https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87220

--- Comment #2 from Rich Felker <bugdal at aerifal dot cx> ---
-fstack-clash-protection works as desired.

Based on the documentation:

"Most targets do not fully support stack clash protection. However, on those
targets -fstack-clash-protection will protect dynamic stack allocations.
-fstack-clash-protection may also provide limited protection for static stack
allocations if the target supports -fstack-check=specific. "

I understood that -fstack-check would still be needed to get reliable
protection on all targets. Perhaps that's wrong. Is there a recommended
approach for determining at build time the right options for the target to
ensure that code which jumps over the guard page is not generated?

Reply via email to