Intel® oneAPI DPC++/C++ Compiler
Developer Guide and Reference
A newer version of this document is available. Customers should click here to go to the newest version.
fstack-security-check
Determines whether the compiler generates code that detects some buffer overruns.
Syntax
| Linux: | -fstack-security-check -fno-stack-security-check | 
| Windows: | None | 
Arguments
None
Default
| -fno-stack-security-check | The compiler does not detect buffer overruns. | 
Description
This option determines whether the compiler generates code that detects some buffer overruns that overwrite the return address. This is a common technique for exploiting code that does not enforce buffer size restrictions.
This option always uses an Intel implementation.
For a gcc-compliant version of this feature, see option fstack-protector.
This option only applies to host compilation. When offloading is enabled, it does not impact device-specific compilation.
IDE Equivalent
Alternate Options
Linux: None
Windows: /GS