| .. | .. |
|---|
| 2 | 2 | |
|---|
| 3 | 3 | config PPC_DISABLE_WERROR |
|---|
| 4 | 4 | bool "Don't build arch/powerpc code with -Werror" |
|---|
| 5 | | - default n |
|---|
| 6 | 5 | help |
|---|
| 7 | 6 | This option tells the compiler NOT to build the code under |
|---|
| 8 | 7 | arch/powerpc with the -Werror flag (which means warnings |
|---|
| .. | .. |
|---|
| 56 | 55 | config CODE_PATCHING_SELFTEST |
|---|
| 57 | 56 | bool "Run self-tests of the code-patching code" |
|---|
| 58 | 57 | depends on DEBUG_KERNEL |
|---|
| 59 | | - default n |
|---|
| 60 | 58 | |
|---|
| 61 | 59 | config JUMP_LABEL_FEATURE_CHECKS |
|---|
| 62 | 60 | bool "Enable use of jump label for cpu/mmu_has_feature()" |
|---|
| .. | .. |
|---|
| 70 | 68 | config JUMP_LABEL_FEATURE_CHECK_DEBUG |
|---|
| 71 | 69 | bool "Do extra check on feature fixup calls" |
|---|
| 72 | 70 | depends on DEBUG_KERNEL && JUMP_LABEL_FEATURE_CHECKS |
|---|
| 73 | | - default n |
|---|
| 74 | 71 | help |
|---|
| 75 | 72 | This tries to catch incorrect usage of cpu_has_feature() and |
|---|
| 76 | 73 | mmu_has_feature() in the code. |
|---|
| .. | .. |
|---|
| 80 | 77 | config FTR_FIXUP_SELFTEST |
|---|
| 81 | 78 | bool "Run self-tests of the feature-fixup code" |
|---|
| 82 | 79 | depends on DEBUG_KERNEL |
|---|
| 83 | | - default n |
|---|
| 84 | 80 | |
|---|
| 85 | 81 | config MSI_BITMAP_SELFTEST |
|---|
| 86 | 82 | bool "Run self-tests of the MSI bitmap code" |
|---|
| 87 | 83 | depends on DEBUG_KERNEL |
|---|
| 88 | | - default n |
|---|
| 89 | 84 | |
|---|
| 90 | 85 | config PPC_IRQ_SOFT_MASK_DEBUG |
|---|
| 91 | 86 | bool "Include extra checks for powerpc irq soft masking" |
|---|
| 92 | | - default n |
|---|
| 93 | 87 | |
|---|
| 94 | 88 | config XMON |
|---|
| 95 | 89 | bool "Include xmon kernel debugger" |
|---|
| .. | .. |
|---|
| 122 | 116 | Include support for disassembling in xmon. You probably want |
|---|
| 123 | 117 | to say Y here, unless you're building for a memory-constrained |
|---|
| 124 | 118 | system. |
|---|
| 119 | + |
|---|
| 120 | +config XMON_DEFAULT_RO_MODE |
|---|
| 121 | + bool "Restrict xmon to read-only operations by default" |
|---|
| 122 | + depends on XMON |
|---|
| 123 | + default y |
|---|
| 124 | + help |
|---|
| 125 | + Operate xmon in read-only mode. The cmdline options 'xmon=rw' and |
|---|
| 126 | + 'xmon=ro' override this default. |
|---|
| 125 | 127 | |
|---|
| 126 | 128 | config DEBUGGER |
|---|
| 127 | 129 | bool |
|---|
| .. | .. |
|---|
| 220 | 222 | help |
|---|
| 221 | 223 | Select this to enable early debugging for IBM 44x chips via the |
|---|
| 222 | 224 | inbuilt serial port. If you enable this, ensure you set |
|---|
| 223 | | - PPC_EARLY_DEBUG_44x_PHYSLOW below to suit your target board. |
|---|
| 225 | + PPC_EARLY_DEBUG_44x_PHYSLOW below to suit your target board. |
|---|
| 224 | 226 | |
|---|
| 225 | 227 | config PPC_EARLY_DEBUG_40x |
|---|
| 226 | 228 | bool "Early serial debugging for IBM/AMCC 40x CPUs" |
|---|
| .. | .. |
|---|
| 228 | 230 | help |
|---|
| 229 | 231 | Select this to enable early debugging for IBM 40x chips via the |
|---|
| 230 | 232 | inbuilt serial port. This works on chips with a 16550 compatible |
|---|
| 231 | | - UART. Xilinx chips with uartlite cannot use this option. |
|---|
| 233 | + UART. |
|---|
| 232 | 234 | |
|---|
| 233 | 235 | config PPC_EARLY_DEBUG_CPM |
|---|
| 234 | 236 | bool "Early serial debugging for Freescale CPM-based serial ports" |
|---|
| .. | .. |
|---|
| 323 | 325 | default "0x40000200" |
|---|
| 324 | 326 | help |
|---|
| 325 | 327 | You probably want 0x40000200 for ebony boards and |
|---|
| 326 | | - 0x40000300 for taishan |
|---|
| 328 | + 0x40000300 for taishan |
|---|
| 327 | 329 | |
|---|
| 328 | 330 | config PPC_EARLY_DEBUG_44x_PHYSHIGH |
|---|
| 329 | 331 | hex "EPRN of early debug UART physical address" |
|---|
| .. | .. |
|---|
| 358 | 360 | If you are unsure, say N. |
|---|
| 359 | 361 | |
|---|
| 360 | 362 | config PPC_PTDUMP |
|---|
| 361 | | - bool "Export kernel pagetable layout to userspace via debugfs" |
|---|
| 362 | | - depends on DEBUG_KERNEL && DEBUG_FS |
|---|
| 363 | | - help |
|---|
| 363 | + bool "Export kernel pagetable layout to userspace via debugfs" |
|---|
| 364 | + depends on DEBUG_KERNEL && DEBUG_FS |
|---|
| 365 | + help |
|---|
| 364 | 366 | This option exports the state of the kernel pagetables to a |
|---|
| 365 | 367 | debugfs file. This is only useful for kernel developers who are |
|---|
| 366 | 368 | working in architecture specific areas of the kernel - probably |
|---|
| .. | .. |
|---|
| 368 | 370 | |
|---|
| 369 | 371 | If you are unsure, say N. |
|---|
| 370 | 372 | |
|---|
| 371 | | -config PPC_HTDUMP |
|---|
| 372 | | - def_bool y |
|---|
| 373 | | - depends on PPC_PTDUMP && PPC_BOOK3S_64 |
|---|
| 373 | +config PPC_DEBUG_WX |
|---|
| 374 | + bool "Warn on W+X mappings at boot" |
|---|
| 375 | + depends on PPC_PTDUMP && STRICT_KERNEL_RWX |
|---|
| 376 | + help |
|---|
| 377 | + Generate a warning if any W+X mappings are found at boot. |
|---|
| 378 | + |
|---|
| 379 | + This is useful for discovering cases where the kernel is leaving |
|---|
| 380 | + W+X mappings after applying NX, as such mappings are a security risk. |
|---|
| 381 | + |
|---|
| 382 | + Note that even if the check fails, your kernel is possibly |
|---|
| 383 | + still fine, as W+X mappings are not a security hole in |
|---|
| 384 | + themselves, what they do is that they make the exploitation |
|---|
| 385 | + of other unfixed kernel bugs easier. |
|---|
| 386 | + |
|---|
| 387 | + There is no runtime or memory usage effect of this option |
|---|
| 388 | + once the kernel has booted up - it's a one time check. |
|---|
| 389 | + |
|---|
| 390 | + If in doubt, say "Y". |
|---|
| 374 | 391 | |
|---|
| 375 | 392 | config PPC_FAST_ENDIAN_SWITCH |
|---|
| 376 | 393 | bool "Deprecated fast endian-switch syscall" |
|---|
| 377 | | - depends on DEBUG_KERNEL && PPC_BOOK3S_64 |
|---|
| 378 | | - help |
|---|
| 394 | + depends on DEBUG_KERNEL && PPC_BOOK3S_64 |
|---|
| 395 | + help |
|---|
| 379 | 396 | If you're unsure what this is, say N. |
|---|
| 397 | + |
|---|
| 398 | +config KASAN_SHADOW_OFFSET |
|---|
| 399 | + hex |
|---|
| 400 | + depends on KASAN |
|---|
| 401 | + default 0xe0000000 |
|---|