blob: 7305ac8f7f5ba7438ac2207ada7aaeb60b419d36 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001menu "Kernel hacking"
2
3source "lib/Kconfig.debug"
4
Helge Deller1bcdd852006-01-13 13:21:06 -07005config DEBUG_RODATA
6 bool "Write protect kernel read-only data structures"
7 depends on DEBUG_KERNEL
8 help
9 Mark the kernel read-only data as write-protected in the pagetables,
10 in order to catch accidental (and incorrect) writes to such const
11 data. This option may have a slight performance impact because a
12 portion of the kernel code won't be covered by a TLB anymore.
13 If in doubt, say "N".
14
Helge Deller888c31f2010-02-01 19:56:33 +000015config DEBUG_STRICT_USER_COPY_CHECKS
16 bool "Strict copy size checks"
17 depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING
18 ---help---
19 Enabling this option turns a certain set of sanity checks for user
20 copy operations into compile time failures.
21
22 The copy_from_user() etc checks are there to help test if there
23 are sufficient security checks on the length argument of
24 the copy operation, by having gcc prove that the argument is
25 within bounds.
26
27 If unsure, or if you run an older (pre 4.4) gcc, say N.
28
Linus Torvalds1da177e2005-04-16 15:20:36 -070029endmenu