2005-04-17 05:20:36 +07:00
|
|
|
menu "Kernel hacking"
|
|
|
|
|
|
|
|
source "lib/Kconfig.debug"
|
|
|
|
|
2006-01-14 03:21:06 +07:00
|
|
|
config DEBUG_RODATA
|
|
|
|
bool "Write protect kernel read-only data structures"
|
|
|
|
depends on DEBUG_KERNEL
|
|
|
|
help
|
|
|
|
Mark the kernel read-only data as write-protected in the pagetables,
|
|
|
|
in order to catch accidental (and incorrect) writes to such const
|
|
|
|
data. This option may have a slight performance impact because a
|
|
|
|
portion of the kernel code won't be covered by a TLB anymore.
|
|
|
|
If in doubt, say "N".
|
|
|
|
|
2010-02-02 02:56:33 +07:00
|
|
|
config DEBUG_STRICT_USER_COPY_CHECKS
|
|
|
|
bool "Strict copy size checks"
|
|
|
|
depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING
|
|
|
|
---help---
|
|
|
|
Enabling this option turns a certain set of sanity checks for user
|
|
|
|
copy operations into compile time failures.
|
|
|
|
|
|
|
|
The copy_from_user() etc checks are there to help test if there
|
|
|
|
are sufficient security checks on the length argument of
|
|
|
|
the copy operation, by having gcc prove that the argument is
|
|
|
|
within bounds.
|
|
|
|
|
|
|
|
If unsure, or if you run an older (pre 4.4) gcc, say N.
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
endmenu
|