@@ -280,10 +280,6 @@ pub fn local_large_var_cloned(f: fn(Gigastruct)) {
280
280
// ```
281
281
282
282
// all: __security_check_cookie
283
-
284
- // FIXME: How does the rust compiler handle moves of large structures?
285
- // rusty-NOT: __security_check_cookie
286
-
287
283
// strong: __security_check_cookie
288
284
// basic: __security_check_cookie
289
285
// none-NOT: __security_check_cookie
@@ -322,14 +318,8 @@ extern "C" {
322
318
#[ no_mangle]
323
319
pub fn alloca_small_compile_time_constant_arg ( f : fn ( * mut ( ) ) ) {
324
320
f ( unsafe { alloca ( 8 ) } ) ;
325
-
326
- // all: __security_check_cookie
327
-
328
- // FIXME: Rusty thinks a function that returns a mutable raw pointer may
329
- // be a stack memory allocation function, so it performs stack smash protection.
330
- // Is it possible to optimize the heuristics?
331
- // rusty: __security_check_cookie
332
321
322
+ // all: __security_check_cookie
333
323
// strong-NOT: __security_check_cookie
334
324
// basic-NOT: __security_check_cookie
335
325
// none-NOT: __security_check_cookie
@@ -386,10 +376,10 @@ pub fn unsized_fn_param(s: [u8], l: bool, f: fn([u8])) {
386
376
// LLVM does not support generating stack protectors in functions with funclet
387
377
// based EH personalities.
388
378
// https://github.com/llvm/llvm-project/blob/37fd3c96b917096d8a550038f6e61cdf0fc4174f/llvm/lib/CodeGen/StackProtector.cpp#L103C1-L109C4
389
-
390
379
// all-NOT: __security_check_cookie
391
380
// rusty-NOT: __security_check_cookie
392
381
// strong-NOT: __security_check_cookie
382
+
393
383
// basic-NOT: __security_check_cookie
394
384
// none-NOT: __security_check_cookie
395
385
// missing-NOT: __security_check_cookie
0 commit comments