[{"id":1761647,"web_url":"http://patchwork.ozlabs.org/comment/1761647/","msgid":"<DA241487-BFB1-4AE0-949E-06A7D9415B54@suse.de>","list_archive_url":null,"date":"2017-09-01T12:30:54","subject":"Re: [PATCH] Document -fsanitize=pointer-overflow (PR\n\tsanitizer/81902)","submitter":{"id":4338,"url":"http://patchwork.ozlabs.org/api/people/4338/","name":"Richard Biener","email":"rguenther@suse.de"},"content":"On September 1, 2017 1:19:34 PM GMT+02:00, Jakub Jelinek <jakub@redhat.com> wrote:\n>Hi!\n>\n>Martin Sebor reported I forgot to document this new sanitizer option.\n>Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok\n>for\n>trunk?\n\nOK. Also do a changes. HTML entry? \n\nRichard. \n\n>2017-09-01  Jakub Jelinek  <jakub@redhat.com>\n>\n>\tPR sanitizer/81902\n>\t* doc/invoke.texi: Document -fsanitize=pointer-overflow.\n>\n>--- gcc/doc/invoke.texi.jj\t2017-08-29 19:03:08.000000000 +0200\n>+++ gcc/doc/invoke.texi\t2017-08-29 20:30:36.563053682 +0200\n>@@ -11074,6 +11074,12 @@ This option enables instrumentation of C\n>accesses and some conversions between pointers to base and derived\n>classes,\n> to verify the referenced object has the correct dynamic type.\n> \n>+@item -fsanitize=pointer-overflow\n>+@opindex fsanitize=pointer-overflow\n>+\n>+This option enables instrumentation of pointer arithmetics.  If the\n>pointer\n>+arithmetics overflows, a run-time error is issued.\n>+\n> @end table\n> \n>While @option{-ftrapv} causes traps for signed overflows to be emitted,\n>\n>\tJakub","headers":{"Return-Path":"<gcc-patches-return-461277-incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","mailing list gcc-patches@gcc.gnu.org"],"Authentication-Results":["ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=gcc.gnu.org\n\t(client-ip=209.132.180.131; helo=sourceware.org;\n\tenvelope-from=gcc-patches-return-461277-incoming=patchwork.ozlabs.org@gcc.gnu.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (1024-bit key;\n\tunprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org\n\theader.b=\"iFYyquyE\"; dkim-atps=neutral","sourceware.org; auth=none"],"Received":["from sourceware.org (server1.sourceware.org [209.132.180.131])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xkJWL6kYgz9s7c\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri,  1 Sep 2017 22:31:10 +1000 (AEST)","(qmail 127699 invoked by alias); 1 Sep 2017 12:31:03 -0000","(qmail 127106 invoked by uid 89); 1 Sep 2017 12:31:02 -0000","from mx2.suse.de (HELO mx1.suse.de) (195.135.220.15) by\n\tsourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP;\n\tFri, 01 Sep 2017 12:30:58 +0000","from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254])\tby\n\tmx1.suse.de (Postfix) with ESMTP id 2ACE7AC0B;\n\tFri,  1 Sep 2017 12:30:56 +0000 (UTC)"],"DomainKey-Signature":"a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id\n\t:list-unsubscribe:list-archive:list-post:list-help:sender:date\n\t:in-reply-to:references:mime-version:content-type\n\t:content-transfer-encoding:subject:to:cc:from:message-id; q=dns;\n\ts=default; b=RAHejlJ8+dfo0vphLM7s/KcsjLrLJBFWsCPn26yfgpVN1LTZNi\n\th8wwquXcokiF8SU7TuTgB9rxId6Ta3zzHkn8ImRWICjvCnw8irxaPo29a1uF3pdM\n\t4d59eIrn+BhpGoAao7vbFPbi+ohqErdDjfOGJttm1p8SSFaUg49yoA8/E=","DKIM-Signature":"v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id\n\t:list-unsubscribe:list-archive:list-post:list-help:sender:date\n\t:in-reply-to:references:mime-version:content-type\n\t:content-transfer-encoding:subject:to:cc:from:message-id; s=\n\tdefault; bh=geBDEjHFet6DjOnBcRqqY8Y20K8=; b=iFYyquyEIxwCYxmG9v1l\n\tl6ZXtKszQWqQUyWIe4yEhQzXYlseVyARtyMoGEzvP5bLkzWqWRtxT9bHwMh0K0ka\n\tqtiJikxxK3hAYZSVxeJar4JOtzQNRQD3AgnpEYG5b8abVw5lOEaTWdYWmCLg0vxa\n\t1xfhdpJQqoMV6erMgwAlme4=","Mailing-List":"contact gcc-patches-help@gcc.gnu.org; run by ezmlm","Precedence":"bulk","List-Id":"<gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<mailto:gcc-patches-unsubscribe-incoming=patchwork.ozlabs.org@gcc.gnu.org>","List-Archive":"<http://gcc.gnu.org/ml/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-help@gcc.gnu.org>","Sender":"gcc-patches-owner@gcc.gnu.org","X-Virus-Found":"No","X-Spam-SWARE-Status":"No, score=-16.9 required=5.0 tests=BAYES_00, GIT_PATCH_1,\n\tGIT_PATCH_2, GIT_PATCH_3, RP_MATCHES_RCVD,\n\tSPF_PASS autolearn=ham version=3.3.2 spammy=","X-HELO":"mx1.suse.de","Date":"Fri, 01 Sep 2017 14:30:54 +0200","User-Agent":"K-9 Mail for Android","In-Reply-To":"<20170901111934.GF2323@tucnak>","References":"<20170901111934.GF2323@tucnak>","MIME-Version":"1.0","Content-Type":"text/plain; charset=utf-8","Content-Transfer-Encoding":"quoted-printable","Subject":"Re: [PATCH] Document -fsanitize=pointer-overflow (PR\n\tsanitizer/81902)","To":"Jakub Jelinek <jakub@redhat.com>","CC":"gcc-patches@gcc.gnu.org","From":"Richard Biener <rguenther@suse.de>","Message-ID":"<DA241487-BFB1-4AE0-949E-06A7D9415B54@suse.de>"}}]