CONFIG_X86_STACK_PROTECTION
(No prompt – not directly user assignable.)
Type: bool
Help
This option leverages the MMU to cause a system fatal error if the
bounds of the current process stack are overflowed. This is done
by preceding all stack areas with a 4K guard page.
Help
This option leverages the MMU to cause a system fatal error if the
bounds of the current process stack are overflowed. This is done
by preceding all stack areas with a 4K guard page.
Direct dependencies
(!X86_64 && X86) || (X86_64 && X86)
(Includes any dependencies from ifs and menus.)
Defaults
y if
HW_STACK_PROTECTIONy if
HW_STACK_PROTECTION
Symbols selected by this symbol
Kconfig definitions
At <Architecture>/x86/core/Kconfig.ia32:55
Included via Kconfig:8 → Kconfig.zephyr:39 → <Architecture>/Kconfig:12 → <Architecture>/x86/Kconfig:482
Menu path: (Top) → X86 Architecture Options → Processor Capabilities
config X86_STACK_PROTECTION
bool
default y if HW_STACK_PROTECTION
select THREAD_STACK_INFO
select SET_GDT
select GDT_DYNAMIC
select X86_ENABLE_TSS
depends on !X86_64 && X86
help
This option leverages the MMU to cause a system fatal error if the
bounds of the current process stack are overflowed. This is done
by preceding all stack areas with a 4K guard page.
At <Architecture>/x86/core/Kconfig.intel64:72
Included via Kconfig:8 → Kconfig.zephyr:39 → <Architecture>/Kconfig:12 → <Architecture>/x86/Kconfig:483
Menu path: (Top) → X86 Architecture Options
config X86_STACK_PROTECTION
bool
default y if HW_STACK_PROTECTION
select THREAD_STACK_INFO
depends on X86_64 && X86
help
This option leverages the MMU to cause a system fatal error if the
bounds of the current process stack are overflowed. This is done
by preceding all stack areas with a 4K guard page.
(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)