You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
session_target_small_data_threshold_not_supported = `-Z small-data-threshold` is not supported for target {$target_triple} and will be ignored
127
127
128
-
session_target_stack_protector_not_supported = `-Z stack-protector={$stack_protector}` is not supported for target {$target_triple} and will be ignored
128
+
session_target_stack_protector_not_supported = `-C stack-protector={$stack_protector}` is not supported for target {$target_triple} and will be ignored
129
129
130
130
session_unleashed_feature_help_named = skipping check for `{$gate}` feature
131
131
session_unleashed_feature_help_unnamed = skipping check that does not even have a feature gate
| Forward-edge control flow protection | Yes | Nightly |
68
68
| Backward-edge control flow protection (e.g., shadow and safe stack) | Yes | Nightly |
69
69
@@ -357,7 +357,8 @@ instruction pointer, and checking if this value has changed when returning from
357
357
a function. This is also known as “Stack Protector” or “Stack Smashing
358
358
Protector (SSP)”.
359
359
360
-
The Rust compiler supports stack smashing protection on nightly builds[40].
360
+
The Rust compiler supports stack smashing protection with the `-C stack-protector=all`
361
+
flag since version 1.78.0 (2024-05-02)[40], [47].
361
362
362
363

363
364
Fig. 14. IDA Pro listing cross references to `__stack_chk_fail` in hello-rust.
0 commit comments