004aa15b47
This commit adds cross-language LLVM Control Flow Integrity (CFI) support to the Rust compiler by adding the `-Zsanitizer-cfi-normalize-integers` option to be used with Clang `-fsanitize-cfi-icall-normalize-integers` for normalizing integer types (see https://reviews.llvm.org/D139395). It provides forward-edge control flow protection for C or C++ and Rust -compiled code "mixed binaries" (i.e., for when C or C++ and Rust -compiled code share the same virtual address space). For more information about LLVM CFI and cross-language LLVM CFI support for the Rust compiler, see design document in the tracking issue #89653. Cross-language LLVM CFI can be enabled with -Zsanitizer=cfi and -Zsanitizer-cfi-normalize-integers, and requires proper (i.e., non-rustc) LTO (i.e., -Clinker-plugin-lto).
49 lines
2.2 KiB
Rust
49 lines
2.2 KiB
Rust
// Verifies that user-defined CFI encoding for types are emitted.
|
|
//
|
|
// needs-sanitizer-cfi
|
|
// compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi
|
|
|
|
#![crate_type="lib"]
|
|
#![feature(cfi_encoding, extern_types)]
|
|
|
|
#[cfi_encoding = "3Foo"]
|
|
pub struct Type1(i32);
|
|
|
|
extern {
|
|
#[cfi_encoding = "3Bar"]
|
|
type Type2;
|
|
}
|
|
|
|
#[cfi_encoding = "3Baz"]
|
|
#[repr(transparent)]
|
|
pub struct Type3(i32);
|
|
|
|
pub fn foo0(_: Type1) { }
|
|
// CHECK: define{{.*}}foo0{{.*}}!type ![[TYPE0:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo1(_: Type1, _: Type1) { }
|
|
// CHECK: define{{.*}}foo1{{.*}}!type ![[TYPE1:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo2(_: Type1, _: Type1, _: Type1) { }
|
|
// CHECK: define{{.*}}foo2{{.*}}!type ![[TYPE2:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo3(_: *mut Type2) { }
|
|
// CHECK: define{{.*}}foo3{{.*}}!type ![[TYPE3:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo4(_: *mut Type2, _: *mut Type2) { }
|
|
// CHECK: define{{.*}}foo4{{.*}}!type ![[TYPE4:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo5(_: *mut Type2, _: *mut Type2, _: *mut Type2) { }
|
|
// CHECK: define{{.*}}foo5{{.*}}!type ![[TYPE5:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo6(_: *mut Type3) { }
|
|
// CHECK: define{{.*}}foo6{{.*}}!type ![[TYPE6:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo7(_: *mut Type3, _: *mut Type3) { }
|
|
// CHECK: define{{.*}}foo7{{.*}}!type ![[TYPE7:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
pub fn foo8(_: *mut Type3, _: *mut Type3, _: *mut Type3) { }
|
|
// CHECK: define{{.*}}foo8{{.*}}!type ![[TYPE8:[0-9]+]] !type !{{[0-9]+}} !type !{{[0-9]+}} !type !{{[0-9]+}}
|
|
|
|
// CHECK: ![[TYPE0]] = !{i64 0, !"_ZTSFv3FooE"}
|
|
// CHECK: ![[TYPE1]] = !{i64 0, !"_ZTSFv3FooS_E"}
|
|
// CHECK: ![[TYPE2]] = !{i64 0, !"_ZTSFv3FooS_S_E"}
|
|
// CHECK: ![[TYPE3]] = !{i64 0, !"_ZTSFvP3BarE"}
|
|
// CHECK: ![[TYPE4]] = !{i64 0, !"_ZTSFvP3BarS0_E"}
|
|
// CHECK: ![[TYPE5]] = !{i64 0, !"_ZTSFvP3BarS0_S0_E"}
|
|
// CHECK: ![[TYPE6]] = !{i64 0, !"_ZTSFvP3BazE"}
|
|
// CHECK: ![[TYPE7]] = !{i64 0, !"_ZTSFvP3BazS0_E"}
|
|
// CHECK: ![[TYPE8]] = !{i64 0, !"_ZTSFvP3BazS0_S0_E"}
|