Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | menu "Kernel hacking" |
| 2 | |
Heiko Carstens | 1f194a4 | 2006-07-03 00:24:46 -0700 | [diff] [blame] | 3 | config TRACE_IRQFLAGS_SUPPORT |
| 4 | bool |
| 5 | default y |
| 6 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 7 | source "lib/Kconfig.debug" |
| 8 | |
Hendrik Brueckner | ec6743b | 2010-11-10 10:05:55 +0100 | [diff] [blame] | 9 | config STRICT_DEVMEM |
| 10 | def_bool y |
| 11 | prompt "Filter access to /dev/mem" |
| 12 | ---help--- |
| 13 | This option restricts access to /dev/mem. If this option is |
| 14 | disabled, you allow userspace access to all memory, including |
| 15 | kernel and userspace memory. Accidental memory access is likely |
| 16 | to be disastrous. |
| 17 | Memory access is required for experts who want to debug the kernel. |
| 18 | |
| 19 | If you are unsure, say Y. |
| 20 | |
Heiko Carstens | 1dcec25 | 2010-02-26 22:37:22 +0100 | [diff] [blame] | 21 | config DEBUG_STRICT_USER_COPY_CHECKS |
| 22 | bool "Strict user copy size checks" |
| 23 | ---help--- |
| 24 | Enabling this option turns a certain set of sanity checks for user |
| 25 | copy operations into compile time warnings. |
| 26 | |
| 27 | The copy_from_user() etc checks are there to help test if there |
| 28 | are sufficient security checks on the length argument of |
| 29 | the copy operation, by having gcc prove that the argument is |
| 30 | within bounds. |
| 31 | |
| 32 | If unsure, or if you run an older (pre 4.4) gcc, say N. |
| 33 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 34 | endmenu |