Lines Matching full:stack
8 stack variable initializations, this warning is silenced for
38 prompt "Initialize kernel stack variables at function entry"
44 This option enables initialization of stack variables at
56 bool "no automatic stack variable initialization (weakest)"
58 Disable automatic stack variable initialization.
60 classes of uninitialized stack variable exploits
69 Zero-initialize any structures on the stack containing
71 uninitialized stack variable exploits and information
82 Zero-initialize any structures on the stack that may
85 of uninitialized stack variable exploits and information
90 stack that can otherwise be optimized out, so combining
91 this with CONFIG_KASAN_STACK can lead to a stack overflow
101 Zero-initialize any stack variables that may be passed
104 of uninitialized stack variable exploits and information
108 stack that can otherwise be optimized out, so combining
109 this with CONFIG_KASAN_STACK can lead to a stack overflow
117 Initializes everything on the stack (including padding)
119 all classes of uninitialized stack variable exploits and
137 Initializes everything on the stack (including padding)
139 classes of uninitialized stack variable exploits and
162 bool "Poison kernel stack before returning from syscalls"
166 This option makes the kernel erase the kernel stack before
168 the stack initialized to the poison value, which both reduces
169 the lifetime of any sensitive stack contents and reduces
170 potential for uninitialized stack variable exploits or information
171 exposures (it does not cover functions reaching the same stack
173 most uninitialized stack variable attacks, with the performance
174 impact being driven by the depth of the stack usage, rather than
187 bool "Report stack depth analysis instrumentation" if EXPERT
197 int "Minimum stack frame size of functions tracked by STACKLEAK"
203 the lowest border of the kernel stack (and for some other purposes).
205 a stack frame size greater than or equal to this parameter.
215 shows the maximum kernel stack consumption for the current and
221 bool "Allow runtime disabling of kernel stack erasing"
225 runtime to control kernel stack erasing for kernels built with