Enable stack instrumentation (unsafe)

configname: CONFIG_KASAN_STACK

Linux Kernel Configuration
└─>Kernel hacking
└─>Memory Debugging
└─>KASAN: runtime memory debugger
└─>Enable stack instrumentation (unsafe)
In linux kernel since version 4.14.326 (release Date: 2023-09-23)  
The LLVM stack address sanitizer has a know problem that
causes excessive stack usage in a lot of functions, see
https://bugs.llvm.org/show_bug.cgi?id=38809
Disabling asan-stack makes it safe to run kernels build
with clang-8 with KASAN enabled, though it loses some of
the functionality.
This feature is always disabled when compile-testing with clang
to avoid cluttering the output in stack overflow warnings,
but clang users can still enable it for builds without
CONFIG_COMPILE_TEST. On gcc it is assumed to always be safe
to use and enabled by default.
If the architecture disables inline instrumentation, stack
instrumentation is also disabled as it adds inline-style
instrumentation that is run unconditionally.