You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
session_target_requires_unwind_tables = target requires unwind tables, they cannot be disabled with `-C force-unwind-tables=no`
106
106
107
-
session_target_stack_protector_not_supported = `-Z stack-protector={$stack_protector}` is not supported for target {$target_triple} and will be ignored
107
+
session_target_stack_protector_not_supported = `-C stack-protector={$stack_protector}` is not supported for target {$target_triple} and will be ignored
108
108
109
109
session_unleashed_feature_help_named = skipping check for `{$gate}` feature
110
110
session_unleashed_feature_help_unnamed = skipping check that does not even have a feature gate
| Forward-edge control flow protection | Yes | Nightly |
68
68
| Backward-edge control flow protection (e.g., shadow and safe stack) | Yes | Nightly |
69
69
@@ -357,7 +357,8 @@ instruction pointer, and checking if this value has changed when returning from
357
357
a function. This is also known as “Stack Protector” or “Stack Smashing
358
358
Protector (SSP)”.
359
359
360
-
The Rust compiler supports stack smashing protection on nightly builds[40].
360
+
The Rust compiler supports stack smashing protection with the `-C stack-protector=all`
361
+
flag since version 1.78.0 (2024-05-02)[40], [47].
361
362
362
363

363
364
Fig. 14. IDA Pro listing cross references to `__stack_chk_fail` in hello-rust.
0 commit comments