Stack instrumentation (unsafe)

configname: CONFIG_KASAN_STACK

Linux Kernel Configuration
└─>Kernel hacking
└─>Memory Debugging
└─>KASAN: dynamic memory safety error detector
└─>Stack instrumentation (unsafe)
In linux kernel since version 4.14.326 (release Date: 2023-09-23)  
Disables stack instrumentation and thus KASAN's ability to detect
out-of-bounds bugs in stack variables.

With Clang, stack instrumentation has a problem that causes excessive
stack usage, see https://bugs.llvm.org/show_bug.cgi?id=38809. Thus,
with Clang, this option is deemed unsafe.

This option is always disabled when compile-testing with Clang to
avoid cluttering the log with stack overflow warnings.

With GCC, enabling stack instrumentation is assumed to be safe.

If the architecture disables inline instrumentation via
ARCH_DISABLE_KASAN_INLINE, stack instrumentation gets disabled
as well, as it adds inline-style instrumentation that is run
unconditionally.