Developer Guide and Reference

Contents

fstack-security-check

Determines whether the compiler generates code that detects some buffer overruns.

Syntax

Linux:
-fstack-security-check
-fno-stack-security-check
macOS:
-fstack-security-check
-fno-stack-security-check
Windows:
None
Arguments
None
Default
-fno-stack-security-check
The compiler does not detect buffer overruns.
Description
This option determines whether the compiler generates code that detects some buffer overruns that overwrite the return address. This is a common technique for exploiting code that does not enforce buffer size restrictions.
This option always uses an Intel implementation.
For a gcc-compliant version of this feature, see option
fstack-protector
.
Alternate Options
Linux
and
macOS*
: None
Windows:
/GS

Product and Performance Information

1

Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel microprocessors. These optimizations include SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or effectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel microprocessors. Certain optimizations not specific to Intel microarchitecture are reserved for Intel microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice.

Notice revision #20110804