Lines Matching +full:high +full:- +full:side
1 # SPDX-License-Identifier: GPL-2.0-only
12 flaws, this plugin is available to identify and zero-initialize
23 def_bool $(cc-option,-ftrivial-auto-var-init=pattern)
26 …def_bool $(cc-option,-ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-wi…
55 bool "zero-init structs marked for userspace (weak)"
59 Zero-initialize any structures on the stack containing
62 exposures, like CVE-2013-2141:
66 bool "zero-init structs passed by reference (strong)"
71 Zero-initialize any structures on the stack that may
75 exposures, like CVE-2017-1000410:
78 As a side-effect, this keeps a lot of variables on the
84 bool "zero-init everything passed by reference (very strong)"
89 Zero-initialize any stack variables that may be passed
95 As a side-effect, this keeps a lot of variables on the
101 bool "pattern-init everything (strongest)"
112 non-NULL values, buffer sizes and indices are very big. The
113 pattern is situation-specific; Clang on 64-bit uses 0xAA
115 which use 0xFF repeating (-NaN). Clang on 32-bit uses 0xFF
119 bool "zero-init everything (strongest and safest)"
129 (immediately NUL-terminated), pointers (NULL), indices
213 workloads have measured as high as 7%.
229 touching "cold" memory areas. Most cases see 3-5% impact. Some
230 synthetic workloads have measured as high as 8%.
233 def_bool $(cc-option,-fzero-call-used-regs=used-gpr)
239 At the end of functions, always zero any caller-used register
242 contents are less likely to be available for side channels
245 generated "write-what-where" gadgets) in the resulting kernel