Lines Matching refs:CFI
12 mechanisms implemented by Clang's *Control Flow Integrity* (CFI) schemes
14 indirect control flow operations are protected by CFI, and should output these
18 framework, where modifications to the compiler ensure that CFI protection
32 framework, ensuring updates to the compiler that reduce CFI coverage on
38 This tool will continuously validate that CFI directives are properly
41 present in linker or compiler do not subvert CFI protections in the final
46 the compiler implementation of CFI (e.g. indirect jumps to facilitate switch
49 It may be possible in the future to extend this tool to flag unnecessary CFI
50 directives (e.g. CFI directives around a static call to a non-polymorphic base
60 functions and jump tables should also be subject to CFI protections. Non-virtual
68 CFI trap (on x86, this is a ``ud2`` instruction). If the target instruction is
70 conditional jump target should be the CFI trap. If an indirect control flow
72 as being CFI-unprotected.
80 spills that affect the target register, the target is marked as CFI-protected.
90 control flow operations across DSO boundaries. Currently, these CFI features are