Skip to content

Tracking Issue for -Zsanitize-kcfi-arity #138311

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
1 task done
ojeda opened this issue Mar 10, 2025 · 3 comments
Open
1 task done

Tracking Issue for -Zsanitize-kcfi-arity #138311

ojeda opened this issue Mar 10, 2025 · 3 comments
Assignees
Labels
A-control-flow-integrity Area: Control Flow Integrity (CFI) security mitigation A-rust-for-linux Relevant for the Rust-for-Linux project A-sanitizers Area: Sanitizers for correctness and code quality C-tracking-issue Category: An issue tracking the progress of sth. like the implementation of an RFC PG-exploit-mitigations Project group: Exploit mitigations T-compiler Relevant to the compiler team, which will review and decide on the PR/issue.

Comments

@ojeda
Copy link
Contributor

ojeda commented Mar 10, 2025

This is a tracking issue for the unstable -Zsanitize-kcfi-arity compiler flag.

i.e. the equivalent of Clang's -fsanitize-kcfi-arity.

https://clang.llvm.org/docs/ControlFlowIntegrity.html#fsanitize-kcfi-arity
https://lore.kernel.org/lkml/[email protected]/

Cc @rcvalle @maurer @samitolvanen @Darksonn
@rustbot label A-rust-for-linux

About tracking issues

Tracking issues are used to record the overall progress of implementation. They are also used as hubs connecting to other relevant issues, e.g., bugs or open design questions. A tracking issue is however not meant for large scale discussion, questions, or bug reports about a feature. Instead, open a dedicated issue for the specific matter and add the relevant feature gate label. Discussion comments will get marked as off-topic or deleted. Repeated discussions on the tracking issue may lead to the tracking issue getting locked.

Implementation history

@rustbot rustbot added needs-triage This issue may need triage. Remove it if it has been sufficiently triaged. A-rust-for-linux Relevant for the Rust-for-Linux project labels Mar 10, 2025
@jieyouxu jieyouxu added C-feature-request Category: A feature request, i.e: not implemented / a PR. A-sanitizers Area: Sanitizers for correctness and code quality T-compiler Relevant to the compiler team, which will review and decide on the PR/issue. and removed needs-triage This issue may need triage. Remove it if it has been sufficiently triaged. labels Mar 10, 2025
@rcvalle rcvalle changed the title -Csanitize-kcfi-arity support in rustc KCFI: -Csanitize-kcfi-arity support in rustc Mar 11, 2025
@rcvalle rcvalle added PG-exploit-mitigations Project group: Exploit mitigations A-control-flow-integrity Area: Control Flow Integrity (CFI) security mitigation labels Mar 11, 2025
@rcvalle
Copy link
Member

rcvalle commented Mar 11, 2025

@rustbot claim

rcvalle added a commit to rcvalle/rust that referenced this issue Apr 5, 2025
matthiaskrgr added a commit to matthiaskrgr/rust that referenced this issue Apr 5, 2025
rust-timer added a commit to rust-lang-ci/rust that referenced this issue Apr 5, 2025
Rollup merge of rust-lang#138368 - rcvalle:rust-kcfi-arity, r=davidtwco

KCFI: Add KCFI arity indicator support

Adds KCFI arity indicator support to the Rust compiler (see rust-lang#138311, llvm/llvm-project#121070, and https://lore.kernel.org/lkml/CANiq72=3ghFxy8E=AU9p+0imFxKr5iU3sd0hVUXed5BA+KjdNQ@mail.gmail.com/).
@ojeda ojeda changed the title KCFI: -Csanitize-kcfi-arity support in rustc Tracking Issue for -Zsanitize-kcfi-arity Apr 5, 2025
@ojeda
Copy link
Contributor Author

ojeda commented Apr 5, 2025

@rustbot label C-tracking-issue

If the above does not work, could you (maybe @jieyouxu) change label it as a tracking issue? The flag was implemented, so I reused this issue. Thanks!

@rustbot rustbot added the C-tracking-issue Category: An issue tracking the progress of sth. like the implementation of an RFC label Apr 5, 2025
@ojeda
Copy link
Contributor Author

ojeda commented Apr 5, 2025

@rustbot label -C-feature-request

It seems I can, great :)

@rustbot rustbot removed the C-feature-request Category: A feature request, i.e: not implemented / a PR. label Apr 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-control-flow-integrity Area: Control Flow Integrity (CFI) security mitigation A-rust-for-linux Relevant for the Rust-for-Linux project A-sanitizers Area: Sanitizers for correctness and code quality C-tracking-issue Category: An issue tracking the progress of sth. like the implementation of an RFC PG-exploit-mitigations Project group: Exploit mitigations T-compiler Relevant to the compiler team, which will review and decide on the PR/issue.
Projects
None yet
Development

No branches or pull requests

4 participants