It has a feature to generate code for detecting stack smashing at the entrances to and exits from functions when compiling.
This code handles the input of specific values to the stack area at the entrance to the given function (or all functions). At the exit from the function, these values are checked to see if they have been overwritten. If the values have been overwritten, it is assumed that the stack area has been smashed, and operation branches to an error function "__stack_chk_fail()".
By using this feature for dynamic checking, the compiler supports security measures such as preventing security attacks in the form of buffer overflows.
|C Compiler Package for RH850 Family|
|C/C++ Compiler Package for RX Family|
|C Compiler Package for RL78 Family|