Intel® oneAPI DPC++/C++ Compiler
Developer Guide and Reference
A newer version of this document is available. Customers should click here to go to the newest version.
fstack-protector
Enables or disables stack overflow security checks.
Syntax
| Linux: | None -fno-stack-protector[-keyword] | 
| Windows: | None | 
Arguments
| keyword | Possible values are: 
 | 
If no -keyword is specified, option -fstack-protector enables stack overflow security checks for routines with a string buffer.
Default
| -fno-stack-protector, -fno-stack-protector-strong | No stack overflow security checks are enabled for the relevant routines. | 
| -fno-stack-protector-all | No stack overflow security checks are enabled for any routines. | 
Description
This option enables or disables stack overflow security checks for certain (or all) routines. A stack overflow occurs when a program stores more data in a variable on the execution stack than is allocated to the variable. Writing past the end of a string buffer or using an index for an array that is larger than the array bound could cause a stack overflow and security violations.
The -fstack-protector options are provided for compatibility with gcc. If the gcc/glibc implementation is available, it is used; otherwise, the Intel implementation is used.
For an Intel-specific version of this feature, see option -fstack-security-check.
IDE Equivalent
Alternate Options
None