Conversation

I'm talking about memory tagging as a replacement for stack canaries, not stack canaries. I'm not sure why you're responding about stack canaries. Memory tagging the stack frame makes it so that trying to use pointers to the stack frame to access memory outside it will trap.
1
1
Sure, and as I've stated many times in this conversation, I would like for C to be more strongly specified. However, defining something like signed integer overflow as guaranteed to wrap would be a step backwards for implementations that want to make it safer such as trapping.
2
2
Oh, right, so you weren't actually being truthful about respecting existing implementations and deployments of the standard. It fits with how you've been arguing the entire time. You are being incredibly dishonest and manipulative along with misrepresenting what I've been saying.
1
Deployments of C without any features like _FORTIFY_SOURCE incompatible with how you want the C standard redefined are not the minority. It's also not at all weird to provide safety features based on what the standard doesn't permit, like catching memory unsafe accesses.
1
Not permitting it in the spec is not the same thing as not permitting it. If the spec says that the behavior is X, it doesn't mean that someone can't make something where the behavior is Y. They just have to be clear about the fact that they aren't obeying published behavior.