Lines Matching refs:stack
8 stack variable initializations, this warning is silenced for
26 prompt "Initialize kernel stack variables at function entry"
31 This option enables initialization of stack variables at
45 Disable automatic stack variable initialization.
47 classes of uninitialized stack variable exploits
55 Zero-initialize any structures on the stack containing
57 uninitialized stack variable exploits and information
67 Zero-initialize any structures on the stack that may
70 of uninitialized stack variable exploits and information
75 stack that can otherwise be optimized out, so combining
76 this with CONFIG_KASAN_STACK can lead to a stack overflow
85 Zero-initialize any stack variables that may be passed
88 of uninitialized stack variable exploits and information
92 bool "0xAA-init everything on the stack (strongest)"
95 Initializes everything on the stack with a 0xAA
97 of uninitialized stack variable exploits and information
114 bool "Poison kernel stack before returning from syscalls"
118 This option makes the kernel erase the kernel stack before
120 the stack initialized to the poison value, which both reduces
121 the lifetime of any sensitive stack contents and reduces
122 potential for uninitialized stack variable exploits or information
123 exposures (it does not cover functions reaching the same stack
125 most uninitialized stack variable attacks, with the performance
126 impact being driven by the depth of the stack usage, rather than
139 int "Minimum stack frame size of functions tracked by STACKLEAK"
145 the lowest border of the kernel stack (and for some other purposes).
147 a stack frame size greater than or equal to this parameter.
157 shows the maximum kernel stack consumption for the current and
163 bool "Allow runtime disabling of kernel stack erasing"
167 runtime to control kernel stack erasing for kernels built with