You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have stack probes on x86/x64 for both libc and stand-alone builds. Stack protection for libc-less targets is tracked in #276, enabling it requires a few lines of code and a decision on whether the TLS should always be allocated or not.
Stack smash protection currently only works on targets with libc,
but stack overflow detection is enabled by default in safe build modes.
See ziglang/zig#4542.
https://en.wikipedia.org/wiki/Buffer_overflow_protection#Canaries
Just curious what is the current status / future plans?
The text was updated successfully, but these errors were encountered: