Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | menu "Kernel hacking" |
2 | ||
3 | source "lib/Kconfig.debug" | |
4 | ||
1bcdd854 HD |
5 | config DEBUG_RODATA |
6 | bool "Write protect kernel read-only data structures" | |
7 | depends on DEBUG_KERNEL | |
8 | help | |
9 | Mark the kernel read-only data as write-protected in the pagetables, | |
10 | in order to catch accidental (and incorrect) writes to such const | |
11 | data. This option may have a slight performance impact because a | |
12 | portion of the kernel code won't be covered by a TLB anymore. | |
13 | If in doubt, say "N". | |
14 | ||
888c31fc HD |
15 | config DEBUG_STRICT_USER_COPY_CHECKS |
16 | bool "Strict copy size checks" | |
17 | depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING | |
18 | ---help--- | |
19 | Enabling this option turns a certain set of sanity checks for user | |
20 | copy operations into compile time failures. | |
21 | ||
22 | The copy_from_user() etc checks are there to help test if there | |
23 | are sufficient security checks on the length argument of | |
24 | the copy operation, by having gcc prove that the argument is | |
25 | within bounds. | |
26 | ||
27 | If unsure, or if you run an older (pre 4.4) gcc, say N. | |
28 | ||
1da177e4 | 29 | endmenu |