Lines Matching +full:left +full:- +full:most
1 # SPDX-License-Identifier: GPL-2.0-only
12 flaws, this plugin is available to identify and zero-initialize
23 def_bool $(cc-option,-ftrivial-auto-var-init=pattern)
26 …def_bool $(cc-option,-ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-wi…
54 bool "zero-init structs marked for userspace (weak)"
58 Zero-initialize any structures on the stack containing
61 exposures, like CVE-2013-2141:
65 bool "zero-init structs passed by reference (strong)"
70 Zero-initialize any structures on the stack that may
72 explicitly initialized. This can prevent most classes
74 exposures, like CVE-2017-1000410:
77 As a side-effect, this keeps a lot of variables on the
83 bool "zero-init anything passed by reference (very strong)"
88 Zero-initialize any stack variables that may be passed
95 bool "0xAA-init everything on the stack (strongest)"
102 left uninitialized.
106 non-NULL values, buffer sizes and indices are very big.
109 bool "zero-init everything on the stack (strongest and safest)"
116 left uninitialized.
146 most uninitialized stack variable attacks, with the performance
200 workload, but most cases see <1% impact. Some synthetic
217 touching "cold" memory areas. Most cases see 3-5% impact. Some