Blame view
arch/s390/Kconfig.debug
1.03 KB
1da177e4c Linux-2.6.12-rc2 |
1 |
menu "Kernel hacking" |
1f194a4c3 [PATCH] lockdep: ... |
2 |
config TRACE_IRQFLAGS_SUPPORT |
6f9a3c330 [S390] cleanup s3... |
3 |
def_bool y |
1f194a4c3 [PATCH] lockdep: ... |
4 |
|
1da177e4c Linux-2.6.12-rc2 |
5 |
source "lib/Kconfig.debug" |
ec6743bb0 [S390] mm: add de... |
6 7 8 9 10 11 12 13 14 15 16 |
config STRICT_DEVMEM def_bool y prompt "Filter access to /dev/mem" ---help--- This option restricts access to /dev/mem. If this option is disabled, you allow userspace access to all memory, including kernel and userspace memory. Accidental memory access is likely to be disastrous. Memory access is required for experts who want to debug the kernel. If you are unsure, say Y. |
1dcec254a [S390] uaccess: i... |
17 |
config DEBUG_STRICT_USER_COPY_CHECKS |
6f9a3c330 [S390] cleanup s3... |
18 19 |
def_bool n prompt "Strict user copy size checks" |
1dcec254a [S390] uaccess: i... |
20 21 22 23 24 25 26 27 28 29 |
---help--- Enabling this option turns a certain set of sanity checks for user copy operations into compile time warnings. The copy_from_user() etc checks are there to help test if there are sufficient security checks on the length argument of the copy operation, by having gcc prove that the argument is within bounds. If unsure, or if you run an older (pre 4.4) gcc, say N. |
305b15232 [S390] Write prot... |
30 31 32 |
config DEBUG_SET_MODULE_RONX def_bool y depends on MODULES |
1da177e4c Linux-2.6.12-rc2 |
33 |
endmenu |