------- Comment #1 from pinskia at gcc dot gnu dot org 2009-02-17 19:08 ------- http://gcc.gnu.org/onlinedocs/gcc-4.3.3/gcc/Optimize-Options.html#index-fstack_002dprotector-764
Hmm: Emit extra code to check for buffer overflows, such as stack smashing attacks. This is done by adding a guard variable to functions with vulnerable objects. This includes functions that call alloca, and functions with buffers larger than 8 bytes. Maybe it should say character buffers rather than just buffers here. -- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=39218