summaryrefslogtreecommitdiff
path: root/ANDROID_3.4.5/arch/parisc/Kconfig.debug
diff options
context:
space:
mode:
Diffstat (limited to 'ANDROID_3.4.5/arch/parisc/Kconfig.debug')
-rw-r--r--ANDROID_3.4.5/arch/parisc/Kconfig.debug29
1 files changed, 0 insertions, 29 deletions
diff --git a/ANDROID_3.4.5/arch/parisc/Kconfig.debug b/ANDROID_3.4.5/arch/parisc/Kconfig.debug
deleted file mode 100644
index 7305ac8f..00000000
--- a/ANDROID_3.4.5/arch/parisc/Kconfig.debug
+++ /dev/null
@@ -1,29 +0,0 @@
-menu "Kernel hacking"
-
-source "lib/Kconfig.debug"
-
-config DEBUG_RODATA
- bool "Write protect kernel read-only data structures"
- depends on DEBUG_KERNEL
- help
- Mark the kernel read-only data as write-protected in the pagetables,
- in order to catch accidental (and incorrect) writes to such const
- data. This option may have a slight performance impact because a
- portion of the kernel code won't be covered by a TLB anymore.
- If in doubt, say "N".
-
-config DEBUG_STRICT_USER_COPY_CHECKS
- bool "Strict copy size checks"
- depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING
- ---help---
- Enabling this option turns a certain set of sanity checks for user
- copy operations into compile time failures.
-
- The copy_from_user() etc checks are there to help test if there
- are sufficient security checks on the length argument of
- the copy operation, by having gcc prove that the argument is
- within bounds.
-
- If unsure, or if you run an older (pre 4.4) gcc, say N.
-
-endmenu