diff options
| author | Bastian Kersting <bkersting@google.com> | 2025-03-04 14:31:03 +0000 |
|---|---|---|
| committer | Bastian Kersting <bkersting@google.com> | 2025-03-10 08:51:04 +0000 |
| commit | 02bb2d4410d4db07c40bed308f8ba0d2af28d069 (patch) | |
| tree | 97fb3aef92817f4f48d15a852731e34ebc87d6b5 /compiler/rustc_builtin_macros/src | |
| parent | 2c6a12ec44d0426c8939123c2f2cf27d2217de13 (diff) | |
| download | rust-02bb2d4410d4db07c40bed308f8ba0d2af28d069.tar.gz rust-02bb2d4410d4db07c40bed308f8ba0d2af28d069.zip | |
Disable CFI for weakly linked syscalls
Currently, when enabling CFI via -Zsanitizer=cfi and executing e.g. std::sys::random::getrandom, we can observe a CFI violation. This is the case for all consumers of the std::sys::pal::weak::weak macro, as it is defining weak functions which don't show up in LLVM IR metadata. CFI fails for all these functions. Similar to other such cases in https://github.com/rust-lang/rust/issues/115199, this change stops emitting the CFI typecheck for consumers of the macro via the \#[no_sanitize(cfi)] attribute.
Diffstat (limited to 'compiler/rustc_builtin_macros/src')
0 files changed, 0 insertions, 0 deletions
