Lines Matching full:stack

22 	prompt "Initialize kernel stack variables at function entry"
27 This option enables initialization of stack variables at
39 bool "no automatic stack variable initialization (weakest)"
41 Disable automatic stack variable initialization.
43 classes of uninitialized stack variable exploits
51 Initializes everything on the stack (including padding)
53 all classes of uninitialized stack variable exploits and
71 Initializes everything on the stack (including padding)
73 classes of uninitialized stack variable exploits and
86 def_bool $(cc-option,-fsanitize-coverage-stack-depth-callback-min=1)
89 bool "Poison kernel stack before returning from syscalls"
93 This option makes the kernel erase the kernel stack before
95 the stack initialized to the poison value, which both reduces
96 the lifetime of any sensitive stack contents and reduces
97 potential for uninitialized stack variable exploits or information
98 exposures (it does not cover functions reaching the same stack
100 most uninitialized stack variable attacks, with the performance
101 impact being driven by the depth of the stack usage, rather than
118 bool "Report stack depth analysis instrumentation" if EXPERT
128 int "Minimum stack frame size of functions tracked by KSTACK_ERASE"
134 the lowest border of the kernel stack (and for some other purposes).
136 with a stack frame size greater than or equal to this parameter.
146 shows the maximum kernel stack consumption for the current and
152 bool "Allow runtime disabling of kernel stack erasing"
156 runtime to control kernel stack erasing for kernels built with
233 separately allocated pages, are not on the process stack,