Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | menu "Kernel hacking" |
| 2 | |
| 3 | source "lib/Kconfig.debug" |
| 4 | |
Helge Deller | 1bcdd85 | 2006-01-13 13:21:06 -0700 | [diff] [blame] | 5 | config DEBUG_RODATA |
| 6 | bool "Write protect kernel read-only data structures" |
| 7 | depends on DEBUG_KERNEL |
| 8 | help |
| 9 | Mark the kernel read-only data as write-protected in the pagetables, |
| 10 | in order to catch accidental (and incorrect) writes to such const |
| 11 | data. This option may have a slight performance impact because a |
| 12 | portion of the kernel code won't be covered by a TLB anymore. |
| 13 | If in doubt, say "N". |
| 14 | |
Helge Deller | 888c31f | 2010-02-01 19:56:33 +0000 | [diff] [blame] | 15 | config DEBUG_STRICT_USER_COPY_CHECKS |
| 16 | bool "Strict copy size checks" |
| 17 | depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING |
| 18 | ---help--- |
| 19 | Enabling this option turns a certain set of sanity checks for user |
| 20 | copy operations into compile time failures. |
| 21 | |
| 22 | The copy_from_user() etc checks are there to help test if there |
| 23 | are sufficient security checks on the length argument of |
| 24 | the copy operation, by having gcc prove that the argument is |
| 25 | within bounds. |
| 26 | |
| 27 | If unsure, or if you run an older (pre 4.4) gcc, say N. |
| 28 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 29 | endmenu |