about summary refs log tree commit diff
path: root/compiler/rustc_parse/src
diff options
context:
space:
mode:
authorMatthias Krüger <matthias.krueger@famsik.de>2024-08-15 19:32:35 +0200
committerGitHub <noreply@github.com>2024-08-15 19:32:35 +0200
commit3075644a3db0e529e5e9e74cf5ea74a0a638d1fe (patch)
treeae613eb4851f8a4ca6b7a3f6d64dffb5a4f45508 /compiler/rustc_parse/src
parentd2b5aa6552c8acf67f38a2ad92062a32ec542f08 (diff)
parentb368dcb246c5aedb087034e0f62941d038799f38 (diff)
downloadrust-3075644a3db0e529e5e9e74cf5ea74a0a638d1fe.tar.gz
rust-3075644a3db0e529e5e9e74cf5ea74a0a638d1fe.zip
Rollup merge of #128348 - dingxiangfei2009:allow-shadow-call-stack-sanitizer, r=tmandry
Unconditionally allow shadow call-stack sanitizer for AArch64

It is possible to do so whenever `-Z fixed-x18` is applied.

cc ``@Darksonn`` for context

The reasoning is that, as soon as reservation on `x18` is forced through the flag `fixed-x18`, on AArch64 the option to instrument with [Shadow Call Stack sanitizer](https://clang.llvm.org/docs/ShadowCallStack.html) is then applicable regardless of the target configuration.

At the every least, we would like to relax the restriction on specifically `aarch64-unknonw-none`. For this option, we can include a documentation change saying that users of compiled objects need to ensure that they are linked to runtime with Shadow Call Stack instrumentation support.

Related: #121972
Diffstat (limited to 'compiler/rustc_parse/src')
0 files changed, 0 insertions, 0 deletions