]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | menu "Kernel hacking" |
2 | ||
1f194a4c | 3 | config TRACE_IRQFLAGS_SUPPORT |
6f9a3c33 | 4 | def_bool y |
1f194a4c | 5 | |
1da177e4 LT |
6 | source "lib/Kconfig.debug" |
7 | ||
ec6743bb HB |
8 | config STRICT_DEVMEM |
9 | def_bool y | |
10 | prompt "Filter access to /dev/mem" | |
11 | ---help--- | |
12 | This option restricts access to /dev/mem. If this option is | |
13 | disabled, you allow userspace access to all memory, including | |
14 | kernel and userspace memory. Accidental memory access is likely | |
15 | to be disastrous. | |
16 | Memory access is required for experts who want to debug the kernel. | |
17 | ||
18 | If you are unsure, say Y. | |
19 | ||
1dcec254 | 20 | config DEBUG_STRICT_USER_COPY_CHECKS |
6f9a3c33 MS |
21 | def_bool n |
22 | prompt "Strict user copy size checks" | |
1dcec254 HC |
23 | ---help--- |
24 | Enabling this option turns a certain set of sanity checks for user | |
25 | copy operations into compile time warnings. | |
26 | ||
27 | The copy_from_user() etc checks are there to help test if there | |
28 | are sufficient security checks on the length argument of | |
29 | the copy operation, by having gcc prove that the argument is | |
30 | within bounds. | |
31 | ||
32 | If unsure, or if you run an older (pre 4.4) gcc, say N. | |
33 | ||
1da177e4 | 34 | endmenu |