diff options
| author | Matthias Krüger <matthias.krueger@famsik.de> | 2022-12-10 09:24:43 +0100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2022-12-10 09:24:43 +0100 |
| commit | 79f7b7b874e36c6f8aecad8c3351a88e92c1731e (patch) | |
| tree | 63c47c65f2a122c2d019f89bdf30f2b94dcaf431 /tests/mir-opt/lower_array_len.array_len.NormalizeArrayLen.panic-unwind.diff | |
| parent | 6181cb2929890000dc63a3b59e60ff62b98770f9 (diff) | |
| parent | d5f7c20ce569481b7b74e0932dea8528fe84509a (diff) | |
| download | rust-79f7b7b874e36c6f8aecad8c3351a88e92c1731e.tar.gz rust-79f7b7b874e36c6f8aecad8c3351a88e92c1731e.zip | |
Rollup merge of #105109 - rcvalle:rust-kcfi, r=bjorn3
Add LLVM KCFI support to the Rust compiler This PR adds LLVM Kernel Control Flow Integrity (KCFI) support to the Rust compiler. It initially provides forward-edge control flow protection for operating systems kernels for Rust-compiled code only by aggregating function pointers in groups identified by their return and parameter types. (See llvm/llvm-project@cff5bef.) Forward-edge control flow protection for C or C++ and Rust -compiled code "mixed binaries" (i.e., for when C or C++ and Rust -compiled code share the same virtual address space) will be provided in later work as part of this project by identifying C char and integer type uses at the time types are encoded (see Type metadata in the design document in the tracking issue #89653). LLVM KCFI can be enabled with -Zsanitizer=kcfi. Thank you again, `@bjorn3,` `@eddyb,` `@nagisa,` and `@ojeda,` for all the help!
Diffstat (limited to 'tests/mir-opt/lower_array_len.array_len.NormalizeArrayLen.panic-unwind.diff')
0 files changed, 0 insertions, 0 deletions
