From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 118448 invoked by alias); 5 Mar 2019 23:08:34 -0000 Mailing-List: contact gcc-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-owner@gcc.gnu.org Received: (qmail 118432 invoked by uid 89); 5 Mar 2019 23:08:33 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-0.0 required=5.0 tests=BAYES_20,SPF_PASS autolearn=ham version=3.3.2 spammy=UD:files.wordpress.com, H*f:sk:e5e5f5b, SECURE, H*f:sk:812a978 X-HELO: gnu.wildebeest.org Received: from wildebeest.demon.nl (HELO gnu.wildebeest.org) (212.238.236.112) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Tue, 05 Mar 2019 23:08:32 +0000 Received: from librem.wildebeest.org (deer0x15.wildebeest.org [172.31.17.151]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gnu.wildebeest.org (Postfix) with ESMTPSA id 9E799302BB1B; Wed, 6 Mar 2019 00:08:29 +0100 (CET) Received: by librem.wildebeest.org (Postfix, from userid 1000) id 1FF7413F82C; Wed, 6 Mar 2019 00:08:29 +0100 (CET) Date: Tue, 05 Mar 2019 23:08:00 -0000 From: Mark Wielaard To: Martin Sebor Cc: Graham Markall , David Brown , Segher Boessenkool , P J P , "gcc@gcc.gnu.org" Subject: Re: About BZ#87210 [RFE] To initialize automatic stack variables Message-ID: <20190305230829.GA62096@wildebeest.org> References: <1225413012.1679387.1550571810991.ref@mail.yahoo.com> <1225413012.1679387.1550571810991@mail.yahoo.com> <20190305183717.GQ3969@gate.crashing.org> <812a9782-8eee-90c5-ed0e-b9bd2135b602@hesbynett.no> <8ae52ac6-9b7b-8f16-725b-808f38aa779a@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8ae52ac6-9b7b-8f16-725b-808f38aa779a@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-SW-Source: 2019-03/txt/msg00040.txt.bz2 On Tue, Mar 05, 2019 at 02:17:51PM -0700, Martin Sebor wrote: > The SECURE project adds the function attribute stack_erase that > serves the purpose described above. It works on stack frames by > design rather than applying to individual stack objects. > The presentation they delivered at Cauldron 2018 made it sound > like they were on track for submitting the feature to GCC: > > https://www.youtube.com/watch?v=Lg_jJLtH7R0 The slides of that talk can be found here: https://gmarkall.files.wordpress.com/2018/09/secure_and_gcc.pdf