1menu "Kernel hacking" 2 3config TRACE_IRQFLAGS_SUPPORT 4 def_bool y 5 6source "lib/Kconfig.debug" 7 8config STRICT_DEVMEM 9 def_bool y 10 prompt "Filter access to /dev/mem" 11 ---help--- 12 This option restricts access to /dev/mem. If this option is 13 disabled, you allow userspace access to all memory, including 14 kernel and userspace memory. Accidental memory access is likely 15 to be disastrous. 16 Memory access is required for experts who want to debug the kernel. 17 18 If you are unsure, say Y. 19 20config DEBUG_STRICT_USER_COPY_CHECKS 21 def_bool n 22 prompt "Strict user copy size checks" 23 ---help--- 24 Enabling this option turns a certain set of sanity checks for user 25 copy operations into compile time warnings. 26 27 The copy_from_user() etc checks are there to help test if there 28 are sufficient security checks on the length argument of 29 the copy operation, by having gcc prove that the argument is 30 within bounds. 31 32 If unsure, or if you run an older (pre 4.4) gcc, say N. 33 34config S390_PTDUMP 35 bool "Export kernel pagetable layout to userspace via debugfs" 36 depends on DEBUG_KERNEL 37 select DEBUG_FS 38 ---help--- 39 Say Y here if you want to show the kernel pagetable layout in a 40 debugfs file. This information is only useful for kernel developers 41 who are working in architecture specific areas of the kernel. 42 It is probably not a good idea to enable this feature in a production 43 kernel. 44 If in doubt, say "N" 45 46config DEBUG_SET_MODULE_RONX 47 def_bool y 48 depends on MODULES 49endmenu 50