blob: d76cef3fef37bac6f3df5ad6d336a30cdfc8233f [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001menu "Kernel hacking"
2
Heiko Carstens1f194a42006-07-03 00:24:46 -07003config TRACE_IRQFLAGS_SUPPORT
Martin Schwidefsky6f9a3c32011-01-05 12:47:15 +01004 def_bool y
Heiko Carstens1f194a42006-07-03 00:24:46 -07005
Linus Torvalds1da177e2005-04-16 15:20:36 -07006source "lib/Kconfig.debug"
7
Hendrik Bruecknerec6743b2010-11-10 10:05:55 +01008config STRICT_DEVMEM
9 def_bool y
10 prompt "Filter access to /dev/mem"
11 ---help---
12 This option restricts access to /dev/mem. If this option is
13 disabled, you allow userspace access to all memory, including
14 kernel and userspace memory. Accidental memory access is likely
15 to be disastrous.
16 Memory access is required for experts who want to debug the kernel.
17
18 If you are unsure, say Y.
19
Heiko Carstens1dcec252010-02-26 22:37:22 +010020config DEBUG_STRICT_USER_COPY_CHECKS
Martin Schwidefsky6f9a3c32011-01-05 12:47:15 +010021 def_bool n
22 prompt "Strict user copy size checks"
Heiko Carstens1dcec252010-02-26 22:37:22 +010023 ---help---
24 Enabling this option turns a certain set of sanity checks for user
25 copy operations into compile time warnings.
26
27 The copy_from_user() etc checks are there to help test if there
28 are sufficient security checks on the length argument of
29 the copy operation, by having gcc prove that the argument is
30 within bounds.
31
32 If unsure, or if you run an older (pre 4.4) gcc, say N.
33
Jan Glauber305b1522011-03-15 17:08:22 +010034config DEBUG_SET_MODULE_RONX
35 def_bool y
36 depends on MODULES
Linus Torvalds1da177e2005-04-16 15:20:36 -070037endmenu