12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697 |
- config ARM64_PTDUMP_CORE
- def_bool n
- config ARM64_PTDUMP_DEBUGFS
- bool "Export kernel pagetable layout to userspace via debugfs"
- depends on DEBUG_KERNEL
- select ARM64_PTDUMP_CORE
- select DEBUG_FS
- help
- Say Y here if you want to show the kernel pagetable layout in a
- debugfs file. This information is only useful for kernel developers
- who are working in architecture specific areas of the kernel.
- It is probably not a good idea to enable this feature in a production
- kernel.
- If in doubt, say N.
- config PID_IN_CONTEXTIDR
- bool "Write the current PID to the CONTEXTIDR register"
- help
- Enabling this option causes the kernel to write the current PID to
- the CONTEXTIDR register, at the expense of some additional
- instructions during context switch. Say Y here only if you are
- planning to use hardware trace tools with this kernel.
- config ARM64_RANDOMIZE_TEXT_OFFSET
- bool "Randomize TEXT_OFFSET at build time"
- help
- Say Y here if you want the image load offset (AKA TEXT_OFFSET)
- of the kernel to be randomized at build-time. When selected,
- this option will cause TEXT_OFFSET to be randomized upon any
- build of the kernel, and the offset will be reflected in the
- text_offset field of the resulting Image. This can be used to
- fuzz-test bootloaders which respect text_offset.
- This option is intended for bootloader and/or kernel testing
- only. Bootloaders must make no assumptions regarding the value
- of TEXT_OFFSET and platforms must not require a specific
- value.
- config DEBUG_WX
- bool "Warn on W+X mappings at boot"
- select ARM64_PTDUMP_CORE
- ---help---
- Generate a warning if any W+X mappings are found at boot.
- This is useful for discovering cases where the kernel is leaving
- W+X mappings after applying NX, as such mappings are a security risk.
- This check also includes UXN, which should be set on all kernel
- mappings.
- Look for a message in dmesg output like this:
- arm64/mm: Checked W+X mappings: passed, no W+X pages found.
- or like this, if the check failed:
- arm64/mm: Checked W+X mappings: FAILED, <N> W+X pages found.
- Note that even if the check fails, your kernel is possibly
- still fine, as W+X mappings are not a security hole in
- themselves, what they do is that they make the exploitation
- of other unfixed kernel bugs easier.
- There is no runtime or memory usage effect of this option
- once the kernel has booted up - it's a one time check.
- If in doubt, say "Y".
- config DEBUG_ALIGN_RODATA
- depends on STRICT_KERNEL_RWX
- bool "Align linker sections up to SECTION_SIZE"
- help
- If this option is enabled, sections that may potentially be marked as
- read only or non-executable will be aligned up to the section size of
- the kernel. This prevents sections from being split into pages and
- avoids a potential TLB penalty. The downside is an increase in
- alignment and potentially wasted space. Turn on this option if
- performance is more important than memory pressure.
- If in doubt, say N.
- config DEBUG_EFI
- depends on EFI && DEBUG_INFO
- bool "UEFI debugging"
- help
- Enable this option to include EFI specific debugging features into
- the kernel that are only useful when using a debug build of the
- UEFI firmware
- config ARM64_RELOC_TEST
- depends on m
- tristate "Relocation testing module"
- source "drivers/hwtracing/coresight/Kconfig"
|