:orphan: .. title:: CONFIG_HW_STACK_PROTECTION .. kconfig:: CONFIG_HW_STACK_PROTECTION CONFIG_HW_STACK_PROTECTION ########################## *Hardware Stack Protection* Type: ``bool`` Help ==== .. code-block:: none Select this option to enable hardware-based platform features to catch stack overflows when the system is running in privileged mode. If CONFIG_USERSPACE is not enabled, the system is always running in privileged mode. Note that this does not necessarily prevent corruption and assertions about the overall system state when a fault is triggered cannot be made. Direct dependencies =================== \ :kconfig:`BOARD_TWR_KE18F ` || \ :kconfig:`ARCH_HAS_STACK_PROTECTION ` *(Includes any dependencies from ifs and menus.)* Default ======= - y if !\ :kconfig:`USERSPACE ` Symbols that select this symbol =============================== - \ :kconfig:`TEST_HW_STACK_PROTECTION ` Kconfig definitions =================== At ``/arm/twr_ke18f/Kconfig.defconfig:17`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:22`` Menu path: (Top) .. code-block:: kconfig config HW_STACK_PROTECTION bool default y if !USERSPACE depends on BOARD_TWR_KE18F ---- At ``/Kconfig:233`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:39`` Menu path: (Top) → General Architecture Options .. code-block:: kconfig config HW_STACK_PROTECTION bool "Hardware Stack Protection" depends on ARCH_HAS_STACK_PROTECTION help Select this option to enable hardware-based platform features to catch stack overflows when the system is running in privileged mode. If CONFIG_USERSPACE is not enabled, the system is always running in privileged mode. Note that this does not necessarily prevent corruption and assertions about the overall system state when a fault is triggered cannot be made. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*