You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: src/doc/unstable-book/src/compiler-flags/control-flow-guard.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
-
# `control_flow_guard`
1
+
# `control-flow-guard`
2
2
3
3
The tracking issue for this feature is: [#68793](https://github.com/rust-lang/rust/issues/68793).
4
4
5
5
------------------------
6
6
7
-
The rustc flag `-Z control_flow_guard=checks` enables the Windows [Control Flow Guard](https://docs.microsoft.com/en-us/windows/win32/secbp/control-flow-guard) (CFG) platform security feature.
7
+
The rustc flag `-Z control-flow-guard` enables the Windows [Control Flow Guard](https://docs.microsoft.com/en-us/windows/win32/secbp/control-flow-guard) (CFG) platform security feature.
8
8
9
9
CFG is an exploit mitigation designed to enforce control-flow integrity for software running on supported Windows platforms (Windows 8.1 onwards). Specifically, CFG uses runtime checks to validate the target address of every indirect call/jump before allowing the call to complete.
10
10
@@ -29,7 +29,7 @@ The CFG checks and metadata can potentially increase binary size and runtime ove
29
29
30
30
## Testing Control Flow Guard
31
31
32
-
The rustc flag `-Z control_flow_guard=nochecks` instructs LLVM to emit the list of valid call targets without inserting runtime checks. This flag should only be used for testing purposes as it does not provide security enforcement.
32
+
The rustc flag `-Z control-flow-guard=nochecks` instructs LLVM to emit the list of valid call targets without inserting runtime checks. This flag should only be used for testing purposes as it does not provide security enforcement.
0 commit comments