Intel® C++ Compiler Classic Developer Guide and Reference

ID 767249
Date 12/16/2022
Public

A newer version of this document is available. Customers should click here to go to the newest version.

Document Table of Contents

fstack-security-check

Determines whether the compiler generates code that detects some buffer overruns.

Syntax

Linux:

-fstack-security-check

-fno-stack-security-check

macOS:

-fstack-security-check

-fno-stack-security-check

Windows:

None

Arguments

None

Default

-fno-stack-security-check

The compiler does not detect buffer overruns.

Description

This option determines whether the compiler generates code that detects some buffer overruns that overwrite the return address. This is a common technique for exploiting code that does not enforce buffer size restrictions.

This option always uses an Intel implementation.

For a gcc-compliant version of this feature, see option fstack-protector.

IDE Equivalent
None
Alternate Options

Linux and macOS: None

Windows: /GS

See Also