TARGET_64BIT code. * config/i386/i386.c (ix86_function_arg): Nest TARGET_64BIT code.
......
...@@ -303,7 +303,7 @@ Objective-C and Objective-C++ Dialects}. ...@@ -303,7 +303,7 @@ Objective-C and Objective-C++ Dialects}.
@xref{Debugging Options,,Options for Debugging Your Program or GCC}. @xref{Debugging Options,,Options for Debugging Your Program or GCC}.
@gccoptlist{-d@var{letters} -dumpspecs -dumpmachine -dumpversion @gol @gccoptlist{-d@var{letters} -dumpspecs -dumpmachine -dumpversion @gol
-fsanitize=@var{style} -fsanitize-recover -fsanitize-recover=@var{style} @gol -fsanitize=@var{style} -fsanitize-recover -fsanitize-recover=@var{style} @gol
-fasan-shadow-offset=@var{number} -fsanitize-sections=@var{s1,s2,...} @gol -fasan-shadow-offset=@var{number} -fsanitize-sections=@var{s1},@var{s2},... @gol
-fsanitize-undefined-trap-on-error @gol -fsanitize-undefined-trap-on-error @gol
-fcheck-pointer-bounds -fchkp-check-incomplete-type @gol -fcheck-pointer-bounds -fchkp-check-incomplete-type @gol
-fchkp-first-field-has-own-bounds -fchkp-narrow-bounds @gol -fchkp-first-field-has-own-bounds -fchkp-narrow-bounds @gol
...@@ -5890,7 +5890,7 @@ This option forces GCC to use custom shadow offset in AddressSanitizer checks. ...@@ -5890,7 +5890,7 @@ This option forces GCC to use custom shadow offset in AddressSanitizer checks.
It is useful for experimenting with different shadow memory layouts in It is useful for experimenting with different shadow memory layouts in
Kernel AddressSanitizer. Kernel AddressSanitizer.
@item -fsanitize-sections=@var{s1,s2,...} @item -fsanitize-sections=@var{s1},@var{s2},...
@opindex fsanitize-sections @opindex fsanitize-sections
Sanitize global variables in selected user-defined sections. @var{si} may Sanitize global variables in selected user-defined sections. @var{si} may
contain wildcards. contain wildcards.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment