rust/library/std
Matthias Krüger 9746ac5c2f
Rollup merge of #138002 - 1c3t3a:fix-std-cfi-violation, r=rcvalle
Disable CFI for weakly linked syscalls

Currently, when enabling CFI via -Zsanitizer=cfi and executing e.g. std::sys::random::getrandom, we can observe a CFI violation. This is the case for all consumers of the std::sys::pal::weak::syscall macro, as it is defining weak functions which don't show up in LLVM IR metadata. CFI fails for all these functions.

Similar to other such cases in
https://github.com/rust-lang/rust/issues/115199, this change stops emitting the CFI typecheck for consumers of the macro via the `#[no_sanitize(cfi)]` attribute.

r? ``````@rcvalle``````
2025-03-11 19:35:28 +01:00
..
benches Fix import in bench for wasm 2025-02-12 14:44:30 -08:00
src Rollup merge of #138002 - 1c3t3a:fix-std-cfi-violation, r=rcvalle 2025-03-11 19:35:28 +01:00
tests std: Apply deprecated_safe_2024 2025-02-13 13:10:28 -08:00
build.rs Rollup merge of #137674 - heiher:enable-f16-loong, r=tgross35 2025-03-07 10:12:43 +01:00
Cargo.toml Update hermit-abi to 0.5.0 2025-03-09 15:38:29 -07:00