| Age | Commit message (Collapse) | Author | Lines | |
|---|---|---|---|---|
| 2025-03-11 | Rollup merge of #138002 - 1c3t3a:fix-std-cfi-violation, r=rcvalle | Matthias Krüger | -0/+14 | |
| Disable CFI for weakly linked syscalls Currently, when enabling CFI via -Zsanitizer=cfi and executing e.g. std::sys::random::getrandom, we can observe a CFI violation. This is the case for all consumers of the std::sys::pal::weak::syscall macro, as it is defining weak functions which don't show up in LLVM IR metadata. CFI fails for all these functions. Similar to other such cases in https://github.com/rust-lang/rust/issues/115199, this change stops emitting the CFI typecheck for consumers of the macro via the `#[no_sanitize(cfi)]` attribute. r? ``````@rcvalle`````` | ||||
| 2025-03-10 | Add comments for #[no_sanitize(cfi)] in stdlib | Bastian Kersting | -0/+2 | |
| 2025-03-10 | Disable CFI for weakly linked syscalls | Bastian Kersting | -0/+12 | |
| Currently, when enabling CFI via -Zsanitizer=cfi and executing e.g. std::sys::random::getrandom, we can observe a CFI violation. This is the case for all consumers of the std::sys::pal::weak::weak macro, as it is defining weak functions which don't show up in LLVM IR metadata. CFI fails for all these functions. Similar to other such cases in https://github.com/rust-lang/rust/issues/115199, this change stops emitting the CFI typecheck for consumers of the macro via the \#[no_sanitize(cfi)] attribute. | ||||
| 2025-03-09 | Support File::seek for Hermit | Thalia Archibald | -3/+3 | |
| 2025-03-08 | Move fs into sys | Thalia Archibald | -0/+7124 | |
