Hi! Martin Sebor reported I forgot to document this new sanitizer option. Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok for trunk?
2017-09-01 Jakub Jelinek <ja...@redhat.com> PR sanitizer/81902 * doc/invoke.texi: Document -fsanitize=pointer-overflow. --- gcc/doc/invoke.texi.jj 2017-08-29 19:03:08.000000000 +0200 +++ gcc/doc/invoke.texi 2017-08-29 20:30:36.563053682 +0200 @@ -11074,6 +11074,12 @@ This option enables instrumentation of C accesses and some conversions between pointers to base and derived classes, to verify the referenced object has the correct dynamic type. +@item -fsanitize=pointer-overflow +@opindex fsanitize=pointer-overflow + +This option enables instrumentation of pointer arithmetics. If the pointer +arithmetics overflows, a run-time error is issued. + @end table While @option{-ftrapv} causes traps for signed overflows to be emitted, Jakub