:orphan: .. title:: HW_STACK_PROTECTION .. option:: CONFIG_HW_STACK_PROTECTION *Hardware Stack Protection* Type: ``bool`` Help ==== Select this option to enable hardware-based platform features to catch stack overflows when the system is running in privileged mode. If CONFIG_USERSPACE is not enabled, the system is always running in privileged mode. Note that this does not necessarily prevent corruption and assertions about the overall system state when a fault is triggered cannot be made. Direct dependencies =================== \ :option:`BOARD_TWR_KE18F ` || \ :option:`ARCH_HAS_STACK_PROTECTION ` *(Includes any dependencies from ifs and menus.)* Default ======= - y if !\ :option:`USERSPACE ` Symbols that select this symbol =============================== - \ :option:`TEST_HW_STACK_PROTECTION ` Kconfig definitions =================== .. highlight:: kconfig At ``boards/arm/twr_ke18f/Kconfig.defconfig:27`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:18`` Menu path: (Top) .. parsed-literal:: config HW_STACK_PROTECTION bool default y if !\ :option:`USERSPACE ` depends on \ :option:`BOARD_TWR_KE18F ` ---- At ``arch/Kconfig:215`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:29`` Menu path: (Top) → General Architecture Options .. parsed-literal:: config HW_STACK_PROTECTION bool "Hardware Stack Protection" depends on \ :option:`ARCH_HAS_STACK_PROTECTION ` help Select this option to enable hardware-based platform features to catch stack overflows when the system is running in privileged mode. If CONFIG_USERSPACE is not enabled, the system is always running in privileged mode. Note that this does not necessarily prevent corruption and assertions about the overall system state when a fault is triggered cannot be made. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*