-
Notifications
You must be signed in to change notification settings - Fork 13k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use fastisel at -O0 #530
Comments
ghost
assigned espindola
Jun 21, 2011
done. |
keeperofdakeys
pushed a commit
to keeperofdakeys/rust
that referenced
this issue
Dec 12, 2017
Added baudrate constants. Addresses rust-lang#528, adding baudrate constants for `bsd` and `notbsd` flavors of `unix`. Passes `libc-test` locally on ubuntu 14.04 LTS with the additional (uncommitted) entries into in `build.rs`: ``` cfg.skip_const( move |name| { match name { # ... snip ... "PTRACE_O_SUSPEND_SECCOMP" | "CLONE_NEWCGROUP" | "NETLINK_LIST_MEMBERSHIPS" | "NETLINK_LISTEN_ALL_NSID" | "NETLINK_CAP_ACK" | "PR_CAP_AMBIENT_CLEAR_ALL" | "PR_CAP_AMBIENT_LOWER" | "PR_CAP_AMBIENT_RAISE" | "PR_CAP_AMBIENT_IS_SET" | "PR_CAP_AMBIENT" | "PR_FP_MODE_FRE" | "PR_FP_MODE_FR" | "PR_GET_FP_MODE" | "PR_SET_FP_MODE" | "PR_MPX_DISABLE_MANAGEMENT" | "PR_MPX_ENABLE_MANAGEMENT" | "PR_GET_THP_DISABLE" | "PR_SET_THP_DISABLE" | "PR_SET_MM_MAP_SIZE" | "PR_GET_MM_MAP_SIZE" | "PR_SET_MM_MAP" | "NLM_F_DUMP_FILTERED" | "EPOLLEXCLUSIVE" => true, _ => false, } }); ``` I'm assuming this is because I'm stuck using `linux-libc-dev:3.13.0-24.46` for the moment and those constants are defined in newer versions.
pdietl
pushed a commit
to pdietl/rust
that referenced
this issue
Apr 23, 2020
Remove "mode" from derive macro terminology.
ZuseZ4
pushed a commit
to EnzymeAD/rust
that referenced
this issue
Mar 7, 2023
GuillaumeGomez
added a commit
to GuillaumeGomez/rust
that referenced
this issue
Jan 9, 2024
…e_userspace_types_send, r=Nilstrieb,dtolnay Making `User<T>` and `User<[T]>` `Send` All `User` types in SGX point to owned memory in userspace. Special care is always needed when accessing this memory as it must be assumed that an attacker is always able to change its content. Therefore, we can also easily transfer this memory between thread boundaries. cc: `@mzohreva` `@vn971` `@belalH` `@jethrogb`
GuillaumeGomez
added a commit
to GuillaumeGomez/rust
that referenced
this issue
Jan 9, 2024
…e_userspace_types_send, r=Nilstrieb,dtolnay Making `User<T>` and `User<[T]>` `Send` All `User` types in SGX point to owned memory in userspace. Special care is always needed when accessing this memory as it must be assumed that an attacker is always able to change its content. Therefore, we can also easily transfer this memory between thread boundaries. cc: ``@mzohreva`` ``@vn971`` ``@belalH`` ``@jethrogb``
rust-timer
added a commit
to rust-lang-ci/rust
that referenced
this issue
Jan 9, 2024
Rollup merge of rust-lang#118241 - fortanix:raoul/rust-langgh-530-make_userspace_types_send, r=Nilstrieb,dtolnay Making `User<T>` and `User<[T]>` `Send` All `User` types in SGX point to owned memory in userspace. Special care is always needed when accessing this memory as it must be assumed that an attacker is always able to change its content. Therefore, we can also easily transfer this memory between thread boundaries. cc: ``@mzohreva`` ``@vn971`` ``@belalH`` ``@jethrogb``
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Clang does this and it should buy us some compile perf for debugging.
The text was updated successfully, but these errors were encountered: