Blame view

arch/s390/Kconfig.debug 1.03 KB
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1
  menu "Kernel hacking"
1f194a4c3   Heiko Carstens   [PATCH] lockdep: ...
2
  config TRACE_IRQFLAGS_SUPPORT
6f9a3c330   Martin Schwidefsky   [S390] cleanup s3...
3
  	def_bool y
1f194a4c3   Heiko Carstens   [PATCH] lockdep: ...
4

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5
  source "lib/Kconfig.debug"
ec6743bb0   Hendrik Brueckner   [S390] mm: add de...
6
7
8
9
10
11
12
13
14
15
16
  config STRICT_DEVMEM
  	def_bool y
  	prompt "Filter access to /dev/mem"
  	---help---
  	  This option restricts access to /dev/mem.  If this option is
  	  disabled, you allow userspace access to all memory, including
  	  kernel and userspace memory. Accidental memory access is likely
  	  to be disastrous.
  	  Memory access is required for experts who want to debug the kernel.
  
  	  If you are unsure, say Y.
1dcec254a   Heiko Carstens   [S390] uaccess: i...
17
  config DEBUG_STRICT_USER_COPY_CHECKS
6f9a3c330   Martin Schwidefsky   [S390] cleanup s3...
18
19
  	def_bool n
  	prompt "Strict user copy size checks"
1dcec254a   Heiko Carstens   [S390] uaccess: i...
20
21
22
23
24
25
26
27
28
29
  	---help---
  	  Enabling this option turns a certain set of sanity checks for user
  	  copy operations into compile time warnings.
  
  	  The copy_from_user() etc checks are there to help test if there
  	  are sufficient security checks on the length argument of
  	  the copy operation, by having gcc prove that the argument is
  	  within bounds.
  
  	  If unsure, or if you run an older (pre 4.4) gcc, say N.
305b15232   Jan Glauber   [S390] Write prot...
30
31
32
  config DEBUG_SET_MODULE_RONX
  	def_bool y
  	depends on MODULES
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
33
  endmenu