------- Comment #1 from pinskia at gcc dot gnu dot org  2009-02-17 19:08 -------
http://gcc.gnu.org/onlinedocs/gcc-4.3.3/gcc/Optimize-Options.html#index-fstack_002dprotector-764

Hmm:
Emit extra code to check for buffer overflows, such as stack smashing attacks.
This is done by adding a guard variable to functions with vulnerable objects.
This includes functions that call alloca, and functions with buffers larger
than 8 bytes. 

Maybe it should say character buffers rather than just buffers here.


-- 


http://gcc.gnu.org/bugzilla/show_bug.cgi?id=39218

Reply via email to