about summary refs log tree commit diff
path: root/src/test/ui/iterators/iter-sum-overflow-overflow-checks.rs
diff options
context:
space:
mode:
authorbors <bors@rust-lang.org>2020-06-08 20:10:07 +0000
committerbors <bors@rust-lang.org>2020-06-08 20:10:07 +0000
commitfd4b177aabb9749dfb562c48e47379cea81dc277 (patch)
tree9fa5a5888e7b0c05aa9b798a43c471fd4e106a7f /src/test/ui/iterators/iter-sum-overflow-overflow-checks.rs
parentbc10b68e798477066d4b1ec4886a3b1cdc4feb7e (diff)
parentea48f2e4da5c6b120c337466e55b307a26c189b2 (diff)
downloadrust-fd4b177aabb9749dfb562c48e47379cea81dc277.tar.gz
rust-fd4b177aabb9749dfb562c48e47379cea81dc277.zip
Auto merge of #72655 - jethrogb:sgx-lvi-hardening, r=petrochenkov
Enable LVI hardening for x86_64-fortanix-unknown-sgx

This implements mitigations for the Load Value Injection vulnerability (CVE-2020-0551) for the `x86_64-fortanix-unknown-sgx` target by enabling new LLVM passes. More information about LVI and mitigations may be found at https://software.intel.com/security-software-guidance/insights/deep-dive-load-value-injection.

This PR unconditionally enables the mitigations for `x86_64-fortanix-unknown-sgx` since there is no available hardware that doesn't require the mitigations. This may be reconsidered in the future.

* [x] This depends on https://github.com/rust-lang/compiler-builtins/pull/359/
Diffstat (limited to 'src/test/ui/iterators/iter-sum-overflow-overflow-checks.rs')
0 files changed, 0 insertions, 0 deletions