| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | menu "Kernel hacking" | 
 | 2 |  | 
 | 3 | source "lib/Kconfig.debug" | 
 | 4 |  | 
| Helge Deller | 1bcdd85 | 2006-01-13 13:21:06 -0700 | [diff] [blame] | 5 | config DEBUG_RODATA | 
 | 6 |        bool "Write protect kernel read-only data structures" | 
 | 7 |        depends on DEBUG_KERNEL | 
 | 8 |        help | 
 | 9 |          Mark the kernel read-only data as write-protected in the pagetables, | 
 | 10 |          in order to catch accidental (and incorrect) writes to such const | 
 | 11 |          data. This option may have a slight performance impact because a | 
 | 12 |          portion of the kernel code won't be covered by a TLB anymore. | 
 | 13 |          If in doubt, say "N". | 
 | 14 |  | 
| Helge Deller | 888c31f | 2010-02-01 19:56:33 +0000 | [diff] [blame] | 15 | config DEBUG_STRICT_USER_COPY_CHECKS | 
 | 16 | 	bool "Strict copy size checks" | 
 | 17 | 	depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING | 
 | 18 | 	---help--- | 
 | 19 | 	  Enabling this option turns a certain set of sanity checks for user | 
 | 20 | 	  copy operations into compile time failures. | 
 | 21 |  | 
 | 22 | 	  The copy_from_user() etc checks are there to help test if there | 
 | 23 | 	  are sufficient security checks on the length argument of | 
 | 24 | 	  the copy operation, by having gcc prove that the argument is | 
 | 25 | 	  within bounds. | 
 | 26 |  | 
 | 27 | 	  If unsure, or if you run an older (pre 4.4) gcc, say N. | 
 | 28 |  | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 29 | endmenu |