Stack instrumentation (unsafe)
configname: CONFIG_KASAN_STACK
Linux Kernel Configuration
└─>Kernel hacking
└─>Memory Debugging
└─>KASAN: dynamic memory safety error detector
└─>Stack instrumentation (unsafe)
In linux kernel since version 4.14.326 (release Date: 2023-09-23)
							Disables stack instrumentation and thus KASAN's ability to detect
						
out-of-bounds bugs in stack variables.
							
						
With Clang, stack instrumentation has a problem that causes excessive
stack usage, see https://bugs.llvm.org/show_bug.cgi?id=38809. Thus,
with Clang, this option is deemed unsafe.
							
						
This option is always disabled when compile-testing with Clang to
avoid cluttering the log with stack overflow warnings.
							
						
With GCC, enabling stack instrumentation is assumed to be safe.
							
						
If the architecture disables inline instrumentation via
ARCH_DISABLE_KASAN_INLINE, stack instrumentation gets disabled
as well, as it adds inline-style instrumentation that is run
unconditionally.
							
						
						
					out-of-bounds bugs in stack variables.
With Clang, stack instrumentation has a problem that causes excessive
stack usage, see https://bugs.llvm.org/show_bug.cgi?id=38809. Thus,
with Clang, this option is deemed unsafe.
This option is always disabled when compile-testing with Clang to
avoid cluttering the log with stack overflow warnings.
With GCC, enabling stack instrumentation is assumed to be safe.
If the architecture disables inline instrumentation via
ARCH_DISABLE_KASAN_INLINE, stack instrumentation gets disabled
as well, as it adds inline-style instrumentation that is run
unconditionally.
