Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - S index         

CONFIG_STRICT_DEVMEM: Filter access to /dev/mem

General informations

The Linux kernel configuration item CONFIG_STRICT_DEVMEM has multiple definitions:

found in arch/tile/Kconfig

The configuration item CONFIG_STRICT_DEVMEM:

Help text

(none)

Filter access to /dev/mem found in arch/arm/Kconfig.debug

The configuration item CONFIG_STRICT_DEVMEM:

Help text

If this option is disabled, you allow userspace (root) access to all of memory, including kernel and userspace memory. Accidental access to this is obviously disastrous, but specific access can be used by people debugging the kernel.

If this option is switched on, the /dev/mem file only allows userspace access to memory mapped peripherals.

If in doubt, say Y.

Filter access to /dev/mem found in arch/arm64/Kconfig.debug

The configuration item CONFIG_STRICT_DEVMEM:

Help text

If this option is disabled, you allow userspace (root) access to all of memory, including kernel and userspace memory. Accidental access to this is obviously disastrous, but specific access can be used by people debugging the kernel.

If this option is switched on, the /dev/mem file only allows userspace access to memory mapped peripherals.

If in doubt, say Y.

Filter access to /dev/mem found in arch/powerpc/Kconfig.debug

The configuration item CONFIG_STRICT_DEVMEM:

Help text

This option restricts access to /dev/mem. If this option is disabled, you allow userspace access to all memory, including kernel and userspace memory. Accidental memory access is likely to be disastrous. Memory access is required for experts who want to debug the kernel.

If you are unsure, say Y.

Filter access to /dev/mem found in arch/s390/Kconfig.debug

The configuration item CONFIG_STRICT_DEVMEM:

Help text

This option restricts access to /dev/mem. If this option is disabled, you allow userspace access to all memory, including kernel and userspace memory. Accidental memory access is likely to be disastrous. Memory access is required for experts who want to debug the kernel.

If you are unsure, say Y.

Filter access to /dev/mem found in arch/unicore32/Kconfig.debug

The configuration item CONFIG_STRICT_DEVMEM:

Help text

If this option is disabled, you allow userspace (root) access to all of memory, including kernel and userspace memory. Accidental access to this is obviously disastrous, but specific access can be used by people debugging the kernel.

If this option is switched on, the /dev/mem file only allows userspace access to memory mapped peripherals.

If in doubt, say Y.

Filter access to /dev/mem found in arch/x86/Kconfig.debug

The configuration item CONFIG_STRICT_DEVMEM:

Help text

If this option is disabled, you allow userspace (root) access to all of memory, including kernel and userspace memory. Accidental access to this is obviously disastrous, but specific access can be used by people debugging the kernel. Note that with PAT support enabled, even in this case there are restrictions on /dev/mem use due to the cache aliasing requirements.

If this option is switched on, the /dev/mem file only allows userspace access to PCI space and the BIOS code and data regions. This is sufficient for dosemu and X and all common users of /dev/mem.

If in doubt, say Y.

Hardware

LKDDb

Raw data from LKDDb:

Sources

This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).

The data is retrived from:

Automatic links from google (and ads)

Custom Search

Popular queries:

Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - S index

Automatically generated (in year 2014) with gen-web-lkddb.py in lkddb-sources.