Linux Kernel Configuration
└─>Security options
└─>Kernel hardening options
In linux kernel since version 3.10 (release Date: 2013-06-30)  
While the kernel is built with warnings enabled for any missed
stack variable initializations, this warning is silenced for
anything passed by reference to another function, under the
occasionally misguided assumption that the function will do
the initialization. As this regularly leads to exploitable
flaws, this plugin is available to identify and zero-initialize
such variables, depending on the chosen level of coverage.

This plugin was originally ported from grsecurity/PaX. More
information at: