Add documentation for LLVM KCFI support (#1529)
This commit adds initial documentation for LLVM Kernel Control Flow Integrity (KCFI) support to the Rust compiler (see rust-lang/rust#105109 and rust-lang/rust#89653).
This commit is contained in:
parent
11c34c7a47
commit
44e95ec592
|
|
@ -9,6 +9,9 @@ The rustc compiler contains support for following sanitizers:
|
||||||
forward-edge control flow protection.
|
forward-edge control flow protection.
|
||||||
* [Hardware-assisted AddressSanitizer][clang-hwasan] a tool similar to
|
* [Hardware-assisted AddressSanitizer][clang-hwasan] a tool similar to
|
||||||
AddressSanitizer but based on partial hardware assistance.
|
AddressSanitizer but based on partial hardware assistance.
|
||||||
|
* [KernelControlFlowIntegrity][clang-kcfi] LLVM Kernel Control Flow Integrity
|
||||||
|
(KCFI) provides forward-edge control flow protection for operating systems
|
||||||
|
kernels.
|
||||||
* [LeakSanitizer][clang-lsan] a run-time memory leak detector.
|
* [LeakSanitizer][clang-lsan] a run-time memory leak detector.
|
||||||
* [MemorySanitizer][clang-msan] a detector of uninitialized reads.
|
* [MemorySanitizer][clang-msan] a detector of uninitialized reads.
|
||||||
* [ThreadSanitizer][clang-tsan] a fast data race detector.
|
* [ThreadSanitizer][clang-tsan] a fast data race detector.
|
||||||
|
|
@ -16,9 +19,9 @@ The rustc compiler contains support for following sanitizers:
|
||||||
## How to use the sanitizers?
|
## How to use the sanitizers?
|
||||||
|
|
||||||
To enable a sanitizer compile with `-Z sanitizer=...` option, where value is one
|
To enable a sanitizer compile with `-Z sanitizer=...` option, where value is one
|
||||||
of `address`, `cfi`, `hwaddress`, `leak`, `memory` or `thread`. For more details
|
of `address`, `cfi`, `hwaddress`, `kcfi`, `leak`, `memory` or `thread`. For more
|
||||||
on how to use sanitizers please refer to the sanitizer flag in [the unstable
|
details on how to use sanitizers please refer to the sanitizer flag in [the
|
||||||
book](https://doc.rust-lang.org/unstable-book/).
|
unstable book](https://doc.rust-lang.org/unstable-book/).
|
||||||
|
|
||||||
## How are sanitizers implemented in rustc?
|
## How are sanitizers implemented in rustc?
|
||||||
|
|
||||||
|
|
@ -109,6 +112,7 @@ To enable a sanitizer on a new target which is already supported by LLVM:
|
||||||
* [AddressSanitizer in Clang][clang-asan]
|
* [AddressSanitizer in Clang][clang-asan]
|
||||||
* [ControlFlowIntegrity in Clang][clang-cfi]
|
* [ControlFlowIntegrity in Clang][clang-cfi]
|
||||||
* [Hardware-assisted AddressSanitizer][clang-hwasan]
|
* [Hardware-assisted AddressSanitizer][clang-hwasan]
|
||||||
|
* [KernelControlFlowIntegrity in Clang][clang-kcfi]
|
||||||
* [LeakSanitizer in Clang][clang-lsan]
|
* [LeakSanitizer in Clang][clang-lsan]
|
||||||
* [MemorySanitizer in Clang][clang-msan]
|
* [MemorySanitizer in Clang][clang-msan]
|
||||||
* [ThreadSanitizer in Clang][clang-tsan]
|
* [ThreadSanitizer in Clang][clang-tsan]
|
||||||
|
|
@ -116,6 +120,7 @@ To enable a sanitizer on a new target which is already supported by LLVM:
|
||||||
[clang-asan]: https://clang.llvm.org/docs/AddressSanitizer.html
|
[clang-asan]: https://clang.llvm.org/docs/AddressSanitizer.html
|
||||||
[clang-cfi]: https://clang.llvm.org/docs/ControlFlowIntegrity.html
|
[clang-cfi]: https://clang.llvm.org/docs/ControlFlowIntegrity.html
|
||||||
[clang-hwasan]: https://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html
|
[clang-hwasan]: https://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html
|
||||||
|
[clang-kcfi]: https://clang.llvm.org/docs/ControlFlowIntegrity.html#fsanitize-kcfi
|
||||||
[clang-lsan]: https://clang.llvm.org/docs/LeakSanitizer.html
|
[clang-lsan]: https://clang.llvm.org/docs/LeakSanitizer.html
|
||||||
[clang-msan]: https://clang.llvm.org/docs/MemorySanitizer.html
|
[clang-msan]: https://clang.llvm.org/docs/MemorySanitizer.html
|
||||||
[clang-tsan]: https://clang.llvm.org/docs/ThreadSanitizer.html
|
[clang-tsan]: https://clang.llvm.org/docs/ThreadSanitizer.html
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue