diff options
Diffstat (limited to 'ANDROID_3.4.5/arch/parisc/Kconfig.debug')
-rw-r--r-- | ANDROID_3.4.5/arch/parisc/Kconfig.debug | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/ANDROID_3.4.5/arch/parisc/Kconfig.debug b/ANDROID_3.4.5/arch/parisc/Kconfig.debug deleted file mode 100644 index 7305ac8f..00000000 --- a/ANDROID_3.4.5/arch/parisc/Kconfig.debug +++ /dev/null @@ -1,29 +0,0 @@ -menu "Kernel hacking" - -source "lib/Kconfig.debug" - -config DEBUG_RODATA - bool "Write protect kernel read-only data structures" - depends on DEBUG_KERNEL - help - Mark the kernel read-only data as write-protected in the pagetables, - in order to catch accidental (and incorrect) writes to such const - data. This option may have a slight performance impact because a - portion of the kernel code won't be covered by a TLB anymore. - If in doubt, say "N". - -config DEBUG_STRICT_USER_COPY_CHECKS - bool "Strict copy size checks" - depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING - ---help--- - Enabling this option turns a certain set of sanity checks for user - copy operations into compile time failures. - - The copy_from_user() etc checks are there to help test if there - are sufficient security checks on the length argument of - the copy operation, by having gcc prove that the argument is - within bounds. - - If unsure, or if you run an older (pre 4.4) gcc, say N. - -endmenu |