public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug sanitizer/107374] New: Please expand the size of flag_sanitize to uint64_t
@ 2022-10-24  9:22 ashimida at linux dot alibaba.com
  2022-10-24  9:41 ` [Bug sanitizer/107374] " jakub at gcc dot gnu.org
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: ashimida at linux dot alibaba.com @ 2022-10-24  9:22 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107374

            Bug ID: 107374
           Summary: Please expand the size of flag_sanitize to uint64_t
           Product: gcc
           Version: 13.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: sanitizer
          Assignee: unassigned at gcc dot gnu.org
          Reporter: ashimida at linux dot alibaba.com
                CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org,
                    jakub at gcc dot gnu.org, kcc at gcc dot gnu.org, marxin at gcc dot gnu.org
  Target Milestone: ---

Currently, the size of flag_sanitize is 32 bits, and new options
such as -fsanitize=kcfi cannot be accommodated in sanitize_code.
Could it be scaled up to 64 bit?

Thanks, Dan.

Ref: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107048

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2023-03-31 10:39 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-10-24  9:22 [Bug sanitizer/107374] New: Please expand the size of flag_sanitize to uint64_t ashimida at linux dot alibaba.com
2022-10-24  9:41 ` [Bug sanitizer/107374] " jakub at gcc dot gnu.org
2022-10-24  9:51 ` ashimida at linux dot alibaba.com
2023-03-31 10:39 ` xry111 at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).