5ad7a646a5
This commit improves the LLVM Control Flow Integrity (CFI) support in the Rust compiler by providing forward-edge control flow protection for Rust-compiled code only by aggregating function pointers in groups identified by their return and parameter types. Forward-edge control flow protection for C or C++ and Rust -compiled code "mixed binaries" (i.e., for when C or C++ and Rust -compiled code share the same virtual address space) will be provided in later work as part of this project by identifying C char and integer type uses at the time types are encoded (see Type metadata in the design document in the tracking issue #89653). LLVM CFI can be enabled with -Zsanitizer=cfi and requires LTO (i.e., -Clto).
21 lines
470 B
TOML
21 lines
470 B
TOML
[package]
|
|
name = "rustc_symbol_mangling"
|
|
version = "0.0.0"
|
|
edition = "2021"
|
|
|
|
[lib]
|
|
doctest = false
|
|
|
|
[dependencies]
|
|
bitflags = "1.2.1"
|
|
tracing = "0.1"
|
|
punycode = "0.4.0"
|
|
rustc-demangle = "0.1.21"
|
|
|
|
rustc_span = { path = "../rustc_span" }
|
|
rustc_middle = { path = "../rustc_middle" }
|
|
rustc_hir = { path = "../rustc_hir" }
|
|
rustc_target = { path = "../rustc_target" }
|
|
rustc_data_structures = { path = "../rustc_data_structures" }
|
|
rustc_session = { path = "../rustc_session" }
|