The latest development version of this page may be more current than this released 2.3.0 version.
CONFIG_X86_STACK_PROTECTION

(No prompt – not directly user assignable.)

Type: bool

Help

This option leverages the MMU to cause a system fatal error if the bounds of the current process stack are overflowed. This is done by preceding all stack areas with a 4K guard page.

Help

This option leverages the MMU to cause a system fatal error if the bounds of the current process stack are overflowed. This is done by preceding all stack areas with a 4K guard page.

Direct dependencies

(!X86_64 && X86) || (X86_64 && X86)

(Includes any dependencies from ifs and menus.)

Symbols selected by this symbol

Kconfig definitions

At arch/x86/core/Kconfig.ia32:55

Included via Kconfig:8Kconfig.zephyr:29arch/Kconfig:12arch/x86/Kconfig:279

Menu path: (Top) → X86 Architecture Options → Processor Capabilities

config X86_STACK_PROTECTION
    bool
    default y if HW_STACK_PROTECTION
    select SET_GDT
    select GDT_DYNAMIC
    select X86_ENABLE_TSS
    depends on !X86_64 && X86
    help
      This option leverages the MMU to cause a system fatal error if the
      bounds of the current process stack are overflowed. This is done
      by preceding all stack areas with a 4K guard page.

At arch/x86/core/Kconfig.intel64:66

Included via Kconfig:8Kconfig.zephyr:29arch/Kconfig:12arch/x86/Kconfig:280

Menu path: (Top) → X86 Architecture Options

config X86_STACK_PROTECTION
    bool
    default y if HW_STACK_PROTECTION
    select THREAD_STACK_INFO
    depends on X86_64 && X86
    help
      This option leverages the MMU to cause a system fatal error if the
      bounds of the current process stack are overflowed. This is done
      by preceding all stack areas with a 4K guard page.

(The ‘depends on’ condition includes propagated dependencies from ifs and menus.)