Lines Matching full:stack
8 stack variable initializations, this warning is silenced for
38 prompt "Initialize kernel stack variables at function entry"
44 This option enables initialization of stack variables at
56 bool "no automatic stack variable initialization (weakest)"
58 Disable automatic stack variable initialization.
60 classes of uninitialized stack variable exploits
69 Zero-initialize any structures on the stack containing
71 uninitialized stack variable exploits and information
82 Zero-initialize any structures on the stack that may
85 of uninitialized stack variable exploits and information
90 stack that can otherwise be optimized out, so combining
91 this with CONFIG_KASAN_STACK can lead to a stack overflow
101 Zero-initialize any stack variables that may be passed
104 of uninitialized stack variable exploits and information
108 stack that can otherwise be optimized out, so combining
109 this with CONFIG_KASAN_STACK can lead to a stack overflow
117 Initializes everything on the stack (including padding)
119 all classes of uninitialized stack variable exploits and
136 Initializes everything on the stack (including padding)
138 classes of uninitialized stack variable exploits and
161 bool "Poison kernel stack before returning from syscalls"
165 This option makes the kernel erase the kernel stack before
167 the stack initialized to the poison value, which both reduces
168 the lifetime of any sensitive stack contents and reduces
169 potential for uninitialized stack variable exploits or information
170 exposures (it does not cover functions reaching the same stack
172 most uninitialized stack variable attacks, with the performance
173 impact being driven by the depth of the stack usage, rather than
186 bool "Report stack depth analysis instrumentation" if EXPERT
196 int "Minimum stack frame size of functions tracked by STACKLEAK"
202 the lowest border of the kernel stack (and for some other purposes).
204 a stack frame size greater than or equal to this parameter.
214 shows the maximum kernel stack consumption for the current and
220 bool "Allow runtime disabling of kernel stack erasing"
224 runtime to control kernel stack erasing for kernels built with