mirror of
				https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
				synced 2025-10-31 20:42:39 +00:00 
			
		
		
		
	 888c31fc83
			
		
	
	
		888c31fc83
		
	
	
	
	
		
			
			Add CONFIG_DEBUG_STRICT_USER_COPY_CHECKS, copied from the x86 implementation. Tested with 32 and 64bit kernel. Signed-off-by: Helge Deller <deller@gmx.de> Signed-off-by: Kyle McMartin <kyle@mcmartin.ca>
		
			
				
	
	
		
			30 lines
		
	
	
		
			1.0 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			30 lines
		
	
	
		
			1.0 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| menu "Kernel hacking"
 | |
| 
 | |
| source "lib/Kconfig.debug"
 | |
| 
 | |
| config DEBUG_RODATA
 | |
|        bool "Write protect kernel read-only data structures"
 | |
|        depends on DEBUG_KERNEL
 | |
|        help
 | |
|          Mark the kernel read-only data as write-protected in the pagetables,
 | |
|          in order to catch accidental (and incorrect) writes to such const
 | |
|          data. This option may have a slight performance impact because a
 | |
|          portion of the kernel code won't be covered by a TLB anymore.
 | |
|          If in doubt, say "N".
 | |
| 
 | |
| config DEBUG_STRICT_USER_COPY_CHECKS
 | |
| 	bool "Strict copy size checks"
 | |
| 	depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING
 | |
| 	---help---
 | |
| 	  Enabling this option turns a certain set of sanity checks for user
 | |
| 	  copy operations into compile time failures.
 | |
| 
 | |
| 	  The copy_from_user() etc checks are there to help test if there
 | |
| 	  are sufficient security checks on the length argument of
 | |
| 	  the copy operation, by having gcc prove that the argument is
 | |
| 	  within bounds.
 | |
| 
 | |
| 	  If unsure, or if you run an older (pre 4.4) gcc, say N.
 | |
| 
 | |
| endmenu
 |