about summary refs log tree commit diff
path: root/compiler/rustc_builtin_macros/src
diff options
context:
space:
mode:
authorBastian Kersting <bkersting@google.com>2025-03-04 14:31:03 +0000
committerBastian Kersting <bkersting@google.com>2025-03-10 08:51:04 +0000
commit02bb2d4410d4db07c40bed308f8ba0d2af28d069 (patch)
tree97fb3aef92817f4f48d15a852731e34ebc87d6b5 /compiler/rustc_builtin_macros/src
parent2c6a12ec44d0426c8939123c2f2cf27d2217de13 (diff)
downloadrust-02bb2d4410d4db07c40bed308f8ba0d2af28d069.tar.gz
rust-02bb2d4410d4db07c40bed308f8ba0d2af28d069.zip
Disable CFI for weakly linked syscalls
Currently, when enabling CFI via -Zsanitizer=cfi and executing e.g.
std::sys::random::getrandom, we can observe a CFI violation. This is
the case for all consumers of the std::sys::pal::weak::weak macro,
as it is defining weak functions which don't show up in LLVM IR
metadata. CFI fails for all these functions.

Similar to other such cases in
https://github.com/rust-lang/rust/issues/115199, this change stops
emitting the CFI typecheck for consumers of the macro via the
\#[no_sanitize(cfi)] attribute.
Diffstat (limited to 'compiler/rustc_builtin_macros/src')
0 files changed, 0 insertions, 0 deletions