2005-04-17 00:20:36 +02:00
|
|
|
menu "Kernel hacking"
|
|
|
|
|
2006-07-03 09:24:46 +02:00
|
|
|
config TRACE_IRQFLAGS_SUPPORT
|
2011-01-05 12:47:15 +01:00
|
|
|
def_bool y
|
2006-07-03 09:24:46 +02:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
source "lib/Kconfig.debug"
|
|
|
|
|
2010-11-10 10:05:55 +01:00
|
|
|
config STRICT_DEVMEM
|
|
|
|
def_bool y
|
|
|
|
prompt "Filter access to /dev/mem"
|
|
|
|
---help---
|
|
|
|
This option restricts access to /dev/mem. If this option is
|
|
|
|
disabled, you allow userspace access to all memory, including
|
|
|
|
kernel and userspace memory. Accidental memory access is likely
|
|
|
|
to be disastrous.
|
|
|
|
Memory access is required for experts who want to debug the kernel.
|
|
|
|
|
|
|
|
If you are unsure, say Y.
|
|
|
|
|
2010-02-26 22:37:22 +01:00
|
|
|
config DEBUG_STRICT_USER_COPY_CHECKS
|
2011-01-05 12:47:15 +01:00
|
|
|
def_bool n
|
|
|
|
prompt "Strict user copy size checks"
|
2010-02-26 22:37:22 +01:00
|
|
|
---help---
|
|
|
|
Enabling this option turns a certain set of sanity checks for user
|
|
|
|
copy operations into compile time warnings.
|
|
|
|
|
|
|
|
The copy_from_user() etc checks are there to help test if there
|
|
|
|
are sufficient security checks on the length argument of
|
|
|
|
the copy operation, by having gcc prove that the argument is
|
|
|
|
within bounds.
|
|
|
|
|
|
|
|
If unsure, or if you run an older (pre 4.4) gcc, say N.
|
|
|
|
|
2011-03-15 17:08:22 +01:00
|
|
|
config DEBUG_SET_MODULE_RONX
|
|
|
|
def_bool y
|
|
|
|
depends on MODULES
|
2005-04-17 00:20:36 +02:00
|
|
|
endmenu
|