Developer Guide and Reference

Contents

fstack-security-check

Determines whether the compiler generates code that detects some buffer overruns.
This content is specific to C++; it does not apply to
DPC++
.

Syntax

Linux:
-fstack-security-check
-fno-stack-security-check
Windows:
None
Arguments
None
Default
-fno-stack-security-check
The compiler does not detect buffer overruns.
Description
This option determines whether the compiler generates code that detects some buffer overruns that overwrite the return address. This is a common technique for exploiting code that does not enforce buffer size restrictions.
This option always uses an Intel implementation.
For a gcc-compliant version of this feature, see option
fstack-protector
.
IDE Equivalent
None
Alternate Options
Linux: None
Windows:
/GS

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.