Visible to Intel only — GUID: GUID-AA4CABD6-316C-4F41-B802-BAA723118676
Visible to Intel only — GUID: GUID-AA4CABD6-316C-4F41-B802-BAA723118676
fstack-security-check
Determines whether the compiler generates code that detects some buffer overruns.
Syntax
Linux: |
-fstack-security-check -fno-stack-security-check |
macOS: |
-fstack-security-check -fno-stack-security-check |
Windows: |
None |
Arguments
None
Default
-fno-stack-security-check |
The compiler does not detect buffer overruns. |
Description
This option determines whether the compiler generates code that detects some buffer overruns that overwrite the return address. This is a common technique for exploiting code that does not enforce buffer size restrictions.
This option always uses an Intel implementation.
For a gcc-compliant version of this feature, see option fstack-protector.
This option only applies to host compilation. When offloading is enabled, it does not impact device-specific compilation. Offloading can only be enabled when using ifx.
IDE Equivalent
Alternate Options
Linux and macOS: None
Windows: /GS