Document options that can't be combined with -fcheck-pointer-bounds.
authorMartin Liska <mliska@suse.cz>
Tue, 14 Mar 2017 15:32:23 +0000 (16:32 +0100)
committerMartin Liska <marxin@gcc.gnu.org>
Tue, 14 Mar 2017 15:32:23 +0000 (15:32 +0000)
2017-03-14  Martin Liska  <mliska@suse.cz>

* doc/invoke.texi: Document options that can't be combined with
-fcheck-pointer-bounds.

From-SVN: r246130

gcc/ChangeLog
gcc/doc/invoke.texi

index 4a6c93cba6f758e20a8142f93a1d6ae9be130510..29987fe4ae94974395116c0ecf75848a961fea3a 100644 (file)
@@ -1,3 +1,8 @@
+2017-03-14  Martin Liska  <mliska@suse.cz>
+
+       * doc/invoke.texi: Document options that can't be combined with
+       -fcheck-pointer-bounds.
+
 2017-03-14  Martin Liska  <mliska@suse.cz>
 
        PR middle-end/79831
index 04ce03de28c1f5a3fb6f40a266c9ed07652a72cf..cda570d73ffa589bb9a81085cd02be8dc7ede312 100644 (file)
@@ -10733,12 +10733,14 @@ more details.  The run-time behavior can be influenced using the
 the available options are shown at startup of the instrumented program.  See
 @url{https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags}
 for a list of supported options.
-The option can't be combined with @option{-fsanitize=thread}.
+The option can't be combined with @option{-fsanitize=thread}
+and/or @option{-fcheck-pointer-bounds}.
 
 @item -fsanitize=kernel-address
 @opindex fsanitize=kernel-address
 Enable AddressSanitizer for Linux kernel.
 See @uref{https://github.com/google/kasan/wiki} for more details.
+The option can't be combined with @option{-fcheck-pointer-bounds}.
 
 @item -fsanitize=thread
 @opindex fsanitize=thread
@@ -10749,8 +10751,8 @@ details. The run-time behavior can be influenced using the @env{TSAN_OPTIONS}
 environment variable; see
 @url{https://github.com/google/sanitizers/wiki/ThreadSanitizerFlags} for a list of
 supported options.
-The option can't be combined with @option{-fsanitize=address}
-and/or @option{-fsanitize=leak}.
+The option can't be combined with @option{-fsanitize=address},
+@option{-fsanitize=leak} and/or @option{-fcheck-pointer-bounds}.
 
 @item -fsanitize=leak
 @opindex fsanitize=leak
@@ -10839,13 +10841,15 @@ a++;
 This option enables instrumentation of array bounds.  Various out of bounds
 accesses are detected.  Flexible array members, flexible array member-like
 arrays, and initializers of variables with static storage are not instrumented.
+The option can't be combined with @option{-fcheck-pointer-bounds}.
 
 @item -fsanitize=bounds-strict
 @opindex fsanitize=bounds-strict
 This option enables strict instrumentation of array bounds.  Most out of bounds
 accesses are detected, including flexible array members and flexible array
 member-like arrays.  Initializers of variables with static storage are not
-instrumented.
+instrumented.  The option can't be combined
+with @option{-fcheck-pointer-bounds}.
 
 @item -fsanitize=alignment
 @opindex fsanitize=alignment