|  | menu "Kernel hacking" | 
|  |  | 
|  | source "lib/Kconfig.debug" | 
|  |  | 
|  | config DEBUG_RODATA | 
|  | bool "Write protect kernel read-only data structures" | 
|  | depends on DEBUG_KERNEL | 
|  | help | 
|  | Mark the kernel read-only data as write-protected in the pagetables, | 
|  | in order to catch accidental (and incorrect) writes to such const | 
|  | data. This option may have a slight performance impact because a | 
|  | portion of the kernel code won't be covered by a TLB anymore. | 
|  | If in doubt, say "N". | 
|  |  | 
|  | config DEBUG_STRICT_USER_COPY_CHECKS | 
|  | bool "Strict copy size checks" | 
|  | depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING | 
|  | ---help--- | 
|  | Enabling this option turns a certain set of sanity checks for user | 
|  | copy operations into compile time failures. | 
|  |  | 
|  | The copy_from_user() etc checks are there to help test if there | 
|  | are sufficient security checks on the length argument of | 
|  | the copy operation, by having gcc prove that the argument is | 
|  | within bounds. | 
|  |  | 
|  | If unsure, or if you run an older (pre 4.4) gcc, say N. | 
|  |  | 
|  | endmenu |