1Build the basesystem with code to zero caller-used register contents 2on function return. 3This prevents leaking temporary values for side channel attacks. 4Additionally this reduces the number of usable ROP gadgets for attackers. 5