You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/doc/rustc/src/exploit-mitigations.md
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -255,8 +255,8 @@ referred to as “stack probes” or “stack probing”.
255
255
The Rust compiler supports stack clashing protection via stack probing, and
256
256
enables it by default since version 1.20.0 (2017-08-31)[26]–[29].
257
257
258
-

259
-
Fig. 6. Cross references to `__rust_probestack` in hello-rust.
258
+

259
+
Fig. 6. IDA Pro listing cross references to `__rust_probestack` in hello-rust.
260
260
261
261
```rust
262
262
fnhello() {
@@ -270,8 +270,8 @@ fn main() {
270
270
```
271
271
Fig 7. Modified hello-rust.
272
272
273
-

274
-
Fig. 8. Cross references to `__rust_probestack` in modified hello-rust.
273
+

274
+
Fig. 8. IDA Pro listing cross references to `__rust_probestack` in modified hello-rust.
275
275
276
276
To check if stack clashing protection is enabled for a given binary, search
277
277
for cross references to `__rust_probestack`. The `__rust_probestack` is
@@ -413,8 +413,8 @@ The Rust compiler does not support stack smashing protection. However, more
413
413
comprehensive alternatives to stack smashing protection exist, such as
414
414
shadow and safe stack (see Backward-edge control flow protection).
415
415
416
-

417
-
Fig. 14. Cross references to `__stack_chk_fail` in hello-rust.
416
+

417
+
Fig. 14. IDA Pro listing cross references to `__stack_chk_fail` in hello-rust.
418
418
419
419
To check if stack smashing protection is enabled for a given binary, search
420
420
for cross references to `__stack_chk_fail`. The only cross references to
0 commit comments