diff options
| author | bors <bors@rust-lang.org> | 2020-06-08 20:10:07 +0000 |
|---|---|---|
| committer | bors <bors@rust-lang.org> | 2020-06-08 20:10:07 +0000 |
| commit | fd4b177aabb9749dfb562c48e47379cea81dc277 (patch) | |
| tree | 9fa5a5888e7b0c05aa9b798a43c471fd4e106a7f /src/test/ui/iterators/iter-sum-overflow-overflow-checks.rs | |
| parent | bc10b68e798477066d4b1ec4886a3b1cdc4feb7e (diff) | |
| parent | ea48f2e4da5c6b120c337466e55b307a26c189b2 (diff) | |
| download | rust-fd4b177aabb9749dfb562c48e47379cea81dc277.tar.gz rust-fd4b177aabb9749dfb562c48e47379cea81dc277.zip | |
Auto merge of #72655 - jethrogb:sgx-lvi-hardening, r=petrochenkov
Enable LVI hardening for x86_64-fortanix-unknown-sgx This implements mitigations for the Load Value Injection vulnerability (CVE-2020-0551) for the `x86_64-fortanix-unknown-sgx` target by enabling new LLVM passes. More information about LVI and mitigations may be found at https://software.intel.com/security-software-guidance/insights/deep-dive-load-value-injection. This PR unconditionally enables the mitigations for `x86_64-fortanix-unknown-sgx` since there is no available hardware that doesn't require the mitigations. This may be reconsidered in the future. * [x] This depends on https://github.com/rust-lang/compiler-builtins/pull/359/
Diffstat (limited to 'src/test/ui/iterators/iter-sum-overflow-overflow-checks.rs')
0 files changed, 0 insertions, 0 deletions
