1 # SPDX-License-Identifier: GPL-2.0 !! 1 # SPDX-License-Identifier: GPL-2.0-only 2 # Select 32 or 64 bit << 3 config 64BIT 2 config 64BIT 4 bool "64-bit kernel" if "$(ARCH)" = "x !! 3 bool "64-bit kernel" if "$(ARCH)" = "sparc" 5 default "$(ARCH)" != "i386" !! 4 default "$(ARCH)" = "sparc64" 6 help 5 help 7 Say yes to build a 64-bit kernel - f !! 6 SPARC is a family of RISC microprocessors designed and marketed by 8 Say no to build a 32-bit kernel - fo !! 7 Sun Microsystems, incorporated. They are very widely found in Sun >> 8 workstations and clones. 9 9 10 config X86_32 !! 10 Say yes to build a 64-bit kernel - formerly known as sparc64 11 def_bool y !! 11 Say no to build a 32-bit kernel - formerly known as sparc 12 depends on !64BIT << 13 # Options that are inherently 32-bit k << 14 select ARCH_WANT_IPC_PARSE_VERSION << 15 select CLKSRC_I8253 << 16 select CLONE_BACKWARDS << 17 select GENERIC_VDSO_32 << 18 select HAVE_DEBUG_STACKOVERFLOW << 19 select KMAP_LOCAL << 20 select MODULES_USE_ELF_REL << 21 select OLD_SIGACTION << 22 select ARCH_SPLIT_ARG64 << 23 12 24 config X86_64 !! 13 config SPARC 25 def_bool y !! 14 bool 26 depends on 64BIT !! 15 default y 27 # Options that are inherently 64-bit k !! 16 select ARCH_HAS_CPU_CACHE_ALIASING 28 select ARCH_HAS_GIGANTIC_PAGE !! 17 select ARCH_HAS_DMA_OPS 29 select ARCH_SUPPORTS_INT128 if CC_HAS_ !! 18 select ARCH_MIGHT_HAVE_PC_PARPORT if SPARC64 && PCI 30 select ARCH_SUPPORTS_PER_VMA_LOCK !! 19 select ARCH_MIGHT_HAVE_PC_SERIO 31 select ARCH_SUPPORTS_HUGE_PFNMAP if TR !! 20 select OF 32 select HAVE_ARCH_SOFT_DIRTY !! 21 select OF_PROMTREE >> 22 select HAVE_ASM_MODVERSIONS >> 23 select HAVE_ARCH_KGDB if !SMP || SPARC64 >> 24 select HAVE_ARCH_TRACEHOOK >> 25 select HAVE_ARCH_SECCOMP if SPARC64 >> 26 select HAVE_EXIT_THREAD >> 27 select HAVE_PCI >> 28 select SYSCTL_EXCEPTION_TRACE >> 29 select RTC_CLASS >> 30 select RTC_DRV_M48T59 >> 31 select RTC_SYSTOHC >> 32 select HAVE_ARCH_JUMP_LABEL if SPARC64 >> 33 select GENERIC_IRQ_SHOW >> 34 select ARCH_WANT_IPC_PARSE_VERSION >> 35 select GENERIC_PCI_IOMAP >> 36 select HAS_IOPORT >> 37 select HAVE_HARDLOCKUP_DETECTOR_SPARC64 if SPARC64 >> 38 select HAVE_CBPF_JIT if SPARC32 >> 39 select HAVE_EBPF_JIT if SPARC64 >> 40 select HAVE_DEBUG_BUGVERBOSE >> 41 select GENERIC_SMP_IDLE_THREAD 33 select MODULES_USE_ELF_RELA 42 select MODULES_USE_ELF_RELA >> 43 select PCI_SYSCALL if PCI >> 44 select PCI_MSI_ARCH_FALLBACKS if PCI_MSI >> 45 select ODD_RT_SIGACTION >> 46 select OLD_SIGSUSPEND >> 47 select CPU_NO_EFFICIENT_FFS >> 48 select LOCKDEP_SMALL if LOCKDEP 34 select NEED_DMA_MAP_STATE 49 select NEED_DMA_MAP_STATE 35 select SWIOTLB !! 50 select NEED_SG_DMA_LENGTH 36 select ARCH_HAS_ELFCORE_COMPAT !! 51 select TRACE_IRQFLAGS_SUPPORT 37 select ZONE_DMA32 << 38 select EXECMEM if DYNAMIC_FTRACE << 39 52 40 config FORCE_DYNAMIC_FTRACE !! 53 config SPARC32 41 def_bool y !! 54 def_bool !64BIT 42 depends on X86_32 !! 55 select ARCH_32BIT_OFF_T 43 depends on FUNCTION_TRACER !! 56 select ARCH_HAS_CPU_FINALIZE_INIT if !SMP 44 select DYNAMIC_FTRACE !! 57 select ARCH_HAS_SYNC_DMA_FOR_CPU 45 help !! 58 select CLZ_TAB 46 We keep the static function tracing !! 59 select DMA_DIRECT_REMAP 47 in order to test the non static func !! 60 select GENERIC_ATOMIC64 48 generic code, as other architectures !! 61 select GENERIC_LIB_CMPDI2 49 only need to keep it around for x86_ !! 62 select GENERIC_LIB_UCMPDI2 50 for x86_32. For x86_32, force DYNAMI !! 63 select HAVE_UID16 51 # !! 64 select HAVE_PAGE_SIZE_4KB 52 # Arch settings !! 65 select LOCK_MM_AND_FIND_VMA 53 # !! 66 select OLD_SIGACTION 54 # ( Note that options that are marked 'if X86_ !! 67 select ZONE_DMA 55 # ported to 32-bit as well. ) !! 68 56 # !! 69 config SPARC64 57 config X86 !! 70 def_bool 64BIT 58 def_bool y !! 71 select ALTERNATE_USER_ADDRESS_SPACE 59 # !! 72 select HAVE_FUNCTION_TRACER 60 # Note: keep this list sorted alphabet !! 73 select HAVE_FUNCTION_GRAPH_TRACER 61 # !! 74 select HAVE_KRETPROBES 62 select ACPI_LEGACY_TABLES_LOOKUP !! 75 select HAVE_KPROBES 63 select ACPI_SYSTEM_POWER_STATES_SUPPOR !! 76 select MMU_GATHER_RCU_TABLE_FREE if SMP 64 select ACPI_HOTPLUG_CPU !! 77 select MMU_GATHER_MERGE_VMAS 65 select ARCH_32BIT_OFF_T !! 78 select MMU_GATHER_NO_FLUSH_CACHE 66 select ARCH_CLOCKSOURCE_INIT !! 79 select HAVE_ARCH_TRANSPARENT_HUGEPAGE 67 select ARCH_CONFIGURES_CPU_MITIGATIONS !! 80 select HAVE_DYNAMIC_FTRACE 68 select ARCH_CORRECT_STACKTRACE_ON_KRET !! 81 select HAVE_FTRACE_MCOUNT_RECORD 69 select ARCH_ENABLE_HUGEPAGE_MIGRATION !! 82 select HAVE_PAGE_SIZE_8KB 70 select ARCH_ENABLE_MEMORY_HOTPLUG if X !! 83 select HAVE_SYSCALL_TRACEPOINTS 71 select ARCH_ENABLE_MEMORY_HOTREMOVE if !! 84 select HAVE_CONTEXT_TRACKING_USER 72 select ARCH_ENABLE_SPLIT_PMD_PTLOCK if !! 85 select HAVE_TIF_NOHZ 73 select ARCH_ENABLE_THP_MIGRATION if X8 !! 86 select HAVE_DEBUG_KMEMLEAK 74 select ARCH_HAS_ACPI_TABLE_UPGRADE !! 87 select IOMMU_HELPER 75 select ARCH_HAS_CACHE_LINE_SIZE !! 88 select SPARSE_IRQ 76 select ARCH_HAS_CPU_CACHE_INVALIDATE_M !! 89 select RTC_DRV_CMOS 77 select ARCH_HAS_CPU_FINALIZE_INIT !! 90 select RTC_DRV_BQ4802 78 select ARCH_HAS_CPU_PASID !! 91 select RTC_DRV_SUN4V 79 select ARCH_HAS_CURRENT_STACK_POINTER !! 92 select RTC_DRV_STARFIRE 80 select ARCH_HAS_DEBUG_VIRTUAL !! 93 select HAVE_PERF_EVENTS 81 select ARCH_HAS_DEBUG_VM_PGTABLE !! 94 select PERF_USE_VMALLOC 82 select ARCH_HAS_DEVMEM_IS_ALLOWED << 83 select ARCH_HAS_DMA_OPS << 84 select ARCH_HAS_EARLY_DEBUG << 85 select ARCH_HAS_ELF_RANDOMIZE << 86 select ARCH_HAS_FAST_MULTIPLIER << 87 select ARCH_HAS_FORTIFY_SOURCE << 88 select ARCH_HAS_GCOV_PROFILE_ALL << 89 select ARCH_HAS_KCOV << 90 select ARCH_HAS_KERNEL_FPU_SUPPORT << 91 select ARCH_HAS_MEM_ENCRYPT << 92 select ARCH_HAS_MEMBARRIER_SYNC_CORE << 93 select ARCH_HAS_NMI_SAFE_THIS_CPU_OPS << 94 select ARCH_HAS_NON_OVERLAPPING_ADDRES << 95 select ARCH_HAS_PMEM_API << 96 select ARCH_HAS_PTE_DEVMAP << 97 select ARCH_HAS_PTE_SPECIAL << 98 select ARCH_HAS_HW_PTE_YOUNG << 99 select ARCH_HAS_NONLEAF_PMD_YOUNG << 100 select ARCH_HAS_UACCESS_FLUSHCACHE << 101 select ARCH_HAS_COPY_MC << 102 select ARCH_HAS_SET_MEMORY << 103 select ARCH_HAS_SET_DIRECT_MAP << 104 select ARCH_HAS_STRICT_KERNEL_RWX << 105 select ARCH_HAS_STRICT_MODULE_RWX << 106 select ARCH_HAS_SYNC_CORE_BEFORE_USERM << 107 select ARCH_HAS_SYSCALL_WRAPPER << 108 select ARCH_HAS_UBSAN << 109 select ARCH_HAS_DEBUG_WX << 110 select ARCH_HAS_ZONE_DMA_SET if EXPERT << 111 select ARCH_HAVE_NMI_SAFE_CMPXCHG 95 select ARCH_HAVE_NMI_SAFE_CMPXCHG 112 select ARCH_HAVE_EXTRA_ELF_NOTES !! 96 select HAVE_C_RECORDMCOUNT 113 select ARCH_MHP_MEMMAP_ON_MEMORY_ENABL !! 97 select HAVE_ARCH_AUDITSYSCALL 114 select ARCH_MIGHT_HAVE_ACPI_PDC << 115 select ARCH_MIGHT_HAVE_PC_PARPORT << 116 select ARCH_MIGHT_HAVE_PC_SERIO << 117 select ARCH_STACKWALK << 118 select ARCH_SUPPORTS_ACPI << 119 select ARCH_SUPPORTS_ATOMIC_RMW 98 select ARCH_SUPPORTS_ATOMIC_RMW 120 select ARCH_SUPPORTS_DEBUG_PAGEALLOC 99 select ARCH_SUPPORTS_DEBUG_PAGEALLOC 121 select ARCH_SUPPORTS_PAGE_TABLE_CHECK !! 100 select HAVE_NMI 122 select ARCH_SUPPORTS_NUMA_BALANCING !! 101 select HAVE_REGS_AND_STACK_ACCESS_API 123 select ARCH_SUPPORTS_KMAP_LOCAL_FORCE_ << 124 select ARCH_SUPPORTS_CFI_CLANG << 125 select ARCH_USES_CFI_TRAPS << 126 select ARCH_SUPPORTS_LTO_CLANG << 127 select ARCH_SUPPORTS_LTO_CLANG_THIN << 128 select ARCH_SUPPORTS_RT << 129 select ARCH_USE_BUILTIN_BSWAP << 130 select ARCH_USE_CMPXCHG_LOCKREF << 131 select ARCH_USE_MEMTEST << 132 select ARCH_USE_QUEUED_RWLOCKS 102 select ARCH_USE_QUEUED_RWLOCKS 133 select ARCH_USE_QUEUED_SPINLOCKS 103 select ARCH_USE_QUEUED_SPINLOCKS 134 select ARCH_USE_SYM_ANNOTATIONS << 135 select ARCH_WANT_BATCHED_UNMAP_TLB_FLU << 136 select ARCH_WANT_DEFAULT_BPF_JIT << 137 select ARCH_WANTS_DYNAMIC_TASK_STRUCT << 138 select ARCH_WANTS_NO_INSTR << 139 select ARCH_WANT_GENERAL_HUGETLB << 140 select ARCH_WANT_HUGE_PMD_SHARE << 141 select ARCH_WANT_LD_ORPHAN_WARN << 142 select ARCH_WANT_OPTIMIZE_DAX_VMEMMAP << 143 select ARCH_WANT_OPTIMIZE_HUGETLB_VMEM << 144 select ARCH_WANTS_THP_SWAP << 145 select ARCH_HAS_PARANOID_L1D_FLUSH << 146 select BUILDTIME_TABLE_SORT << 147 select CLKEVT_I8253 << 148 select CLOCKSOURCE_VALIDATE_LAST_CYCLE << 149 select CLOCKSOURCE_WATCHDOG << 150 # Word-size accesses may read uninitia << 151 # in strings and cause false KMSAN rep << 152 select DCACHE_WORD_ACCESS << 153 select DYNAMIC_SIGFRAME << 154 select EDAC_ATOMIC_SCRUB << 155 select EDAC_SUPPORT << 156 select GENERIC_CLOCKEVENTS_BROADCAST << 157 select GENERIC_CLOCKEVENTS_BROADCAST_I << 158 select GENERIC_CLOCKEVENTS_MIN_ADJUST << 159 select GENERIC_CMOS_UPDATE << 160 select GENERIC_CPU_AUTOPROBE << 161 select GENERIC_CPU_DEVICES << 162 select GENERIC_CPU_VULNERABILITIES << 163 select GENERIC_EARLY_IOREMAP << 164 select GENERIC_ENTRY << 165 select GENERIC_IOMAP << 166 select GENERIC_IRQ_EFFECTIVE_AFF_MASK << 167 select GENERIC_IRQ_MATRIX_ALLOCATOR << 168 select GENERIC_IRQ_MIGRATION << 169 select GENERIC_IRQ_PROBE << 170 select GENERIC_IRQ_RESERVATION_MODE << 171 select GENERIC_IRQ_SHOW << 172 select GENERIC_PENDING_IRQ << 173 select GENERIC_PTDUMP << 174 select GENERIC_SMP_IDLE_THREAD << 175 select GENERIC_TIME_VSYSCALL 104 select GENERIC_TIME_VSYSCALL 176 select GENERIC_GETTIMEOFDAY !! 105 select ARCH_CLOCKSOURCE_DATA 177 select GENERIC_VDSO_TIME_NS !! 106 select ARCH_HAS_PTE_SPECIAL 178 select GENERIC_VDSO_OVERFLOW_PROTECT !! 107 select PCI_DOMAINS if PCI 179 select GUP_GET_PXX_LOW_HIGH !! 108 select ARCH_HAS_GIGANTIC_PAGE 180 select HARDIRQS_SW_RESEND << 181 select HARDLOCKUP_CHECK_TIMESTAMP << 182 select HAS_IOPORT << 183 select HAVE_ACPI_APEI << 184 select HAVE_ACPI_APEI_NMI << 185 select HAVE_ALIGNED_STRUCT_PAGE << 186 select HAVE_ARCH_AUDITSYSCALL << 187 select HAVE_ARCH_HUGE_VMAP << 188 select HAVE_ARCH_HUGE_VMALLOC << 189 select HAVE_ARCH_JUMP_LABEL << 190 select HAVE_ARCH_JUMP_LABEL_RELATIVE << 191 select HAVE_ARCH_KASAN << 192 select HAVE_ARCH_KASAN_VMALLOC << 193 select HAVE_ARCH_KFENCE << 194 select HAVE_ARCH_KMSAN << 195 select HAVE_ARCH_KGDB << 196 select HAVE_ARCH_MMAP_RND_BITS << 197 select HAVE_ARCH_MMAP_RND_COMPAT_BITS << 198 select HAVE_ARCH_COMPAT_MMAP_BASES << 199 select HAVE_ARCH_PREL32_RELOCATIONS << 200 select HAVE_ARCH_SECCOMP_FILTER << 201 select HAVE_ARCH_THREAD_STRUCT_WHITELI << 202 select HAVE_ARCH_STACKLEAK << 203 select HAVE_ARCH_TRACEHOOK << 204 select HAVE_ARCH_TRANSPARENT_HUGEPAGE << 205 select HAVE_ARCH_TRANSPARENT_HUGEPAGE_ << 206 select HAVE_ARCH_USERFAULTFD_WP << 207 select HAVE_ARCH_USERFAULTFD_MINOR << 208 select HAVE_ARCH_VMAP_STACK << 209 select HAVE_ARCH_RANDOMIZE_KSTACK_OFFS << 210 select HAVE_ARCH_WITHIN_STACK_FRAMES << 211 select HAVE_ASM_MODVERSIONS << 212 select HAVE_CMPXCHG_DOUBLE << 213 select HAVE_CMPXCHG_LOCAL << 214 select HAVE_CONTEXT_TRACKING_USER << 215 select HAVE_CONTEXT_TRACKING_USER_OFFS << 216 select HAVE_C_RECORDMCOUNT << 217 select HAVE_OBJTOOL_MCOUNT << 218 select HAVE_OBJTOOL_NOP_MCOUNT << 219 select HAVE_BUILDTIME_MCOUNT_SORT << 220 select HAVE_DEBUG_KMEMLEAK << 221 select HAVE_DMA_CONTIGUOUS << 222 select HAVE_DYNAMIC_FTRACE << 223 select HAVE_DYNAMIC_FTRACE_WITH_REGS << 224 select HAVE_DYNAMIC_FTRACE_WITH_ARGS << 225 select HAVE_DYNAMIC_FTRACE_WITH_DIRECT << 226 select HAVE_SAMPLE_FTRACE_DIRECT << 227 select HAVE_SAMPLE_FTRACE_DIRECT_MULTI << 228 select HAVE_EBPF_JIT << 229 select HAVE_EFFICIENT_UNALIGNED_ACCESS << 230 select HAVE_EISA << 231 select HAVE_EXIT_THREAD << 232 select HAVE_GUP_FAST << 233 select HAVE_FENTRY << 234 select HAVE_FTRACE_MCOUNT_RECORD << 235 select HAVE_FUNCTION_GRAPH_RETVAL << 236 select HAVE_FUNCTION_GRAPH_TRACER << 237 select HAVE_FUNCTION_TRACER << 238 select HAVE_GCC_PLUGINS << 239 select HAVE_HW_BREAKPOINT << 240 select HAVE_IOREMAP_PROT << 241 select HAVE_IRQ_EXIT_ON_IRQ_STACK << 242 select HAVE_IRQ_TIME_ACCOUNTING << 243 select HAVE_JUMP_LABEL_HACK << 244 select HAVE_KERNEL_BZIP2 << 245 select HAVE_KERNEL_GZIP << 246 select HAVE_KERNEL_LZ4 << 247 select HAVE_KERNEL_LZMA << 248 select HAVE_KERNEL_LZO << 249 select HAVE_KERNEL_XZ << 250 select HAVE_KERNEL_ZSTD << 251 select HAVE_KPROBES << 252 select HAVE_KPROBES_ON_FTRACE << 253 select HAVE_FUNCTION_ERROR_INJECTION << 254 select HAVE_KRETPROBES << 255 select HAVE_RETHOOK << 256 select HAVE_LIVEPATCH << 257 select HAVE_MIXED_BREAKPOINTS_REGS << 258 select HAVE_MOD_ARCH_SPECIFIC << 259 select HAVE_MOVE_PMD << 260 select HAVE_MOVE_PUD << 261 select HAVE_NOINSTR_HACK << 262 select HAVE_NMI << 263 select HAVE_NOINSTR_VALIDATION << 264 select HAVE_OBJTOOL << 265 select HAVE_OPTPROBES << 266 select HAVE_PAGE_SIZE_4KB << 267 select HAVE_PCSPKR_PLATFORM << 268 select HAVE_PERF_EVENTS << 269 select HAVE_PERF_EVENTS_NMI << 270 select HAVE_HARDLOCKUP_DETECTOR_PERF << 271 select HAVE_PCI << 272 select HAVE_PERF_REGS << 273 select HAVE_PERF_USER_STACK_DUMP << 274 select MMU_GATHER_RCU_TABLE_FREE << 275 select MMU_GATHER_MERGE_VMAS << 276 select HAVE_POSIX_CPU_TIMERS_TASK_WORK << 277 select HAVE_REGS_AND_STACK_ACCESS_API << 278 select HAVE_RELIABLE_STACKTRACE << 279 select HAVE_FUNCTION_ARG_ACCESS_API << 280 select HAVE_SETUP_PER_CPU_AREA << 281 select HAVE_SOFTIRQ_ON_OWN_STACK 109 select HAVE_SOFTIRQ_ON_OWN_STACK 282 select HAVE_STACKPROTECTOR !! 110 select HAVE_SETUP_PER_CPU_AREA 283 select HAVE_STACK_VALIDATION << 284 select HAVE_STATIC_CALL << 285 select HAVE_STATIC_CALL_INLINE << 286 select HAVE_PREEMPT_DYNAMIC_CALL << 287 select HAVE_RSEQ << 288 select HAVE_RUST << 289 select HAVE_SYSCALL_TRACEPOINTS << 290 select HAVE_UACCESS_VALIDATION << 291 select HAVE_UNSTABLE_SCHED_CLOCK << 292 select HAVE_USER_RETURN_NOTIFIER << 293 select HAVE_GENERIC_VDSO << 294 select VDSO_GETRANDOM << 295 select HOTPLUG_PARALLEL << 296 select HOTPLUG_SMT << 297 select HOTPLUG_SPLIT_STARTUP << 298 select IRQ_FORCED_THREADING << 299 select LOCK_MM_AND_FIND_VMA << 300 select NEED_PER_CPU_EMBED_FIRST_CHUNK 111 select NEED_PER_CPU_EMBED_FIRST_CHUNK 301 select NEED_PER_CPU_PAGE_FIRST_CHUNK 112 select NEED_PER_CPU_PAGE_FIRST_CHUNK 302 select NEED_SG_DMA_LENGTH << 303 select NUMA_MEMBLKS << 304 select PCI_DOMAINS << 305 select PCI_LOCKLESS_CONFIG << 306 select PERF_EVENTS << 307 select RTC_LIB << 308 select RTC_MC146818_LIB << 309 select SPARSE_IRQ << 310 select SYSCTL_EXCEPTION_TRACE << 311 select THREAD_INFO_IN_TASK << 312 select TRACE_IRQFLAGS_SUPPORT << 313 select TRACE_IRQFLAGS_NMI_SUPPORT << 314 select USER_STACKTRACE_SUPPORT << 315 select HAVE_ARCH_KCSAN << 316 select PROC_PID_ARCH_STATUS << 317 select HAVE_ARCH_NODE_DEV_GROUP << 318 select FUNCTION_ALIGNMENT_16B << 319 select FUNCTION_ALIGNMENT_4B << 320 imply IMA_SECURE_AND_OR_TRUSTED_BOOT << 321 select HAVE_DYNAMIC_FTRACE_NO_PATCHABL << 322 113 323 config INSTRUCTION_DECODER !! 114 config ARCH_PROC_KCORE_TEXT 324 def_bool y 115 def_bool y 325 depends on KPROBES || PERF_EVENTS || U << 326 116 327 config OUTPUT_FORMAT !! 117 config CPU_BIG_ENDIAN 328 string << 329 default "elf32-i386" if X86_32 << 330 default "elf64-x86-64" if X86_64 << 331 << 332 config LOCKDEP_SUPPORT << 333 def_bool y 118 def_bool y 334 119 335 config STACKTRACE_SUPPORT 120 config STACKTRACE_SUPPORT 336 def_bool y << 337 << 338 config MMU << 339 def_bool y << 340 << 341 config ARCH_MMAP_RND_BITS_MIN << 342 default 28 if 64BIT << 343 default 8 << 344 << 345 config ARCH_MMAP_RND_BITS_MAX << 346 default 32 if 64BIT << 347 default 16 << 348 << 349 config ARCH_MMAP_RND_COMPAT_BITS_MIN << 350 default 8 << 351 << 352 config ARCH_MMAP_RND_COMPAT_BITS_MAX << 353 default 16 << 354 << 355 config SBUS << 356 bool 121 bool >> 122 default y if SPARC64 357 123 358 config GENERIC_ISA_DMA !! 124 config LOCKDEP_SUPPORT 359 def_bool y << 360 depends on ISA_DMA_API << 361 << 362 config GENERIC_CSUM << 363 bool << 364 default y if KMSAN || KASAN << 365 << 366 config GENERIC_BUG << 367 def_bool y << 368 depends on BUG << 369 select GENERIC_BUG_RELATIVE_POINTERS i << 370 << 371 config GENERIC_BUG_RELATIVE_POINTERS << 372 bool 125 bool 373 !! 126 default y if SPARC64 374 config ARCH_MAY_HAVE_PC_FDC << 375 def_bool y << 376 depends on ISA_DMA_API << 377 << 378 config GENERIC_CALIBRATE_DELAY << 379 def_bool y << 380 << 381 config ARCH_HAS_CPU_RELAX << 382 def_bool y << 383 127 384 config ARCH_HIBERNATION_POSSIBLE 128 config ARCH_HIBERNATION_POSSIBLE 385 def_bool y !! 129 def_bool y if SPARC64 386 << 387 config ARCH_SUSPEND_POSSIBLE << 388 def_bool y << 389 130 390 config AUDIT_ARCH 131 config AUDIT_ARCH 391 def_bool y if X86_64 !! 132 bool 392 !! 133 default y 393 config KASAN_SHADOW_OFFSET << 394 hex << 395 depends on KASAN << 396 default 0xdffffc0000000000 << 397 << 398 config HAVE_INTEL_TXT << 399 def_bool y << 400 depends on INTEL_IOMMU && ACPI << 401 << 402 config X86_64_SMP << 403 def_bool y << 404 depends on X86_64 && SMP << 405 << 406 config ARCH_SUPPORTS_UPROBES << 407 def_bool y << 408 134 409 config FIX_EARLYCON_MEM !! 135 config MMU 410 def_bool y !! 136 bool >> 137 default y 411 138 412 config DYNAMIC_PHYSICAL_MASK !! 139 config HIGHMEM 413 bool 140 bool >> 141 default y if SPARC32 >> 142 select KMAP_LOCAL 414 143 415 config PGTABLE_LEVELS 144 config PGTABLE_LEVELS 416 int !! 145 default 4 if 64BIT 417 default 5 if X86_5LEVEL !! 146 default 3 418 default 4 if X86_64 !! 147 419 default 3 if X86_PAE !! 148 config ARCH_SUPPORTS_UPROBES 420 default 2 !! 149 def_bool y if SPARC64 421 << 422 config CC_HAS_SANE_STACKPROTECTOR << 423 bool << 424 default $(success,$(srctree)/scripts/g << 425 default $(success,$(srctree)/scripts/g << 426 help << 427 We have to make sure stack protector << 428 the compiler produces broken code or << 429 the segment on 32-bit kernels. << 430 150 431 menu "Processor type and features" 151 menu "Processor type and features" 432 152 433 config SMP 153 config SMP 434 bool "Symmetric multi-processing suppo 154 bool "Symmetric multi-processing support" 435 help 155 help 436 This enables support for systems wit 156 This enables support for systems with more than one CPU. If you have 437 a system with only one CPU, say N. I 157 a system with only one CPU, say N. If you have a system with more 438 than one CPU, say Y. 158 than one CPU, say Y. 439 159 440 If you say N here, the kernel will r 160 If you say N here, the kernel will run on uni- and multiprocessor 441 machines, but will use only one CPU 161 machines, but will use only one CPU of a multiprocessor machine. If 442 you say Y here, the kernel will run 162 you say Y here, the kernel will run on many, but not all, 443 uniprocessor machines. On a uniproce 163 uniprocessor machines. On a uniprocessor machine, the kernel 444 will run faster if you say N here. 164 will run faster if you say N here. 445 165 446 Note that if you say Y here and choo << 447 "Pentium" under "Processor family", << 448 architectures. Similarly, multiproce << 449 architecture may not work on all Pen << 450 << 451 People using multiprocessor machines 166 People using multiprocessor machines who say Y here should also say 452 Y to "Enhanced Real Time Clock Suppo 167 Y to "Enhanced Real Time Clock Support", below. The "Advanced Power 453 Management" code will be disabled if 168 Management" code will be disabled if you say Y here. 454 169 455 See also <file:Documentation/arch/x8 !! 170 See also <file:Documentation/admin-guide/lockup-watchdogs.rst> and the SMP-HOWTO 456 <file:Documentation/admin-guide/lock !! 171 available at <https://www.tldp.org/docs.html#howto>. 457 <http://www.tldp.org/docs.html#howto << 458 << 459 If you don't know what to do here, s << 460 << 461 config X86_X2APIC << 462 bool "Support x2apic" << 463 depends on X86_LOCAL_APIC && X86_64 && << 464 help << 465 This enables x2apic support on CPUs << 466 << 467 This allows 32-bit apic IDs (so it c << 468 and accesses the local apic via MSRs << 469 << 470 Some Intel systems circa 2022 and la << 471 and can not fall back to the legacy << 472 enabled in the BIOS. They will boot << 473 without enabling this option. << 474 172 475 If you don't know what to do here, s 173 If you don't know what to do here, say N. 476 174 477 config X86_POSTED_MSI !! 175 config NR_CPUS 478 bool "Enable MSI and MSI-x delivery by !! 176 int "Maximum number of CPUs" 479 depends on X86_64 && IRQ_REMAP << 480 help << 481 This enables MSIs that are under int << 482 posted interrupts to the host kernel << 483 potentially be improved by coalescin << 484 frequency bursts. << 485 << 486 If you don't know what to do here, s << 487 << 488 config X86_MPPARSE << 489 bool "Enable MPS table" if ACPI << 490 default y << 491 depends on X86_LOCAL_APIC << 492 help << 493 For old smp systems that do not have << 494 (esp with 64bit cpus) with acpi supp << 495 << 496 config X86_CPU_RESCTRL << 497 bool "x86 CPU resource control support << 498 depends on X86 && (CPU_SUP_INTEL || CP << 499 select KERNFS << 500 select PROC_CPU_RESCTRL if PRO << 501 help << 502 Enable x86 CPU resource control supp << 503 << 504 Provide support for the allocation a << 505 usage by the CPU. << 506 << 507 Intel calls this Intel Resource Dire << 508 (Intel(R) RDT). More information abo << 509 Intel x86 Architecture Software Deve << 510 << 511 AMD calls this AMD Platform Quality << 512 More information about AMD QoS can b << 513 Platform Quality of Service Extensio << 514 << 515 Say N if unsure. << 516 << 517 config X86_FRED << 518 bool "Flexible Return and Event Delive << 519 depends on X86_64 << 520 help << 521 When enabled, try to use Flexible Re << 522 instead of the legacy SYSCALL/SYSENT << 523 ring transitions and exception/inter << 524 system supports it. << 525 << 526 config X86_BIGSMP << 527 bool "Support for big SMP systems with << 528 depends on SMP && X86_32 << 529 help << 530 This option is needed for the system << 531 << 532 config X86_EXTENDED_PLATFORM << 533 bool "Support for extended (non-PC) x8 << 534 default y << 535 help << 536 If you disable this option then the << 537 standard PC platforms. (which covers << 538 systems out there.) << 539 << 540 If you enable this option then you'l << 541 for the following non-PC x86 platfor << 542 CONFIG_64BIT. << 543 << 544 32-bit platforms (CONFIG_64BIT=n): << 545 Goldfish (Android emulator) << 546 AMD Elan << 547 RDC R-321x SoC << 548 SGI 320/540 (Visual Workstatio << 549 STA2X11-based (e.g. Northville << 550 Moorestown MID devices << 551 << 552 64-bit platforms (CONFIG_64BIT=y): << 553 Numascale NumaChip << 554 ScaleMP vSMP << 555 SGI Ultraviolet << 556 << 557 If you have one of these systems, or << 558 generic distribution kernel, say Y h << 559 << 560 # This is an alphabetically sorted list of 64 << 561 # Please maintain the alphabetic order if and << 562 config X86_NUMACHIP << 563 bool "Numascale NumaChip" << 564 depends on X86_64 << 565 depends on X86_EXTENDED_PLATFORM << 566 depends on NUMA << 567 depends on SMP << 568 depends on X86_X2APIC << 569 depends on PCI_MMCONFIG << 570 help << 571 Adds support for Numascale NumaChip << 572 enable more than ~168 cores. << 573 If you don't have one of these, you << 574 << 575 config X86_VSMP << 576 bool "ScaleMP vSMP" << 577 select HYPERVISOR_GUEST << 578 select PARAVIRT << 579 depends on X86_64 && PCI << 580 depends on X86_EXTENDED_PLATFORM << 581 depends on SMP 177 depends on SMP 582 help !! 178 range 2 32 if SPARC32 583 Support for ScaleMP vSMP systems. S !! 179 range 2 4096 if SPARC64 584 supposed to run on these EM64T-based !! 180 default 32 if SPARC32 585 if you have one of these machines. !! 181 default 4096 if SPARC64 586 << 587 config X86_UV << 588 bool "SGI Ultraviolet" << 589 depends on X86_64 << 590 depends on X86_EXTENDED_PLATFORM << 591 depends on NUMA << 592 depends on EFI << 593 depends on KEXEC_CORE << 594 depends on X86_X2APIC << 595 depends on PCI << 596 help << 597 This option is needed in order to su << 598 If you don't have one of these, you << 599 << 600 # Following is an alphabetically sorted list o << 601 # Please maintain the alphabetic order if and << 602 << 603 config X86_GOLDFISH << 604 bool "Goldfish (Virtual Platform)" << 605 depends on X86_EXTENDED_PLATFORM << 606 help << 607 Enable support for the Goldfish virt << 608 for Android development. Unless you << 609 Goldfish emulator say N here. << 610 << 611 config X86_INTEL_CE << 612 bool "CE4100 TV platform" << 613 depends on PCI << 614 depends on PCI_GODIRECT << 615 depends on X86_IO_APIC << 616 depends on X86_32 << 617 depends on X86_EXTENDED_PLATFORM << 618 select X86_REBOOTFIXUPS << 619 select OF << 620 select OF_EARLY_FLATTREE << 621 help << 622 Select for the Intel CE media proces << 623 This option compiles in support for << 624 boxes and media devices. << 625 << 626 config X86_INTEL_MID << 627 bool "Intel MID platform support" << 628 depends on X86_EXTENDED_PLATFORM << 629 depends on X86_PLATFORM_DEVICES << 630 depends on PCI << 631 depends on X86_64 || (PCI_GOANY && X86 << 632 depends on X86_IO_APIC << 633 select I2C << 634 select DW_APB_TIMER << 635 select INTEL_SCU_PCI << 636 help << 637 Select to build a kernel capable of << 638 Internet Device) platform systems wh << 639 interfaces. If you are building for << 640 << 641 Intel MID platforms are based on an << 642 consume less power than most of the << 643 << 644 config X86_INTEL_QUARK << 645 bool "Intel Quark platform support" << 646 depends on X86_32 << 647 depends on X86_EXTENDED_PLATFORM << 648 depends on X86_PLATFORM_DEVICES << 649 depends on X86_TSC << 650 depends on PCI << 651 depends on PCI_GOANY << 652 depends on X86_IO_APIC << 653 select IOSF_MBI << 654 select INTEL_IMR << 655 select COMMON_CLK << 656 help << 657 Select to include support for Quark << 658 Say Y here if you have a Quark based << 659 compatible Intel Galileo. << 660 << 661 config X86_INTEL_LPSS << 662 bool "Intel Low Power Subsystem Suppor << 663 depends on X86 && ACPI && PCI << 664 select COMMON_CLK << 665 select PINCTRL << 666 select IOSF_MBI << 667 help << 668 Select to build support for Intel Lo << 669 found on Intel Lynxpoint PCH. Select << 670 things like clock tree (common clock << 671 which are needed by the LPSS periphe << 672 << 673 config X86_AMD_PLATFORM_DEVICE << 674 bool "AMD ACPI2Platform devices suppor << 675 depends on ACPI << 676 select COMMON_CLK << 677 select PINCTRL << 678 help << 679 Select to interpret AMD specific ACP << 680 such as I2C, UART, GPIO found on AMD << 681 I2C and UART depend on COMMON_CLK to << 682 implemented under PINCTRL subsystem. << 683 << 684 config IOSF_MBI << 685 tristate "Intel SoC IOSF Sideband supp << 686 depends on PCI << 687 help << 688 This option enables sideband registe << 689 platforms. On these platforms the IO << 690 MSR's for some register accesses, mo << 691 and power. Drivers may query the ava << 692 determine if they need the sideband << 693 platforms. The sideband is available << 694 This list is not meant to be exclusi << 695 - BayTrail << 696 - Braswell << 697 - Quark << 698 << 699 You should say Y if you are running << 700 << 701 config IOSF_MBI_DEBUG << 702 bool "Enable IOSF sideband access thro << 703 depends on IOSF_MBI && DEBUG_FS << 704 help << 705 Select this option to expose the IOS << 706 MDR, MCRX) through debugfs to write << 707 different units on the SoC. This is << 708 state information for debug and anal << 709 mechanism, users of this option woul << 710 device they want to access. << 711 << 712 If you don't require the option or a << 713 << 714 config X86_RDC321X << 715 bool "RDC R-321x SoC" << 716 depends on X86_32 << 717 depends on X86_EXTENDED_PLATFORM << 718 select M486 << 719 select X86_REBOOTFIXUPS << 720 help << 721 This option is needed for RDC R-321x << 722 as R-8610-(G). << 723 If you don't have one of these chips << 724 << 725 config X86_32_NON_STANDARD << 726 bool "Support non-standard 32-bit SMP << 727 depends on X86_32 && SMP << 728 depends on X86_EXTENDED_PLATFORM << 729 help << 730 This option compiles in the bigsmp a << 731 subarchitectures. It is intended fo << 732 kernel. If you select them all, kern << 733 one and will fallback to default. << 734 182 735 # Alphabetically sorted list of Non standard 3 !! 183 source "kernel/Kconfig.hz" 736 << 737 config X86_SUPPORTS_MEMORY_FAILURE << 738 def_bool y << 739 # MCE code calls memory_failure(): << 740 depends on X86_MCE << 741 # On 32-bit this adds too big of NODES << 742 # On 32-bit SPARSEMEM adds too big of << 743 depends on X86_64 || !SPARSEMEM << 744 select ARCH_SUPPORTS_MEMORY_FAILURE << 745 << 746 config STA2X11 << 747 bool "STA2X11 Companion Chip Support" << 748 depends on X86_32_NON_STANDARD && PCI << 749 select SWIOTLB << 750 select MFD_STA2X11 << 751 select GPIOLIB << 752 help << 753 This adds support for boards based o << 754 a.k.a. "ConneXt". The chip is used i << 755 PC chipset, so all "standard" periph << 756 option is selected the kernel will s << 757 standard PC machines. << 758 << 759 config X86_32_IRIS << 760 tristate "Eurobraille/Iris poweroff mo << 761 depends on X86_32 << 762 help << 763 The Iris machines from EuroBraille d << 764 to shut themselves down properly. A << 765 needed to do so, which is what this << 766 kernel shutdown. << 767 << 768 This is only for Iris machines from << 769 << 770 If unused, say N. << 771 << 772 config SCHED_OMIT_FRAME_POINTER << 773 def_bool y << 774 prompt "Single-depth WCHAN output" << 775 depends on X86 << 776 help << 777 Calculate simpler /proc/<PID>/wchan << 778 is disabled then wchan values will r << 779 caller function. This provides more << 780 at the expense of slightly more sche << 781 << 782 If in doubt, say "Y". << 783 << 784 menuconfig HYPERVISOR_GUEST << 785 bool "Linux guest support" << 786 help << 787 Say Y here to enable options for run << 788 visors. This option enables basic hy << 789 setup. << 790 << 791 If you say N, all options in this su << 792 disabled, and Linux guest support wo << 793 << 794 if HYPERVISOR_GUEST << 795 << 796 config PARAVIRT << 797 bool "Enable paravirtualization code" << 798 depends on HAVE_STATIC_CALL << 799 help << 800 This changes the kernel so it can mo << 801 under a hypervisor, potentially impr << 802 over full virtualization. However, << 803 the kernel is theoretically slower a << 804 184 805 config PARAVIRT_XXL !! 185 config GENERIC_HWEIGHT 806 bool 186 bool 807 << 808 config PARAVIRT_DEBUG << 809 bool "paravirt-ops debugging" << 810 depends on PARAVIRT && DEBUG_KERNEL << 811 help << 812 Enable to debug paravirt_ops interna << 813 a paravirt_op is missing when it is << 814 << 815 config PARAVIRT_SPINLOCKS << 816 bool "Paravirtualization layer for spi << 817 depends on PARAVIRT && SMP << 818 help << 819 Paravirtualized spinlocks allow a pv << 820 spinlock implementation with somethi << 821 (for example, block the virtual CPU << 822 << 823 It has a minimal impact on native ke << 824 benefit on paravirtualized KVM / Xen << 825 << 826 If you are unsure how to answer this << 827 << 828 config X86_HV_CALLBACK_VECTOR << 829 def_bool n << 830 << 831 source "arch/x86/xen/Kconfig" << 832 << 833 config KVM_GUEST << 834 bool "KVM Guest support (including kvm << 835 depends on PARAVIRT << 836 select PARAVIRT_CLOCK << 837 select ARCH_CPUIDLE_HALTPOLL << 838 select X86_HV_CALLBACK_VECTOR << 839 default y 187 default y 840 help << 841 This option enables various optimiza << 842 hypervisor. It includes a paravirtua << 843 of relying on a PIT (or probably oth << 844 underlying device model, the host pr << 845 timing infrastructure such as time o << 846 << 847 config ARCH_CPUIDLE_HALTPOLL << 848 def_bool n << 849 prompt "Disable host haltpoll when loa << 850 help << 851 If virtualized under KVM, disable ho << 852 << 853 config PVH << 854 bool "Support for running PVH guests" << 855 help << 856 This option enables the PVH entry po << 857 as specified in the x86/HVM direct b << 858 << 859 config PARAVIRT_TIME_ACCOUNTING << 860 bool "Paravirtual steal time accountin << 861 depends on PARAVIRT << 862 help << 863 Select this option to enable fine gr << 864 accounting. Time spent executing oth << 865 the current vCPU is discounted from << 866 that, there can be a small performan << 867 << 868 If in doubt, say N here. << 869 << 870 config PARAVIRT_CLOCK << 871 bool << 872 188 873 config JAILHOUSE_GUEST !! 189 config GENERIC_CALIBRATE_DELAY 874 bool "Jailhouse non-root cell support" << 875 depends on X86_64 && PCI << 876 select X86_PM_TIMER << 877 help << 878 This option allows to run Linux as g << 879 cell. You can leave this option disa << 880 Jailhouse and run Linux afterwards i << 881 << 882 config ACRN_GUEST << 883 bool "ACRN Guest support" << 884 depends on X86_64 << 885 select X86_HV_CALLBACK_VECTOR << 886 help << 887 This option allows to run Linux as g << 888 a flexible, lightweight reference op << 889 real-time and safety-criticality in << 890 IOT with small footprint and real-ti << 891 found in https://projectacrn.org/. << 892 << 893 config INTEL_TDX_GUEST << 894 bool "Intel TDX (Trust Domain Extensio << 895 depends on X86_64 && CPU_SUP_INTEL << 896 depends on X86_X2APIC << 897 depends on EFI_STUB << 898 select ARCH_HAS_CC_PLATFORM << 899 select X86_MEM_ENCRYPT << 900 select X86_MCE << 901 select UNACCEPTED_MEMORY << 902 help << 903 Support running as a guest under Int << 904 the guest kernel can not boot or run << 905 TDX includes memory encryption and i << 906 which protect the confidentiality an << 907 memory contents and CPU state. TDX g << 908 some attacks from the VMM. << 909 << 910 endif # HYPERVISOR_GUEST << 911 << 912 source "arch/x86/Kconfig.cpu" << 913 << 914 config HPET_TIMER << 915 def_bool X86_64 << 916 prompt "HPET Timer Support" if X86_32 << 917 help << 918 Use the IA-PC HPET (High Precision E << 919 time in preference to the PIT and RT << 920 present. << 921 HPET is the next generation timer re << 922 The HPET provides a stable time base << 923 systems, unlike the TSC, but it is m << 924 as it is off-chip. The interface us << 925 in the HPET spec, revision 1. << 926 << 927 You can safely choose Y here. Howev << 928 activated if the platform and the BI << 929 Otherwise the 8254 will be used for << 930 << 931 Choose N to continue using the legac << 932 << 933 config HPET_EMULATE_RTC << 934 def_bool y << 935 depends on HPET_TIMER && (RTC_DRV_CMOS << 936 << 937 # Mark as expert because too many people got i << 938 # The code disables itself when not needed. << 939 config DMI << 940 default y << 941 select DMI_SCAN_MACHINE_NON_EFI_FALLBA << 942 bool "Enable DMI scanning" if EXPERT << 943 help << 944 Enabled scanning of DMI to identify << 945 here unless you have verified that y << 946 affected by entries in the DMI black << 947 BIOS code. << 948 << 949 config GART_IOMMU << 950 bool "Old AMD GART IOMMU support" << 951 select IOMMU_HELPER << 952 select SWIOTLB << 953 depends on X86_64 && PCI && AMD_NB << 954 help << 955 Provides a driver for older AMD Athl << 956 GART based hardware IOMMUs. << 957 << 958 The GART supports full DMA access fo << 959 limitations, on systems with more th << 960 for USB, sound, many IDE/SATA chipse << 961 << 962 Newer systems typically have a moder << 963 the CONFIG_AMD_IOMMU=y config option << 964 << 965 In normal configurations this driver << 966 there's more than 3 GB of memory and << 967 32-bit limited device. << 968 << 969 If unsure, say Y. << 970 << 971 config BOOT_VESA_SUPPORT << 972 bool 190 bool 973 help << 974 If true, at least one selected frame << 975 of VESA video modes set at an early << 976 << 977 config MAXSMP << 978 bool "Enable Maximum number of SMP Pro << 979 depends on X86_64 && SMP && DEBUG_KERN << 980 select CPUMASK_OFFSTACK << 981 help << 982 Enable maximum number of CPUS and NU << 983 If unsure, say N. << 984 << 985 # << 986 # The maximum number of CPUs supported: << 987 # << 988 # The main config value is NR_CPUS, which defa << 989 # and which can be configured interactively in << 990 # [NR_CPUS_RANGE_BEGIN ... NR_CPUS_RANGE_END] << 991 # << 992 # The ranges are different on 32-bit and 64-bi << 993 # hardware capabilities and scalability featur << 994 # << 995 # ( If MAXSMP is enabled we just use the highe << 996 # interactive configuration. ) << 997 # << 998 << 999 config NR_CPUS_RANGE_BEGIN << 1000 int << 1001 default NR_CPUS_RANGE_END if MAXSMP << 1002 default 1 if !SMP << 1003 default 2 << 1004 << 1005 config NR_CPUS_RANGE_END << 1006 int << 1007 depends on X86_32 << 1008 default 64 if SMP && X86_BIGSMP << 1009 default 8 if SMP && !X86_BIGSMP << 1010 default 1 if !SMP << 1011 << 1012 config NR_CPUS_RANGE_END << 1013 int << 1014 depends on X86_64 << 1015 default 8192 if SMP && CPUMASK_OFFST << 1016 default 512 if SMP && !CPUMASK_OFFS << 1017 default 1 if !SMP << 1018 << 1019 config NR_CPUS_DEFAULT << 1020 int << 1021 depends on X86_32 << 1022 default 32 if X86_BIGSMP << 1023 default 8 if SMP << 1024 default 1 if !SMP << 1025 << 1026 config NR_CPUS_DEFAULT << 1027 int << 1028 depends on X86_64 << 1029 default 8192 if MAXSMP << 1030 default 64 if SMP << 1031 default 1 if !SMP << 1032 << 1033 config NR_CPUS << 1034 int "Maximum number of CPUs" if SMP & << 1035 range NR_CPUS_RANGE_BEGIN NR_CPUS_RAN << 1036 default NR_CPUS_DEFAULT << 1037 help << 1038 This allows you to specify the maxi << 1039 kernel will support. If CPUMASK_OF << 1040 supported value is 8192, otherwise << 1041 minimum value which makes sense is << 1042 << 1043 This is purely to save memory: each << 1044 to the kernel image. << 1045 << 1046 config SCHED_CLUSTER << 1047 bool "Cluster scheduler support" << 1048 depends on SMP << 1049 default y 191 default y 1050 help << 1051 Cluster scheduler support improves << 1052 making when dealing with machines t << 1053 Cluster usually means a couple of C << 1054 by sharing mid-level caches, last-l << 1055 busses. << 1056 192 1057 config SCHED_SMT !! 193 config ARCH_MAY_HAVE_PC_FDC 1058 def_bool y if SMP !! 194 bool 1059 << 1060 config SCHED_MC << 1061 def_bool y << 1062 prompt "Multi-core scheduler support" << 1063 depends on SMP << 1064 help << 1065 Multi-core scheduler support improv << 1066 making when dealing with multi-core << 1067 increased overhead in some places. << 1068 << 1069 config SCHED_MC_PRIO << 1070 bool "CPU core priorities scheduler s << 1071 depends on SCHED_MC << 1072 select X86_INTEL_PSTATE if CPU_SUP_IN << 1073 select X86_AMD_PSTATE if CPU_SUP_AMD << 1074 select CPU_FREQ << 1075 default y 195 default y 1076 help << 1077 Intel Turbo Boost Max Technology 3. << 1078 core ordering determined at manufac << 1079 certain cores to reach higher turbo << 1080 single threaded workloads) than oth << 1081 << 1082 Enabling this kernel feature teache << 1083 the TBM3 (aka ITMT) priority order << 1084 scheduler's CPU selection logic acc << 1085 overall system performance can be a << 1086 << 1087 This feature will have no effect on << 1088 << 1089 If unsure say Y here. << 1090 << 1091 config UP_LATE_INIT << 1092 def_bool y << 1093 depends on !SMP && X86_LOCAL_APIC << 1094 << 1095 config X86_UP_APIC << 1096 bool "Local APIC support on uniproces << 1097 default PCI_MSI << 1098 depends on X86_32 && !SMP && !X86_32_ << 1099 help << 1100 A local APIC (Advanced Programmable << 1101 integrated interrupt controller in << 1102 system which has a processor with a << 1103 enable and use it. If you say Y her << 1104 have a local APIC, then the kernel << 1105 all. The local APIC supports CPU-ge << 1106 performance counters), and the NMI << 1107 lockups. << 1108 << 1109 config X86_UP_IOAPIC << 1110 bool "IO-APIC support on uniprocessor << 1111 depends on X86_UP_APIC << 1112 help << 1113 An IO-APIC (I/O Advanced Programmab << 1114 SMP-capable replacement for PC-styl << 1115 SMP systems and many recent uniproc << 1116 << 1117 If you have a single-CPU system wit << 1118 to use it. If you say Y here even t << 1119 an IO-APIC, then the kernel will st << 1120 << 1121 config X86_LOCAL_APIC << 1122 def_bool y << 1123 depends on X86_64 || SMP || X86_32_NO << 1124 select IRQ_DOMAIN_HIERARCHY << 1125 << 1126 config ACPI_MADT_WAKEUP << 1127 def_bool y << 1128 depends on X86_64 << 1129 depends on ACPI << 1130 depends on SMP << 1131 depends on X86_LOCAL_APIC << 1132 << 1133 config X86_IO_APIC << 1134 def_bool y << 1135 depends on X86_LOCAL_APIC || X86_UP_I << 1136 << 1137 config X86_REROUTE_FOR_BROKEN_BOOT_IRQS << 1138 bool "Reroute for broken boot IRQs" << 1139 depends on X86_IO_APIC << 1140 help << 1141 This option enables a workaround th << 1142 spurious interrupts. This is recomm << 1143 interrupt handling is used on syste << 1144 superfluous "boot interrupts" canno << 1145 << 1146 Some chipsets generate a legacy INT << 1147 entry in the chipset's IO-APIC is m << 1148 kernel does during interrupt handli << 1149 boot IRQ generation cannot be disab << 1150 the original IRQ line masked so tha << 1151 IRQ" is delivered to the CPUs. The << 1152 kernel to set up the IRQ handler on << 1153 way only one interrupt is delivered << 1154 the spurious second interrupt may c << 1155 down (vital) interrupt lines. << 1156 << 1157 Only affects "broken" chipsets. Int << 1158 increased on these systems. << 1159 << 1160 config X86_MCE << 1161 bool "Machine Check / overheating rep << 1162 select GENERIC_ALLOCATOR << 1163 default y << 1164 help << 1165 Machine Check support allows the pr << 1166 kernel if it detects a problem (e.g << 1167 The action the kernel takes depends << 1168 ranging from warning messages to ha << 1169 << 1170 config X86_MCELOG_LEGACY << 1171 bool "Support for deprecated /dev/mce << 1172 depends on X86_MCE << 1173 help << 1174 Enable support for /dev/mcelog whic << 1175 userspace logging daemon. Consider << 1176 rasdaemon solution. << 1177 << 1178 config X86_MCE_INTEL << 1179 def_bool y << 1180 prompt "Intel MCE features" << 1181 depends on X86_MCE && X86_LOCAL_APIC << 1182 help << 1183 Additional support for intel specif << 1184 the thermal monitor. << 1185 196 1186 config X86_MCE_AMD !! 197 config EMULATED_CMPXCHG 1187 def_bool y !! 198 bool 1188 prompt "AMD MCE features" !! 199 default y if SPARC32 1189 depends on X86_MCE && X86_LOCAL_APIC << 1190 help << 1191 Additional support for AMD specific << 1192 the DRAM Error Threshold. << 1193 << 1194 config X86_ANCIENT_MCE << 1195 bool "Support for old Pentium 5 / Win << 1196 depends on X86_32 && X86_MCE << 1197 help << 1198 Include support for machine check h << 1199 systems. These typically need to be << 1200 line. << 1201 << 1202 config X86_MCE_THRESHOLD << 1203 depends on X86_MCE_AMD || X86_MCE_INT << 1204 def_bool y << 1205 << 1206 config X86_MCE_INJECT << 1207 depends on X86_MCE && X86_LOCAL_APIC << 1208 tristate "Machine check injector supp << 1209 help << 1210 Provide support for injecting machi << 1211 If you don't know what a machine ch << 1212 QA it is safe to say n. << 1213 << 1214 source "arch/x86/events/Kconfig" << 1215 << 1216 config X86_LEGACY_VM86 << 1217 bool "Legacy VM86 support" << 1218 depends on X86_32 << 1219 help 200 help 1220 This option allows user programs to !! 201 Sparc32 does not have a CAS instruction like sparc64. cmpxchg() 1221 mode, which is an 80286-era approxi !! 202 is emulated, and therefore it is not completely atomic. 1222 << 1223 Some very old versions of X and/or << 1224 for user mode setting. Similarly, << 1225 available to accelerate real mode D << 1226 recent version of DOSEMU, X, or vbe << 1227 functional even without kernel VM86 << 1228 fall back to software emulation. Ne << 1229 a 16-bit DOS program where 16-bit p << 1230 mode might be faster than emulation << 1231 enable this option. << 1232 << 1233 Note that any app that works on a 6 << 1234 need this option, as 64-bit kernels << 1235 V8086 mode. This option is also unr << 1236 mode and is not needed to run most << 1237 << 1238 Enabling this option increases the << 1239 and slows down exception handling a << 1240 << 1241 If unsure, say N here. << 1242 203 1243 config VM86 !! 204 # Makefile helpers >> 205 config SPARC32_SMP 1244 bool 206 bool 1245 default X86_LEGACY_VM86 << 1246 << 1247 config X86_16BIT << 1248 bool "Enable support for 16-bit segme << 1249 default y 207 default y 1250 depends on MODIFY_LDT_SYSCALL !! 208 depends on SPARC32 && SMP 1251 help << 1252 This option is required by programs << 1253 protected mode legacy code on x86 p << 1254 this option saves about 300 bytes o << 1255 plus 16K runtime memory on x86-64, << 1256 << 1257 config X86_ESPFIX32 << 1258 def_bool y << 1259 depends on X86_16BIT && X86_32 << 1260 209 1261 config X86_ESPFIX64 !! 210 config SPARC64_SMP 1262 def_bool y !! 211 bool 1263 depends on X86_16BIT && X86_64 << 1264 << 1265 config X86_VSYSCALL_EMULATION << 1266 bool "Enable vsyscall emulation" if E << 1267 default y 212 default y 1268 depends on X86_64 !! 213 depends on SPARC64 && SMP 1269 help << 1270 This enables emulation of the legac << 1271 it is roughly equivalent to booting << 1272 that it will also disable the helpf << 1273 tries to use a vsyscall. With this << 1274 programs will just segfault, citing << 1275 0xffffffffff600?00. << 1276 << 1277 This option is required by many pro << 1278 care should be used even with newer << 1279 214 1280 Disabling this option saves about 7 !! 215 config EARLYFB 1281 possibly 4K of additional runtime p !! 216 bool "Support for early boot text console" 1282 << 1283 config X86_IOPL_IOPERM << 1284 bool "IOPERM and IOPL Emulation" << 1285 default y 217 default y >> 218 depends on SPARC64 >> 219 select FONT_SUN8x16 >> 220 select FONT_SUPPORT 1286 help 221 help 1287 This enables the ioperm() and iopl( !! 222 Say Y here to enable a faster early framebuffer boot console. 1288 for legacy applications. << 1289 << 1290 Legacy IOPL support is an overbroad << 1291 space aside of accessing all 65536 << 1292 interrupts. To gain this access the << 1293 capabilities and permission from po << 1294 modules. << 1295 << 1296 The emulation restricts the functio << 1297 only allowing the full range I/O po << 1298 ability to disable interrupts from << 1299 granted if the hardware IOPL mechan << 1300 << 1301 config TOSHIBA << 1302 tristate "Toshiba Laptop support" << 1303 depends on X86_32 << 1304 help << 1305 This adds a driver to safely access << 1306 the CPU on Toshiba portables with a << 1307 not work on models with a Phoenix B << 1308 is used to set the BIOS and power s << 1309 << 1310 For information on utilities to mak << 1311 Toshiba Linux utilities web site at << 1312 <http://www.buzzard.org.uk/toshiba/ << 1313 << 1314 Say Y if you intend to run this ker << 1315 Say N otherwise. << 1316 223 1317 config X86_REBOOTFIXUPS !! 224 config HOTPLUG_CPU 1318 bool "Enable X86 board specific fixup !! 225 bool "Support for hot-pluggable CPUs" 1319 depends on X86_32 !! 226 depends on SPARC64 && SMP 1320 help 227 help 1321 This enables chipset and/or board s !! 228 Say Y here to experiment with turning CPUs off and on. CPUs 1322 in order to get reboot to work corr !! 229 can be controlled through /sys/devices/system/cpu/cpu#. 1323 some combinations of hardware and B !! 230 Say N if you want to disable CPU hotplug. 1324 this config is intended, is when re << 1325 system. << 1326 << 1327 Currently, the only fixup is for th << 1328 CS5530A and CS5536 chipsets and the << 1329 << 1330 Say Y if you want to enable the fix << 1331 enable this option even if you don' << 1332 Say N otherwise. << 1333 << 1334 config MICROCODE << 1335 def_bool y << 1336 depends on CPU_SUP_AMD || CPU_SUP_INT << 1337 << 1338 config MICROCODE_INITRD32 << 1339 def_bool y << 1340 depends on MICROCODE && X86_32 && BLK << 1341 << 1342 config MICROCODE_LATE_LOADING << 1343 bool "Late microcode loading (DANGERO << 1344 default n << 1345 depends on MICROCODE && SMP << 1346 help << 1347 Loading microcode late, when the sy << 1348 is a tricky business and should be << 1349 of synchronizing all cores and SMT << 1350 not guarantee that cores might not << 1351 use this at your own risk. Late loa << 1352 microcode header indicates that it << 1353 minimal revision check. This minima << 1354 the kernel command line with "micro << 1355 << 1356 config MICROCODE_LATE_FORCE_MINREV << 1357 bool "Enforce late microcode loading << 1358 default n << 1359 depends on MICROCODE_LATE_LOADING << 1360 help << 1361 To prevent that users load microcod << 1362 in use features, newer microcode pa << 1363 in the microcode header, which tell << 1364 revision must be active in the CPU << 1365 late into the running system. If di << 1366 be enforced but the kernel will be << 1367 revision check fails. << 1368 << 1369 This minimal revision check can als << 1370 "microcode.minrev" parameter on the << 1371 << 1372 If unsure say Y. << 1373 << 1374 config X86_MSR << 1375 tristate "/dev/cpu/*/msr - Model-spec << 1376 help << 1377 This device gives privileged proces << 1378 Model-Specific Registers (MSRs). I << 1379 major 202 and minors 0 to 31 for /d << 1380 MSR accesses are directed to a spec << 1381 systems. << 1382 << 1383 config X86_CPUID << 1384 tristate "/dev/cpu/*/cpuid - CPU info << 1385 help << 1386 This device gives processes access << 1387 be executed on a specific processor << 1388 with major 203 and minors 0 to 31 f << 1389 /dev/cpu/31/cpuid. << 1390 << 1391 choice << 1392 prompt "High Memory Support" << 1393 default HIGHMEM4G << 1394 depends on X86_32 << 1395 << 1396 config NOHIGHMEM << 1397 bool "off" << 1398 help << 1399 Linux can use up to 64 Gigabytes of << 1400 However, the address space of 32-bi << 1401 Gigabytes large. That means that, i << 1402 physical memory, not all of it can << 1403 kernel. The physical memory that's << 1404 "high memory". << 1405 << 1406 If you are compiling a kernel which << 1407 more than 1 Gigabyte total physical << 1408 choice and suitable for most users) << 1409 split: 3GB are mapped so that each << 1410 space and the remaining part of the << 1411 by the kernel to permanently map as << 1412 possible. << 1413 << 1414 If the machine has between 1 and 4 << 1415 answer "4GB" here. << 1416 << 1417 If more than 4 Gigabytes is used th << 1418 selection turns Intel PAE (Physical << 1419 PAE implements 3-level paging on IA << 1420 supported by Linux, PAE mode is imp << 1421 processors (Pentium Pro and better) << 1422 then the kernel will not boot on CP << 1423 << 1424 The actual amount of total physical << 1425 auto detected or can be forced by u << 1426 such as "mem=256M". (Try "man bootp << 1427 your boot loader (lilo or loadlin) << 1428 kernel at boot time.) << 1429 << 1430 If unsure, say "off". << 1431 << 1432 config HIGHMEM4G << 1433 bool "4GB" << 1434 help << 1435 Select this if you have a 32-bit pr << 1436 gigabytes of physical RAM. << 1437 << 1438 config HIGHMEM64G << 1439 bool "64GB" << 1440 depends on X86_HAVE_PAE << 1441 select X86_PAE << 1442 help << 1443 Select this if you have a 32-bit pr << 1444 gigabytes of physical RAM. << 1445 << 1446 endchoice << 1447 << 1448 choice << 1449 prompt "Memory split" if EXPERT << 1450 default VMSPLIT_3G << 1451 depends on X86_32 << 1452 help << 1453 Select the desired split between ke << 1454 << 1455 If the address range available to t << 1456 physical memory installed, the rema << 1457 as "high memory". Accessing high me << 1458 than low memory, as it needs to be << 1459 Note that increasing the kernel add << 1460 available to user programs, making << 1461 tighter. Selecting anything other << 1462 will also likely make your kernel i << 1463 kernel modules. << 1464 << 1465 If you are not absolutely sure what << 1466 option alone! << 1467 << 1468 config VMSPLIT_3G << 1469 bool "3G/1G user/kernel split << 1470 config VMSPLIT_3G_OPT << 1471 depends on !X86_PAE << 1472 bool "3G/1G user/kernel split << 1473 config VMSPLIT_2G << 1474 bool "2G/2G user/kernel split << 1475 config VMSPLIT_2G_OPT << 1476 depends on !X86_PAE << 1477 bool "2G/2G user/kernel split << 1478 config VMSPLIT_1G << 1479 bool "1G/3G user/kernel split << 1480 endchoice << 1481 << 1482 config PAGE_OFFSET << 1483 hex << 1484 default 0xB0000000 if VMSPLIT_3G_OPT << 1485 default 0x80000000 if VMSPLIT_2G << 1486 default 0x78000000 if VMSPLIT_2G_OPT << 1487 default 0x40000000 if VMSPLIT_1G << 1488 default 0xC0000000 << 1489 depends on X86_32 << 1490 << 1491 config HIGHMEM << 1492 def_bool y << 1493 depends on X86_32 && (HIGHMEM64G || H << 1494 231 1495 config X86_PAE !! 232 if SPARC64 1496 bool "PAE (Physical Address Extension !! 233 source "drivers/cpufreq/Kconfig" 1497 depends on X86_32 && X86_HAVE_PAE !! 234 endif 1498 select PHYS_ADDR_T_64BIT << 1499 select SWIOTLB << 1500 help << 1501 PAE is required for NX support, and << 1502 larger swapspace support for non-ov << 1503 has the cost of more pagetable look << 1504 consumes more pagetable space per p << 1505 235 1506 config X86_5LEVEL !! 236 config US3_MC 1507 bool "Enable 5-level page tables supp !! 237 tristate "UltraSPARC-III Memory Controller driver" >> 238 depends on SPARC64 1508 default y 239 default y 1509 select DYNAMIC_MEMORY_LAYOUT << 1510 select SPARSEMEM_VMEMMAP << 1511 depends on X86_64 << 1512 help 240 help 1513 5-level paging enables access to la !! 241 This adds a driver for the UltraSPARC-III memory controller. 1514 up to 128 PiB of virtual address sp !! 242 Loading this driver allows exact mnemonic strings to be 1515 physical address space. !! 243 printed in the event of a memory error, so that the faulty DIMM 1516 !! 244 on the motherboard can be matched to the error. 1517 It will be supported by future Inte << 1518 << 1519 A kernel with the option enabled ca << 1520 support 4- or 5-level paging. << 1521 245 1522 See Documentation/arch/x86/x86_64/5 !! 246 If in doubt, say Y, as this information can be very useful. 1523 information. << 1524 247 1525 Say N if unsure. !! 248 # Global things across all Sun machines. 1526 !! 249 config GENERIC_LOCKBREAK 1527 config X86_DIRECT_GBPAGES !! 250 bool 1528 def_bool y !! 251 default y 1529 depends on X86_64 !! 252 depends on SPARC64 && SMP && PREEMPTION 1530 help << 1531 Certain kernel features effectively << 1532 linear 1 GB mappings (even if the C << 1533 supports them), so don't confuse th << 1534 that we have them enabled. << 1535 << 1536 config X86_CPA_STATISTICS << 1537 bool "Enable statistic for Change Pag << 1538 depends on DEBUG_FS << 1539 help << 1540 Expose statistics about the Change << 1541 helps to determine the effectivenes << 1542 page mappings when mapping protecti << 1543 << 1544 config X86_MEM_ENCRYPT << 1545 select ARCH_HAS_FORCE_DMA_UNENCRYPTED << 1546 select DYNAMIC_PHYSICAL_MASK << 1547 def_bool n << 1548 << 1549 config AMD_MEM_ENCRYPT << 1550 bool "AMD Secure Memory Encryption (S << 1551 depends on X86_64 && CPU_SUP_AMD << 1552 depends on EFI_STUB << 1553 select DMA_COHERENT_POOL << 1554 select ARCH_USE_MEMREMAP_PROT << 1555 select INSTRUCTION_DECODER << 1556 select ARCH_HAS_CC_PLATFORM << 1557 select X86_MEM_ENCRYPT << 1558 select UNACCEPTED_MEMORY << 1559 help << 1560 Say yes to enable support for the e << 1561 This requires an AMD processor that << 1562 Encryption (SME). << 1563 253 1564 # Common NUMA Features << 1565 config NUMA 254 config NUMA 1566 bool "NUMA Memory Allocation and Sche !! 255 bool "NUMA support" 1567 depends on SMP !! 256 depends on SPARC64 && SMP 1568 depends on X86_64 || (X86_32 && HIGHM << 1569 default y if X86_BIGSMP << 1570 select USE_PERCPU_NUMA_NODE_ID << 1571 select OF_NUMA if OF << 1572 help << 1573 Enable NUMA (Non-Uniform Memory Acc << 1574 << 1575 The kernel will try to allocate mem << 1576 local memory controller of the CPU << 1577 NUMA awareness to the kernel. << 1578 << 1579 For 64-bit this is recommended if t << 1580 (or later), AMD Opteron, or EM64T N << 1581 << 1582 For 32-bit this is only needed if y << 1583 kernel on a 64-bit NUMA platform. << 1584 << 1585 Otherwise, you should say N. << 1586 << 1587 config AMD_NUMA << 1588 def_bool y << 1589 prompt "Old style AMD Opteron NUMA de << 1590 depends on X86_64 && NUMA && PCI << 1591 help << 1592 Enable AMD NUMA node topology detec << 1593 you have a multi processor AMD syst << 1594 read the NUMA configuration directl << 1595 of Opteron. It is recommended to us << 1596 which also takes priority if both a << 1597 << 1598 config X86_64_ACPI_NUMA << 1599 def_bool y << 1600 prompt "ACPI NUMA detection" << 1601 depends on X86_64 && NUMA && ACPI && << 1602 select ACPI_NUMA << 1603 help << 1604 Enable ACPI SRAT based node topolog << 1605 257 1606 config NODES_SHIFT 258 config NODES_SHIFT 1607 int "Maximum NUMA Nodes (as a power o !! 259 int "Maximum NUMA Nodes (as a power of 2)" 1608 range 1 10 !! 260 range 4 5 if SPARC64 1609 default "10" if MAXSMP !! 261 default "5" 1610 default "6" if X86_64 << 1611 default "3" << 1612 depends on NUMA 262 depends on NUMA 1613 help 263 help 1614 Specify the maximum number of NUMA 264 Specify the maximum number of NUMA Nodes available on the target 1615 system. Increases memory reserved 265 system. Increases memory reserved to accommodate various tables. 1616 266 1617 config ARCH_FLATMEM_ENABLE << 1618 def_bool y << 1619 depends on X86_32 && !NUMA << 1620 << 1621 config ARCH_SPARSEMEM_ENABLE 267 config ARCH_SPARSEMEM_ENABLE 1622 def_bool y !! 268 def_bool y if SPARC64 1623 depends on X86_64 || NUMA || X86_32 | !! 269 select SPARSEMEM_VMEMMAP_ENABLE 1624 select SPARSEMEM_STATIC if X86_32 << 1625 select SPARSEMEM_VMEMMAP_ENABLE if X8 << 1626 270 1627 config ARCH_SPARSEMEM_DEFAULT 271 config ARCH_SPARSEMEM_DEFAULT 1628 def_bool X86_64 || (NUMA && X86_32) !! 272 def_bool y if SPARC64 1629 << 1630 config ARCH_SELECT_MEMORY_MODEL << 1631 def_bool y << 1632 depends on ARCH_SPARSEMEM_ENABLE && A << 1633 << 1634 config ARCH_MEMORY_PROBE << 1635 bool "Enable sysfs memory/probe inter << 1636 depends on MEMORY_HOTPLUG << 1637 help << 1638 This option enables a sysfs memory/ << 1639 See Documentation/admin-guide/mm/me << 1640 If you are unsure how to answer thi << 1641 << 1642 config ARCH_PROC_KCORE_TEXT << 1643 def_bool y << 1644 depends on X86_64 && PROC_KCORE << 1645 << 1646 config ILLEGAL_POINTER_VALUE << 1647 hex << 1648 default 0 if X86_32 << 1649 default 0xdead000000000000 if X86_64 << 1650 << 1651 config X86_PMEM_LEGACY_DEVICE << 1652 bool << 1653 << 1654 config X86_PMEM_LEGACY << 1655 tristate "Support non-standard NVDIMM << 1656 depends on PHYS_ADDR_T_64BIT << 1657 depends on BLK_DEV << 1658 select X86_PMEM_LEGACY_DEVICE << 1659 select NUMA_KEEP_MEMINFO if NUMA << 1660 select LIBNVDIMM << 1661 help << 1662 Treat memory marked using the non-s << 1663 by the Intel Sandy Bridge-EP refere << 1664 The kernel will offer these regions << 1665 they can be used for persistent sto << 1666 << 1667 Say Y if unsure. << 1668 << 1669 config HIGHPTE << 1670 bool "Allocate 3rd-level pagetables f << 1671 depends on HIGHMEM << 1672 help << 1673 The VM uses one page table entry fo << 1674 For systems with a lot of RAM, this << 1675 low memory. Setting this option wi << 1676 entries in high memory. << 1677 << 1678 config X86_CHECK_BIOS_CORRUPTION << 1679 bool "Check for low memory corruption << 1680 help << 1681 Periodically check for memory corru << 1682 is suspected to be caused by BIOS. << 1683 configuration, it is disabled at ru << 1684 setting "memory_corruption_check=1" << 1685 line. By default it scans the low << 1686 seconds; see the memory_corruption_ << 1687 memory_corruption_check_period para << 1688 Documentation/admin-guide/kernel-pa << 1689 << 1690 When enabled with the default param << 1691 almost no overhead, as it reserves << 1692 of memory and scans it infrequently << 1693 and prevents it from affecting the << 1694 << 1695 It is, however, intended as a diagn << 1696 BIOS-originated corruption always a << 1697 you can use memmap= to prevent the << 1698 memory. << 1699 << 1700 config X86_BOOTPARAM_MEMORY_CORRUPTION_CHECK << 1701 bool "Set the default setting of memo << 1702 depends on X86_CHECK_BIOS_CORRUPTION << 1703 default y << 1704 help << 1705 Set whether the default state of me << 1706 on or off. << 1707 << 1708 config MATH_EMULATION << 1709 bool << 1710 depends on MODIFY_LDT_SYSCALL << 1711 prompt "Math emulation" if X86_32 && << 1712 help << 1713 Linux can emulate a math coprocesso << 1714 operations) if you don't have one. << 1715 a math coprocessor built in, 486SX << 1716 a 487DX or 387, respectively. (The << 1717 give you some hints here ["man dmes << 1718 coprocessor or this emulation. << 1719 << 1720 If you don't have a math coprocesso << 1721 say Y here even though you have a c << 1722 be used nevertheless. (This behavio << 1723 command line option "no387", which << 1724 is broken. Try "man bootparam" or s << 1725 loader (lilo or loadlin) about how << 1726 boot time.) This means that it is a << 1727 intend to use this kernel on differ << 1728 273 1729 More information about the internal !! 274 config ARCH_FORCE_MAX_ORDER 1730 emulation can be found in <file:arc !! 275 int "Order of maximal physically contiguous allocations" >> 276 default "12" >> 277 help >> 278 The kernel page allocator limits the size of maximal physically >> 279 contiguous allocations. The limit is called MAX_PAGE_ORDER and it >> 280 defines the maximal power of two of number of pages that can be >> 281 allocated as a single contiguous block. This option allows >> 282 overriding the default setting when ability to allocate very >> 283 large blocks of physically contiguous memory is required. 1731 284 1732 If you are not sure, say Y; apart f !! 285 Don't change if unsure. 1733 kernel, it won't hurt. << 1734 286 1735 config MTRR !! 287 if SPARC64 || COMPILE_TEST 1736 def_bool y !! 288 source "kernel/power/Kconfig" 1737 prompt "MTRR (Memory Type Range Regis !! 289 endif 1738 help << 1739 On Intel P6 family processors (Pent << 1740 the Memory Type Range Registers (MT << 1741 processor access to memory ranges. << 1742 a video (VGA) card on a PCI or AGP << 1743 allows bus write transfers to be co << 1744 before bursting over the PCI/AGP bu << 1745 of image write operations 2.5 times << 1746 /proc/mtrr file which may be used t << 1747 MTRRs. Typically the X server shoul << 1748 << 1749 This code has a reasonably generic << 1750 control registers on other processo << 1751 as well: << 1752 << 1753 The Cyrix 6x86, 6x86MX and M II pro << 1754 Registers (ARRs) which provide a si << 1755 these, the ARRs are used to emulate << 1756 The AMD K6-2 (stepping 8 and above) << 1757 MTRRs. The Centaur C6 (WinChip) has << 1758 write-combining. All of these proce << 1759 and it makes sense to say Y here if << 1760 << 1761 Saying Y here also fixes a problem << 1762 set the MTRRs for the boot CPU and << 1763 can lead to all sorts of problems, << 1764 << 1765 You can safely say Y even if your m << 1766 just add about 9 KB to your kernel. << 1767 << 1768 See <file:Documentation/arch/x86/mt << 1769 << 1770 config MTRR_SANITIZER << 1771 def_bool y << 1772 prompt "MTRR cleanup support" << 1773 depends on MTRR << 1774 help << 1775 Convert MTRR layout from continuous << 1776 add writeback entries. << 1777 << 1778 Can be disabled with disable_mtrr_c << 1779 The largest mtrr entry size for a c << 1780 mtrr_chunk_size. << 1781 << 1782 If unsure, say Y. << 1783 << 1784 config MTRR_SANITIZER_ENABLE_DEFAULT << 1785 int "MTRR cleanup enable value (0-1)" << 1786 range 0 1 << 1787 default "0" << 1788 depends on MTRR_SANITIZER << 1789 help << 1790 Enable mtrr cleanup default value << 1791 << 1792 config MTRR_SANITIZER_SPARE_REG_NR_DEFAULT << 1793 int "MTRR cleanup spare reg num (0-7) << 1794 range 0 7 << 1795 default "1" << 1796 depends on MTRR_SANITIZER << 1797 help << 1798 mtrr cleanup spare entries default, << 1799 mtrr_spare_reg_nr=N on the kernel c << 1800 << 1801 config X86_PAT << 1802 def_bool y << 1803 prompt "x86 PAT support" if EXPERT << 1804 depends on MTRR << 1805 select ARCH_USES_PG_ARCH_2 << 1806 help << 1807 Use PAT attributes to setup page le << 1808 << 1809 PATs are the modern equivalents of << 1810 flexible than MTRRs. << 1811 << 1812 Say N here if you see bootup proble << 1813 spontaneous reboots) or a non-worki << 1814 << 1815 If unsure, say Y. << 1816 290 1817 config X86_UMIP !! 291 config SCHED_SMT 1818 def_bool y !! 292 bool "SMT (Hyperthreading) scheduler support" 1819 prompt "User Mode Instruction Prevent !! 293 depends on SPARC64 && SMP >> 294 default y 1820 help 295 help 1821 User Mode Instruction Prevention (U !! 296 SMT scheduler support improves the CPU scheduler's decision making 1822 some x86 processors. If enabled, a !! 297 when dealing with SPARC cpus at a cost of slightly increased overhead 1823 issued if the SGDT, SLDT, SIDT, SMS !! 298 in some places. If unsure say N here. 1824 executed in user mode. These instru << 1825 information about the hardware stat << 1826 << 1827 The vast majority of applications d << 1828 For the very few that do, software << 1829 specific cases in protected and vir << 1830 results are dummy. << 1831 << 1832 config CC_HAS_IBT << 1833 # GCC >= 9 and binutils >= 2.29 << 1834 # Retpoline check to work around http << 1835 # Clang/LLVM >= 14 << 1836 # https://github.com/llvm/llvm-projec << 1837 # https://github.com/llvm/llvm-projec << 1838 def_bool ((CC_IS_GCC && $(cc-option, << 1839 (CC_IS_CLANG && CLANG_VERSI << 1840 $(as-instr,endbr64) << 1841 299 1842 config X86_CET !! 300 config SCHED_MC 1843 def_bool n !! 301 bool "Multi-core scheduler support" >> 302 depends on SPARC64 && SMP >> 303 default y 1844 help 304 help 1845 CET features configured (Shadow sta !! 305 Multi-core scheduler support improves the CPU scheduler's decision 1846 !! 306 making when dealing with multi-core CPU chips at a cost of slightly 1847 config X86_KERNEL_IBT !! 307 increased overhead in some places. If unsure say N here. 1848 prompt "Indirect Branch Tracking" << 1849 def_bool y << 1850 depends on X86_64 && CC_HAS_IBT && HA << 1851 # https://github.com/llvm/llvm-projec << 1852 depends on !LD_IS_LLD || LLD_VERSION << 1853 select OBJTOOL << 1854 select X86_CET << 1855 help << 1856 Build the kernel with support for I << 1857 hardware support course-grain forwa << 1858 protection. It enforces that all in << 1859 an ENDBR instruction, as such, the << 1860 code with them to make this happen. << 1861 << 1862 In addition to building the kernel << 1863 are not indirect call targets, avoi << 1864 << 1865 This requires LTO like objtool runs << 1866 does significantly reduce the numbe << 1867 kernel image. << 1868 << 1869 config X86_INTEL_MEMORY_PROTECTION_KEYS << 1870 prompt "Memory Protection Keys" << 1871 def_bool y << 1872 # Note: only available in 64-bit mode << 1873 depends on X86_64 && (CPU_SUP_INTEL | << 1874 select ARCH_USES_HIGH_VMA_FLAGS << 1875 select ARCH_HAS_PKEYS << 1876 help << 1877 Memory Protection Keys provides a m << 1878 page-based protections, but without << 1879 page tables when an application cha << 1880 << 1881 For details, see Documentation/core << 1882 << 1883 If unsure, say y. << 1884 << 1885 config ARCH_PKEY_BITS << 1886 int << 1887 default 4 << 1888 << 1889 choice << 1890 prompt "TSX enable mode" << 1891 depends on CPU_SUP_INTEL << 1892 default X86_INTEL_TSX_MODE_OFF << 1893 help << 1894 Intel's TSX (Transactional Synchron << 1895 allows to optimize locking protocol << 1896 can lead to a noticeable performanc << 1897 << 1898 On the other hand it has been shown << 1899 to form side channel attacks (e.g. << 1900 will be more of those attacks disco << 1901 << 1902 Therefore TSX is not enabled by def << 1903 might override this decision by tsx << 1904 Even with TSX enabled, the kernel w << 1905 possible TAA mitigation setting dep << 1906 for the particular machine. << 1907 << 1908 This option allows to set the defau << 1909 and =auto. See Documentation/admin- << 1910 details. << 1911 << 1912 Say off if not sure, auto if TSX is << 1913 platforms or on if TSX is in use an << 1914 relevant. << 1915 << 1916 config X86_INTEL_TSX_MODE_OFF << 1917 bool "off" << 1918 help << 1919 TSX is disabled if possible - equal << 1920 << 1921 config X86_INTEL_TSX_MODE_ON << 1922 bool "on" << 1923 help << 1924 TSX is always enabled on TSX capabl << 1925 line parameter. << 1926 << 1927 config X86_INTEL_TSX_MODE_AUTO << 1928 bool "auto" << 1929 help << 1930 TSX is enabled on TSX capable HW th << 1931 side channel attacks- equals the ts << 1932 endchoice << 1933 << 1934 config X86_SGX << 1935 bool "Software Guard eXtensions (SGX) << 1936 depends on X86_64 && CPU_SUP_INTEL && << 1937 depends on CRYPTO=y << 1938 depends on CRYPTO_SHA256=y << 1939 select MMU_NOTIFIER << 1940 select NUMA_KEEP_MEMINFO if NUMA << 1941 select XARRAY_MULTI << 1942 help << 1943 Intel(R) Software Guard eXtensions << 1944 that can be used by applications to << 1945 and data, referred to as enclaves. << 1946 only be accessed by code running wi << 1947 outside the enclave, including othe << 1948 hardware. << 1949 << 1950 If unsure, say N. << 1951 << 1952 config X86_USER_SHADOW_STACK << 1953 bool "X86 userspace shadow stack" << 1954 depends on AS_WRUSS << 1955 depends on X86_64 << 1956 select ARCH_USES_HIGH_VMA_FLAGS << 1957 select X86_CET << 1958 help << 1959 Shadow stack protection is a hardwa << 1960 return address corruption. This he << 1961 Applications must be enabled to use << 1962 get protection "for free". << 1963 << 1964 CPUs supporting shadow stacks were << 1965 << 1966 See Documentation/arch/x86/shstk.rs << 1967 << 1968 If unsure, say N. << 1969 << 1970 config INTEL_TDX_HOST << 1971 bool "Intel Trust Domain Extensions ( << 1972 depends on CPU_SUP_INTEL << 1973 depends on X86_64 << 1974 depends on KVM_INTEL << 1975 depends on X86_X2APIC << 1976 select ARCH_KEEP_MEMBLOCK << 1977 depends on CONTIG_ALLOC << 1978 depends on !KEXEC_CORE << 1979 depends on X86_MCE << 1980 help << 1981 Intel Trust Domain Extensions (TDX) << 1982 host and certain physical attacks. << 1983 support in the host kernel to run c << 1984 << 1985 If unsure, say N. << 1986 << 1987 config EFI << 1988 bool "EFI runtime service support" << 1989 depends on ACPI << 1990 select UCS2_STRING << 1991 select EFI_RUNTIME_WRAPPERS << 1992 select ARCH_USE_MEMREMAP_PROT << 1993 select EFI_RUNTIME_MAP if KEXEC_CORE << 1994 help << 1995 This enables the kernel to use EFI << 1996 available (such as the EFI variable << 1997 << 1998 This option is only useful on syste << 1999 In addition, you should use the lat << 2000 at <http://elilo.sourceforge.net> i << 2001 of EFI runtime services. However, e << 2002 resultant kernel should continue to << 2003 platforms. << 2004 << 2005 config EFI_STUB << 2006 bool "EFI stub support" << 2007 depends on EFI << 2008 select RELOCATABLE << 2009 help << 2010 This kernel feature allows a bzImag << 2011 by EFI firmware without the use of << 2012 << 2013 See Documentation/admin-guide/efi-s << 2014 << 2015 config EFI_HANDOVER_PROTOCOL << 2016 bool "EFI handover protocol (DEPRECAT << 2017 depends on EFI_STUB << 2018 default y << 2019 help << 2020 Select this in order to include sup << 2021 handover protocol, which defines al << 2022 EFI stub. This is a practice that << 2023 specification, and requires a prior << 2024 bootloader about Linux/x86 specific << 2025 and initrd, and where in memory tho << 2026 << 2027 If in doubt, say Y. Even though the << 2028 present in upstream GRUB or other b << 2029 GRUB with numerous downstream patch << 2030 handover protocol as as result. << 2031 << 2032 config EFI_MIXED << 2033 bool "EFI mixed-mode support" << 2034 depends on EFI_STUB && X86_64 << 2035 help << 2036 Enabling this feature allows a 64-b << 2037 on a 32-bit firmware, provided that << 2038 mode. << 2039 << 2040 Note that it is not possible to boo << 2041 kernel via the EFI boot stub - a bo << 2042 the EFI handover protocol must be u << 2043 << 2044 If unsure, say N. << 2045 << 2046 config EFI_RUNTIME_MAP << 2047 bool "Export EFI runtime maps to sysf << 2048 depends on EFI << 2049 help << 2050 Export EFI runtime memory regions t << 2051 That memory map is required by the << 2052 mappings after kexec, but can also << 2053 << 2054 See also Documentation/ABI/testing/ << 2055 << 2056 source "kernel/Kconfig.hz" << 2057 << 2058 config ARCH_SUPPORTS_KEXEC << 2059 def_bool y << 2060 << 2061 config ARCH_SUPPORTS_KEXEC_FILE << 2062 def_bool X86_64 << 2063 << 2064 config ARCH_SELECTS_KEXEC_FILE << 2065 def_bool y << 2066 depends on KEXEC_FILE << 2067 select HAVE_IMA_KEXEC if IMA << 2068 << 2069 config ARCH_SUPPORTS_KEXEC_PURGATORY << 2070 def_bool y << 2071 << 2072 config ARCH_SUPPORTS_KEXEC_SIG << 2073 def_bool y << 2074 << 2075 config ARCH_SUPPORTS_KEXEC_SIG_FORCE << 2076 def_bool y << 2077 << 2078 config ARCH_SUPPORTS_KEXEC_BZIMAGE_VERIFY_SIG << 2079 def_bool y << 2080 << 2081 config ARCH_SUPPORTS_KEXEC_JUMP << 2082 def_bool y << 2083 << 2084 config ARCH_SUPPORTS_CRASH_DUMP << 2085 def_bool X86_64 || (X86_32 && HIGHMEM << 2086 << 2087 config ARCH_SUPPORTS_CRASH_HOTPLUG << 2088 def_bool y << 2089 << 2090 config ARCH_HAS_GENERIC_CRASHKERNEL_RESERVATI << 2091 def_bool CRASH_RESERVE << 2092 << 2093 config PHYSICAL_START << 2094 hex "Physical address where the kerne << 2095 default "0x1000000" << 2096 help << 2097 This gives the physical address whe << 2098 << 2099 If the kernel is not relocatable (C << 2100 will decompress itself to above phy << 2101 Otherwise, bzImage will run from th << 2102 by the boot loader. The only except << 2103 above physical address, in which ca << 2104 << 2105 In normal kdump cases one does not << 2106 as now bzImage can be compiled as a << 2107 (CONFIG_RELOCATABLE=y) and be used << 2108 address. This option is mainly usef << 2109 to use a bzImage for capturing the << 2110 vmlinux instead. vmlinux is not rel << 2111 to be specifically compiled to run << 2112 (normally a reserved region) and th << 2113 << 2114 So if you are using bzImage for cap << 2115 leave the value here unchanged to 0 << 2116 CONFIG_RELOCATABLE=y. Otherwise if << 2117 for capturing the crash dump change << 2118 the reserved region. In other word << 2119 the "X" value as specified in the " << 2120 command line boot parameter passed << 2121 kernel. Please take a look at Docum << 2122 for more details about crash dumps. << 2123 << 2124 Usage of bzImage for capturing the << 2125 one does not have to build two kern << 2126 as production kernel and capture ke << 2127 gone away after relocatable bzImage << 2128 is present because there are users << 2129 vmlinux for dump capture. This opti << 2130 line. << 2131 << 2132 Don't change this unless you know w << 2133 << 2134 config RELOCATABLE << 2135 bool "Build a relocatable kernel" << 2136 default y << 2137 help << 2138 This builds a kernel image that ret << 2139 so it can be loaded someplace besid << 2140 The relocations tend to make the ke << 2141 but are discarded at runtime. << 2142 << 2143 One use is for the kexec on panic c << 2144 must live at a different physical a << 2145 kernel. << 2146 << 2147 Note: If CONFIG_RELOCATABLE=y, then << 2148 it has been loaded at and the compi << 2149 (CONFIG_PHYSICAL_START) is used as << 2150 << 2151 config RANDOMIZE_BASE << 2152 bool "Randomize the address of the ke << 2153 depends on RELOCATABLE << 2154 default y << 2155 help << 2156 In support of Kernel Address Space << 2157 this randomizes the physical addres << 2158 is decompressed and the virtual add << 2159 image is mapped, as a security feat << 2160 attempts relying on knowledge of th << 2161 code internals. << 2162 << 2163 On 64-bit, the kernel physical and << 2164 randomized separately. The physical << 2165 between 16MB and the top of physica << 2166 virtual address will be randomized << 2167 of entropy). Note that this also re << 2168 available to kernel modules from 1. << 2169 << 2170 On 32-bit, the kernel physical and << 2171 randomized together. They will be r << 2172 512MB (8 bits of entropy). << 2173 << 2174 Entropy is generated using the RDRA << 2175 supported. If RDTSC is supported, i << 2176 the entropy pool as well. If neithe << 2177 supported, then entropy is read fro << 2178 usable entropy is limited by the ke << 2179 2GB addressing, and that PHYSICAL_A << 2180 minimum of 2MB. As a result, only 1 << 2181 theoretically possible, but the imp << 2182 limited due to memory layouts. << 2183 << 2184 If unsure, say Y. << 2185 << 2186 # Relocation on x86 needs some additional bui << 2187 config X86_NEED_RELOCS << 2188 def_bool y << 2189 depends on RANDOMIZE_BASE || (X86_32 << 2190 << 2191 config PHYSICAL_ALIGN << 2192 hex "Alignment value to which kernel << 2193 default "0x200000" << 2194 range 0x2000 0x1000000 if X86_32 << 2195 range 0x200000 0x1000000 if X86_64 << 2196 help << 2197 This value puts the alignment restr << 2198 where kernel is loaded and run from << 2199 address which meets above alignment << 2200 << 2201 If bootloader loads the kernel at a << 2202 CONFIG_RELOCATABLE is set, kernel w << 2203 address aligned to above value and << 2204 << 2205 If bootloader loads the kernel at a << 2206 CONFIG_RELOCATABLE is not set, kern << 2207 load address and decompress itself << 2208 compiled for and run from there. Th << 2209 compiled already meets above alignm << 2210 end result is that kernel runs from << 2211 above alignment restrictions. << 2212 << 2213 On 32-bit this value must be a mult << 2214 this value must be a multiple of 0x << 2215 << 2216 Don't change this unless you know w << 2217 << 2218 config DYNAMIC_MEMORY_LAYOUT << 2219 bool << 2220 help << 2221 This option makes base addresses of << 2222 __PAGE_OFFSET movable during boot. << 2223 << 2224 config RANDOMIZE_MEMORY << 2225 bool "Randomize the kernel memory sec << 2226 depends on X86_64 << 2227 depends on RANDOMIZE_BASE << 2228 select DYNAMIC_MEMORY_LAYOUT << 2229 default RANDOMIZE_BASE << 2230 help << 2231 Randomizes the base virtual address << 2232 (physical memory mapping, vmalloc & << 2233 makes exploits relying on predictab << 2234 << 2235 The order of allocations remains un << 2236 the same way as RANDOMIZE_BASE. Cur << 2237 configuration have in average 30,00 << 2238 addresses for each memory section. << 2239 << 2240 If unsure, say Y. << 2241 << 2242 config RANDOMIZE_MEMORY_PHYSICAL_PADDING << 2243 hex "Physical memory mapping padding" << 2244 depends on RANDOMIZE_MEMORY << 2245 default "0xa" if MEMORY_HOTPLUG << 2246 default "0x0" << 2247 range 0x1 0x40 if MEMORY_HOTPLUG << 2248 range 0x0 0x40 << 2249 help << 2250 Define the padding in terabytes add << 2251 memory size during kernel memory ra << 2252 for memory hotplug support but redu << 2253 address randomization. << 2254 << 2255 If unsure, leave at the default val << 2256 << 2257 config ADDRESS_MASKING << 2258 bool "Linear Address Masking support" << 2259 depends on X86_64 << 2260 depends on COMPILE_TEST || !CPU_MITIG << 2261 help << 2262 Linear Address Masking (LAM) modifi << 2263 to 64-bit linear addresses, allowin << 2264 untranslated address bits for metad << 2265 << 2266 The capability can be used for effi << 2267 implementation and for optimization << 2268 << 2269 config HOTPLUG_CPU << 2270 def_bool y << 2271 depends on SMP << 2272 << 2273 config COMPAT_VDSO << 2274 def_bool n << 2275 prompt "Disable the 32-bit vDSO (need << 2276 depends on COMPAT_32 << 2277 help << 2278 Certain buggy versions of glibc wil << 2279 presented with a 32-bit vDSO that i << 2280 indicated in its segment table. << 2281 << 2282 The bug was introduced by f866314b8 << 2283 and fixed by 3b3ddb4f7db98ec9e912cc << 2284 49ad572a70b8aeb91e57483a11dd1b77e31 << 2285 the only released version with the << 2286 contains a buggy "glibc 2.3.2". << 2287 << 2288 The symptom of the bug is that ever << 2289 dl_main: Assertion `(void *) ph->p_ << 2290 << 2291 Saying Y here changes the default v << 2292 option from 1 to 0, which turns off << 2293 This works around the glibc bug but << 2294 << 2295 If unsure, say N: if you are compil << 2296 are unlikely to be using a buggy ve << 2297 << 2298 choice << 2299 prompt "vsyscall table for legacy app << 2300 depends on X86_64 << 2301 default LEGACY_VSYSCALL_XONLY << 2302 help << 2303 Legacy user code that does not know << 2304 to be able to issue three syscalls << 2305 kernel space. Since this location i << 2306 it can be used to assist security v << 2307 << 2308 This setting can be changed at boot << 2309 line parameter vsyscall=[emulate|xo << 2310 is deprecated and can only be enabl << 2311 line. << 2312 << 2313 On a system with recent enough glib << 2314 static binaries, you can say None w << 2315 to improve security. << 2316 << 2317 If unsure, select "Emulate executio << 2318 << 2319 config LEGACY_VSYSCALL_XONLY << 2320 bool "Emulate execution only" << 2321 help << 2322 The kernel traps and emulat << 2323 address mapping and does no << 2324 configuration is recommende << 2325 legacy vsyscall area but su << 2326 instrumentation of legacy c << 2327 certain uses of the vsyscal << 2328 buffer. << 2329 << 2330 config LEGACY_VSYSCALL_NONE << 2331 bool "None" << 2332 help << 2333 There will be no vsyscall m << 2334 eliminate any risk of ASLR << 2335 fixed address mapping. Atte << 2336 will be reported to dmesg, << 2337 malicious userspace program << 2338 << 2339 endchoice << 2340 308 2341 config CMDLINE_BOOL 309 config CMDLINE_BOOL 2342 bool "Built-in kernel command line" !! 310 bool "Default bootloader kernel arguments" 2343 help !! 311 depends on SPARC64 2344 Allow for specifying boot arguments << 2345 build time. On some systems (e.g. << 2346 necessary or convenient to provide << 2347 kernel boot arguments with the kern << 2348 to not rely on the boot loader to p << 2349 << 2350 To compile command line arguments i << 2351 set this option to 'Y', then fill i << 2352 boot arguments in CONFIG_CMDLINE. << 2353 << 2354 Systems with fully functional boot << 2355 should leave this option set to 'N' << 2356 312 2357 config CMDLINE 313 config CMDLINE 2358 string "Built-in kernel command strin !! 314 string "Initial kernel command string" 2359 depends on CMDLINE_BOOL 315 depends on CMDLINE_BOOL 2360 default "" !! 316 default "console=ttyS0,9600 root=/dev/sda1" 2361 help 317 help 2362 Enter arguments here that should be !! 318 Say Y here if you want to be able to pass default arguments to 2363 image and used at boot time. If th !! 319 the kernel. This will be overridden by the bootloader, if you 2364 command line at boot time, it is ap !! 320 use one (such as SILO). This is most useful if you want to boot 2365 form the full kernel command line, !! 321 a kernel from TFTP, and want default options to be available 2366 !! 322 with having them passed on the command line. 2367 However, you can use the CONFIG_CMD << 2368 change this behavior. << 2369 323 2370 In most cases, the command line (wh !! 324 NOTE: This option WILL override the PROM bootargs setting! 2371 by the boot loader) should specify << 2372 file system. << 2373 325 2374 config CMDLINE_OVERRIDE !! 326 config SUN_PM 2375 bool "Built-in command line overrides !! 327 bool 2376 depends on CMDLINE_BOOL && CMDLINE != !! 328 default y if SPARC32 2377 help << 2378 Set this option to 'Y' to have the << 2379 command line, and use ONLY the buil << 2380 << 2381 This is used to work around broken << 2382 be set to 'N' under normal conditio << 2383 << 2384 config MODIFY_LDT_SYSCALL << 2385 bool "Enable the LDT (local descripto << 2386 default y << 2387 help << 2388 Linux can allow user programs to in << 2389 Local Descriptor Table (LDT) using << 2390 call. This is required to run 16-b << 2391 DOSEMU or some Wine programs. It i << 2392 threading libraries. << 2393 << 2394 Enabling this feature adds a small << 2395 context switches and increases the << 2396 surface. Disabling it removes the << 2397 << 2398 Saying 'N' here may make sense for << 2399 << 2400 config STRICT_SIGALTSTACK_SIZE << 2401 bool "Enforce strict size checking fo << 2402 depends on DYNAMIC_SIGFRAME << 2403 help << 2404 For historical reasons MINSIGSTKSZ << 2405 already too small with AVX512 suppo << 2406 enforce strict checking of the siga << 2407 real size of the FPU frame. This op << 2408 by default. It can also be controll << 2409 line option 'strict_sas_size' indep << 2410 switch. Enabling it might break exi << 2411 allocate a too small sigaltstack bu << 2412 never get a signal delivered. << 2413 << 2414 Say 'N' unless you want to really e << 2415 << 2416 config CFI_AUTO_DEFAULT << 2417 bool "Attempt to use FineIBT by defau << 2418 depends on FINEIBT << 2419 default y << 2420 help << 2421 Attempt to use FineIBT by default a << 2422 this is the same as booting with "c << 2423 this is the same as booting with "c << 2424 << 2425 source "kernel/livepatch/Kconfig" << 2426 << 2427 endmenu << 2428 << 2429 config CC_HAS_NAMED_AS << 2430 def_bool $(success,echo 'int __seg_fs << 2431 depends on CC_IS_GCC << 2432 << 2433 config CC_HAS_NAMED_AS_FIXED_SANITIZERS << 2434 def_bool CC_IS_GCC && GCC_VERSION >= << 2435 << 2436 config USE_X86_SEG_SUPPORT << 2437 def_bool y << 2438 depends on CC_HAS_NAMED_AS << 2439 # << 2440 # -fsanitize=kernel-address (KASAN) a << 2441 # (KCSAN) are incompatible with named << 2442 # GCC < 13.3 - see GCC PR sanitizer/1 << 2443 # << 2444 depends on !(KASAN || KCSAN) || CC_HA << 2445 << 2446 config CC_HAS_SLS << 2447 def_bool $(cc-option,-mharden-sls=all << 2448 << 2449 config CC_HAS_RETURN_THUNK << 2450 def_bool $(cc-option,-mfunction-retur << 2451 << 2452 config CC_HAS_ENTRY_PADDING << 2453 def_bool $(cc-option,-fpatchable-func << 2454 << 2455 config FUNCTION_PADDING_CFI << 2456 int << 2457 default 59 if FUNCTION_ALIGNMENT_64B << 2458 default 27 if FUNCTION_ALIGNMENT_32B << 2459 default 11 if FUNCTION_ALIGNMENT_16B << 2460 default 3 if FUNCTION_ALIGNMENT_8B << 2461 default 0 << 2462 << 2463 # Basically: FUNCTION_ALIGNMENT - 5*CFI_CLANG << 2464 # except Kconfig can't do arithmetic :/ << 2465 config FUNCTION_PADDING_BYTES << 2466 int << 2467 default FUNCTION_PADDING_CFI if CFI_C << 2468 default FUNCTION_ALIGNMENT << 2469 << 2470 config CALL_PADDING << 2471 def_bool n << 2472 depends on CC_HAS_ENTRY_PADDING && OB << 2473 select FUNCTION_ALIGNMENT_16B << 2474 << 2475 config FINEIBT << 2476 def_bool y << 2477 depends on X86_KERNEL_IBT && CFI_CLAN << 2478 select CALL_PADDING << 2479 << 2480 config HAVE_CALL_THUNKS << 2481 def_bool y << 2482 depends on CC_HAS_ENTRY_PADDING && MI << 2483 << 2484 config CALL_THUNKS << 2485 def_bool n << 2486 select CALL_PADDING << 2487 << 2488 config PREFIX_SYMBOLS << 2489 def_bool y << 2490 depends on CALL_PADDING && !CFI_CLANG << 2491 << 2492 menuconfig CPU_MITIGATIONS << 2493 bool "Mitigations for CPU vulnerabili << 2494 default y << 2495 help 329 help 2496 Say Y here to enable options which !! 330 Enable power management and CPU standby features on supported 2497 vulnerabilities (usually related to !! 331 SPARC platforms. 2498 Mitigations can be disabled or rest << 2499 via the "mitigations" kernel parame << 2500 << 2501 If you say N, all mitigations will << 2502 overridden at runtime. << 2503 << 2504 Say 'Y', unless you really know wha << 2505 332 2506 if CPU_MITIGATIONS !! 333 config SPARC_LED 2507 !! 334 tristate "Sun4m LED driver" 2508 config MITIGATION_PAGE_TABLE_ISOLATION !! 335 depends on SPARC32 2509 bool "Remove the kernel mapping in us << 2510 default y << 2511 depends on (X86_64 || X86_PAE) << 2512 help 336 help 2513 This feature reduces the number of !! 337 This driver toggles the front-panel LED on sun4m systems 2514 ensuring that the majority of kerne !! 338 in a user-specifiable manner. Its state can be probed 2515 into userspace. !! 339 by reading /proc/led and its blinking mode can be changed 2516 !! 340 via writes to /proc/led 2517 See Documentation/arch/x86/pti.rst << 2518 341 2519 config MITIGATION_RETPOLINE !! 342 config SERIAL_CONSOLE 2520 bool "Avoid speculative indirect bran !! 343 bool 2521 select OBJTOOL if HAVE_OBJTOOL !! 344 depends on SPARC32 2522 default y 345 default y 2523 help 346 help 2524 Compile kernel with the retpoline c !! 347 If you say Y here, it will be possible to use a serial port as the 2525 kernel-to-user data leaks by avoidi !! 348 system console (the system console is the device which receives all 2526 branches. Requires a compiler with !! 349 kernel messages and warnings and which allows logins in single user 2527 support for full protection. The ke !! 350 mode). This could be useful if some terminal or printer is connected >> 351 to that serial port. 2528 352 2529 config MITIGATION_RETHUNK !! 353 Even if you say Y here, the currently visible virtual console 2530 bool "Enable return-thunks" !! 354 (/dev/tty0) will still be used as the system console by default, but 2531 depends on MITIGATION_RETPOLINE && CC !! 355 you can alter that using a kernel command line option such as 2532 select OBJTOOL if HAVE_OBJTOOL !! 356 "console=ttyS1". (Try "man bootparam" or see the documentation of 2533 default y if X86_64 !! 357 your boot loader (silo) about how to pass options to the kernel at 2534 help !! 358 boot time.) 2535 Compile the kernel with the return- << 2536 against kernel-to-user data leaks b << 2537 Requires a compiler with -mfunction << 2538 support for full protection. The ke << 2539 359 2540 config MITIGATION_UNRET_ENTRY !! 360 If you don't have a graphics card installed and you say Y here, the 2541 bool "Enable UNRET on kernel entry" !! 361 kernel will automatically use the first serial line, /dev/ttyS0, as 2542 depends on CPU_SUP_AMD && MITIGATION_ !! 362 system console. 2543 default y << 2544 help << 2545 Compile the kernel with support for << 2546 363 2547 config MITIGATION_CALL_DEPTH_TRACKING !! 364 If unsure, say N. 2548 bool "Mitigate RSB underflow with cal << 2549 depends on CPU_SUP_INTEL && HAVE_CALL << 2550 select HAVE_DYNAMIC_FTRACE_NO_PATCHAB << 2551 select CALL_THUNKS << 2552 default y << 2553 help << 2554 Compile the kernel with call depth << 2555 SKL Return-Speculation-Buffer (RSB) << 2556 mitigation is off by default and ne << 2557 kernel command line via the retblee << 2558 non-affected systems the overhead o << 2559 the call depth tracking is using ru << 2560 in a compiler generated padding are << 2561 increases text size by ~5%. For non << 2562 is unused. On affected SKL systems << 2563 performance gain over the IBRS miti << 2564 365 2565 config CALL_THUNKS_DEBUG !! 366 config SPARC_LEON 2566 bool "Enable call thunks and call dep !! 367 bool "Sparc Leon processor family" 2567 depends on MITIGATION_CALL_DEPTH_TRAC !! 368 depends on SPARC32 2568 select FUNCTION_ALIGNMENT_32B !! 369 select USB_EHCI_BIG_ENDIAN_MMIO 2569 default n !! 370 select USB_EHCI_BIG_ENDIAN_DESC >> 371 select USB_UHCI_BIG_ENDIAN_MMIO >> 372 select USB_UHCI_BIG_ENDIAN_DESC >> 373 help >> 374 If you say Y here if you are running on a SPARC-LEON processor. >> 375 The LEON processor is a synthesizable VHDL model of the >> 376 SPARC-v8 standard. LEON is part of the GRLIB collection of >> 377 IP cores that are distributed under GPL. GRLIB can be downloaded >> 378 from www.gaisler.com. You can download a sparc-linux cross-compilation >> 379 toolchain at www.gaisler.com. >> 380 >> 381 if SPARC_LEON >> 382 menu "U-Boot options" >> 383 >> 384 config UBOOT_LOAD_ADDR >> 385 hex "uImage Load Address" >> 386 default 0x40004000 >> 387 help >> 388 U-Boot kernel load address, the address in physical address space >> 389 where u-boot will place the Linux kernel before booting it. >> 390 This address is normally the base address of main memory + 0x4000. >> 391 >> 392 config UBOOT_FLASH_ADDR >> 393 hex "uImage.o Load Address" >> 394 default 0x00080000 >> 395 help >> 396 Optional setting only affecting the uImage.o ELF-image used to >> 397 download the uImage file to the target using a ELF-loader other than >> 398 U-Boot. It may for example be used to download an uImage to FLASH with >> 399 the GRMON utility before even starting u-boot. >> 400 >> 401 config UBOOT_ENTRY_ADDR >> 402 hex "uImage Entry Address" >> 403 default 0xf0004000 2570 help 404 help 2571 Enable call/ret counters for imbala !! 405 Do not change this unless you know what you're doing. This is 2572 a noisy dmesg about callthunks gene !! 406 hardcoded by the SPARC32 and LEON port. 2573 trouble shooting. The debug prints << 2574 kernel command line with 'debug-cal << 2575 Only enable this when you are debug << 2576 creates a noticeable runtime overhe << 2577 407 2578 config MITIGATION_IBPB_ENTRY !! 408 This is the virtual address u-boot jumps to when booting the Linux 2579 bool "Enable IBPB on kernel entry" !! 409 Kernel. 2580 depends on CPU_SUP_AMD && X86_64 << 2581 default y << 2582 help << 2583 Compile the kernel with support for << 2584 410 2585 config MITIGATION_IBRS_ENTRY !! 411 endmenu 2586 bool "Enable IBRS on kernel entry" !! 412 endif 2587 depends on CPU_SUP_INTEL && X86_64 << 2588 default y << 2589 help << 2590 Compile the kernel with support for << 2591 This mitigates both spectre_v2 and << 2592 performance. << 2593 << 2594 config MITIGATION_SRSO << 2595 bool "Mitigate speculative RAS overfl << 2596 depends on CPU_SUP_AMD && X86_64 && M << 2597 default y << 2598 help << 2599 Enable the SRSO mitigation needed o << 2600 413 2601 config MITIGATION_SLS !! 414 endmenu 2602 bool "Mitigate Straight-Line-Speculat << 2603 depends on CC_HAS_SLS && X86_64 << 2604 select OBJTOOL if HAVE_OBJTOOL << 2605 default n << 2606 help << 2607 Compile the kernel with straight-li << 2608 against straight line speculation. << 2609 larger. << 2610 415 2611 config MITIGATION_GDS !! 416 menu "Bus options (PCI etc.)" 2612 bool "Mitigate Gather Data Sampling" !! 417 config SBUS 2613 depends on CPU_SUP_INTEL !! 418 bool 2614 default y 419 default y 2615 help << 2616 Enable mitigation for Gather Data S << 2617 vulnerability which allows unprivil << 2618 which was previously stored in vect << 2619 instructions to infer the stale vec << 2620 420 2621 config MITIGATION_RFDS !! 421 config SBUSCHAR 2622 bool "RFDS Mitigation" !! 422 bool 2623 depends on CPU_SUP_INTEL << 2624 default y 423 default y 2625 help << 2626 Enable mitigation for Register File << 2627 RFDS is a hardware vulnerability wh << 2628 allows unprivileged speculative acc << 2629 stored in floating point, vector an << 2630 See also <file:Documentation/admin- << 2631 424 2632 config MITIGATION_SPECTRE_BHI !! 425 config SUN_LDOMS 2633 bool "Mitigate Spectre-BHB (Branch Hi !! 426 bool "Sun Logical Domains support" 2634 depends on CPU_SUP_INTEL !! 427 depends on SPARC64 2635 default y << 2636 help 428 help 2637 Enable BHI mitigations. BHI attacks !! 429 Say Y here is you want to support virtual devices via 2638 where the branch history buffer is !! 430 Logical Domains. 2639 indirect branches. << 2640 See <file:Documentation/admin-guide << 2641 431 2642 config MITIGATION_MDS !! 432 config PCIC_PCI 2643 bool "Mitigate Microarchitectural Dat !! 433 bool 2644 depends on CPU_SUP_INTEL !! 434 depends on PCI && SPARC32 && !SPARC_LEON 2645 default y 435 default y 2646 help << 2647 Enable mitigation for Microarchitec << 2648 a hardware vulnerability which allo << 2649 to data which is available in vario << 2650 See also <file:Documentation/admin- << 2651 436 2652 config MITIGATION_TAA !! 437 config LEON_PCI 2653 bool "Mitigate TSX Asynchronous Abort !! 438 bool 2654 depends on CPU_SUP_INTEL !! 439 depends on PCI && SPARC_LEON 2655 default y 440 default y 2656 help << 2657 Enable mitigation for TSX Asynchron << 2658 vulnerability that allows unprivile << 2659 which is available in various CPU i << 2660 asynchronous aborts within an Intel << 2661 See also <file:Documentation/admin- << 2662 441 2663 config MITIGATION_MMIO_STALE_DATA !! 442 config SPARC_GRPCI1 2664 bool "Mitigate MMIO Stale Data hardwa !! 443 bool "GRPCI Host Bridge Support" 2665 depends on CPU_SUP_INTEL !! 444 depends on LEON_PCI 2666 default y 445 default y 2667 help 446 help 2668 Enable mitigation for MMIO Stale Da !! 447 Say Y here to include the GRPCI Host Bridge Driver. The GRPCI 2669 Stale Data Vulnerabilities are a cl !! 448 PCI host controller is typically found in GRLIB SPARC32/LEON 2670 vulnerabilities that can expose dat !! 449 systems. The driver has one property (all_pci_errors) controlled 2671 attacker to have access to MMIO. !! 450 from the bootloader that makes the GRPCI to generate interrupts 2672 See also !! 451 on detected PCI Parity and System errors. 2673 <file:Documentation/admin-guide/hw- << 2674 452 2675 config MITIGATION_L1TF !! 453 config SPARC_GRPCI2 2676 bool "Mitigate L1 Terminal Fault (L1T !! 454 bool "GRPCI2 Host Bridge Support" 2677 depends on CPU_SUP_INTEL !! 455 depends on LEON_PCI 2678 default y 456 default y 2679 help 457 help 2680 Mitigate L1 Terminal Fault (L1TF) h !! 458 Say Y here to include the GRPCI2 Host Bridge Driver. 2681 hardware vulnerability which allows << 2682 available in the Level 1 Data Cache << 2683 See <file:Documentation/admin-guide << 2684 459 2685 config MITIGATION_RETBLEED !! 460 config SUN_OPENPROMFS 2686 bool "Mitigate RETBleed hardware bug" !! 461 tristate "Openprom tree appears in /proc/openprom" 2687 depends on (CPU_SUP_INTEL && MITIGATI << 2688 default y << 2689 help 462 help 2690 Enable mitigation for RETBleed (Arb !! 463 If you say Y, the OpenPROM device tree will be available as a 2691 with Return Instructions) vulnerabi !! 464 virtual file system, which you can mount to /proc/openprom by "mount 2692 execution attack which takes advant !! 465 -t openpromfs none /proc/openprom". 2693 in many modern microprocessors, sim << 2694 unprivileged attacker can use these << 2695 memory security restrictions to gai << 2696 that would otherwise be inaccessibl << 2697 466 2698 config MITIGATION_SPECTRE_V1 !! 467 To compile the /proc/openprom support as a module, choose M here: the 2699 bool "Mitigate SPECTRE V1 hardware bu !! 468 module will be called openpromfs. 2700 default y << 2701 help << 2702 Enable mitigation for Spectre V1 (B << 2703 class of side channel attacks that << 2704 execution that bypasses conditional << 2705 memory access bounds check. << 2706 See also <file:Documentation/admin- << 2707 469 2708 config MITIGATION_SPECTRE_V2 !! 470 Only choose N if you know in advance that you will not need to modify 2709 bool "Mitigate SPECTRE V2 hardware bu !! 471 OpenPROM settings on the running system. 2710 default y << 2711 help << 2712 Enable mitigation for Spectre V2 (B << 2713 V2 is a class of side channel attac << 2714 indirect branch predictors inside t << 2715 attacks, the attacker can steer spe << 2716 victim to gadget code by poisoning << 2717 used for predicting indirect branch << 2718 See also <file:Documentation/admin- << 2719 472 2720 config MITIGATION_SRBDS !! 473 # Makefile helpers 2721 bool "Mitigate Special Register Buffe !! 474 config SPARC64_PCI 2722 depends on CPU_SUP_INTEL !! 475 bool 2723 default y 476 default y 2724 help !! 477 depends on SPARC64 && PCI 2725 Enable mitigation for Special Regis << 2726 SRBDS is a hardware vulnerability t << 2727 Sampling (MDS) techniques to infer << 2728 register accesses. An unprivileged << 2729 from RDRAND and RDSEED executed on << 2730 using MDS techniques. << 2731 See also << 2732 <file:Documentation/admin-guide/hw- << 2733 478 2734 config MITIGATION_SSB !! 479 config SPARC64_PCI_MSI 2735 bool "Mitigate Speculative Store Bypa !! 480 bool 2736 default y 481 default y 2737 help !! 482 depends on SPARC64_PCI && PCI_MSI 2738 Enable mitigation for Speculative S << 2739 hardware security vulnerability and << 2740 of speculative execution in a simil << 2741 security vulnerabilities. << 2742 << 2743 endif << 2744 << 2745 config ARCH_HAS_ADD_PAGES << 2746 def_bool y << 2747 depends on ARCH_ENABLE_MEMORY_HOTPLUG << 2748 << 2749 menu "Power management and ACPI options" << 2750 << 2751 config ARCH_HIBERNATION_HEADER << 2752 def_bool y << 2753 depends on HIBERNATION << 2754 << 2755 source "kernel/power/Kconfig" << 2756 << 2757 source "drivers/acpi/Kconfig" << 2758 << 2759 config X86_APM_BOOT << 2760 def_bool y << 2761 depends on APM << 2762 << 2763 menuconfig APM << 2764 tristate "APM (Advanced Power Managem << 2765 depends on X86_32 && PM_SLEEP << 2766 help << 2767 APM is a BIOS specification for sav << 2768 techniques. This is mostly useful f << 2769 APM compliant BIOSes. If you say Y << 2770 reset after a RESUME operation, the << 2771 battery status information, and use << 2772 notification of APM "events" (e.g. << 2773 << 2774 If you select "Y" here, you can dis << 2775 BIOS by passing the "apm=off" optio << 2776 << 2777 Note that the APM support is almost << 2778 machines with more than one CPU. << 2779 << 2780 In order to use APM, you will need << 2781 and more information, read <file:Do << 2782 and the Battery Powered Linux mini- << 2783 <http://www.tldp.org/docs.html#howt << 2784 << 2785 This driver does not spin down disk << 2786 manpage ("man 8 hdparm") for that), << 2787 VESA-compliant "green" monitors. << 2788 << 2789 This driver does not support the TI << 2790 486/DX4/75 because they don't have << 2791 desktop machines also don't have co << 2792 may cause those machines to panic d << 2793 << 2794 Generally, if you don't have a batt << 2795 much point in using this driver and << 2796 random kernel OOPSes or reboots tha << 2797 anything, try disabling/enabling th << 2798 APM in your BIOS). << 2799 << 2800 Some other things you should try wh << 2801 "weird" problems: << 2802 << 2803 1) make sure that you have enough s << 2804 enabled. << 2805 2) pass the "idle=poll" option to t << 2806 3) switch on floating point emulati << 2807 the "no387" option to the kernel << 2808 4) pass the "floppy=nodma" option t << 2809 5) pass the "mem=4M" option to the << 2810 all but the first 4 MB of RAM) << 2811 6) make sure that the CPU is not ov << 2812 7) read the sig11 FAQ at <http://ww << 2813 8) disable the cache from your BIOS << 2814 9) install a fan for the video card << 2815 10) install a better fan for the CP << 2816 11) exchange RAM chips << 2817 12) exchange the motherboard. << 2818 << 2819 To compile this driver as a module, << 2820 module will be called apm. << 2821 << 2822 if APM << 2823 << 2824 config APM_IGNORE_USER_SUSPEND << 2825 bool "Ignore USER SUSPEND" << 2826 help << 2827 This option will ignore USER SUSPEN << 2828 compliant APM BIOS, you want to say << 2829 series notebooks, it is necessary t << 2830 << 2831 config APM_DO_ENABLE << 2832 bool "Enable PM at boot time" << 2833 help << 2834 Enable APM features at boot time. F << 2835 specification: "When disabled, the << 2836 power manage devices, enter the Sta << 2837 State, or take power saving steps i << 2838 This driver will make CPU Idle call << 2839 feature is turned off -- see "Do CP << 2840 should always save battery power, b << 2841 will be dependent on your BIOS impl << 2842 this option off if your computer ha << 2843 support, or if it beeps continuousl << 2844 this off if you have a NEC UltraLit << 2845 T400CDT. This is off by default sin << 2846 this feature. << 2847 << 2848 config APM_CPU_IDLE << 2849 depends on CPU_IDLE << 2850 bool "Make CPU Idle calls when idle" << 2851 help << 2852 Enable calls to APM CPU Idle/CPU Bu << 2853 On some machines, this can activate << 2854 a slowed CPU clock rate, when the m << 2855 are made after the idle loop has ru << 2856 333 mS). On some machines, this wil << 2857 whenever the CPU becomes idle. (On << 2858 this option does nothing.) << 2859 << 2860 config APM_DISPLAY_BLANK << 2861 bool "Enable console blanking using A << 2862 help << 2863 Enable console blanking using the A << 2864 turn off the LCD backlight when the << 2865 virtual console blanks the screen. << 2866 the virtual console screen blanker, << 2867 when using the X Window system. Thi << 2868 do with your VESA-compliant power-s << 2869 option doesn't work for all laptops << 2870 backlight at all, or it might print << 2871 especially if you are using gpm. << 2872 << 2873 config APM_ALLOW_INTS << 2874 bool "Allow interrupts during APM BIO << 2875 help << 2876 Normally we disable external interr << 2877 the APM BIOS as a measure to lessen << 2878 BIOS implementation. The BIOS shou << 2879 needs to. Unfortunately, some BIOS << 2880 many of the newer IBM Thinkpads. I << 2881 suspend, try setting this to Y. Ot << 2882 << 2883 endif # APM << 2884 << 2885 source "drivers/cpufreq/Kconfig" << 2886 << 2887 source "drivers/cpuidle/Kconfig" << 2888 << 2889 source "drivers/idle/Kconfig" << 2890 483 2891 endmenu 484 endmenu 2892 485 2893 menu "Bus options (PCI etc.)" !! 486 config COMPAT 2894 << 2895 choice << 2896 prompt "PCI access mode" << 2897 depends on X86_32 && PCI << 2898 default PCI_GOANY << 2899 help << 2900 On PCI systems, the BIOS can be use << 2901 determine their configuration. Howe << 2902 have BIOS bugs and may crash if thi << 2903 PCI-based systems don't have any BI << 2904 detect the PCI hardware directly wi << 2905 << 2906 With this option, you can specify h << 2907 PCI devices. If you choose "BIOS", << 2908 if you choose "Direct", the BIOS wo << 2909 choose "MMConfig", then PCI Express << 2910 If you choose "Any", the kernel wil << 2911 direct access method and falls back << 2912 work. If unsure, go with the defaul << 2913 << 2914 config PCI_GOBIOS << 2915 bool "BIOS" << 2916 << 2917 config PCI_GOMMCONFIG << 2918 bool "MMConfig" << 2919 << 2920 config PCI_GODIRECT << 2921 bool "Direct" << 2922 << 2923 config PCI_GOOLPC << 2924 bool "OLPC XO-1" << 2925 depends on OLPC << 2926 << 2927 config PCI_GOANY << 2928 bool "Any" << 2929 << 2930 endchoice << 2931 << 2932 config PCI_BIOS << 2933 def_bool y << 2934 depends on X86_32 && PCI && (PCI_GOBI << 2935 << 2936 # x86-64 doesn't support PCI BIOS access from << 2937 config PCI_DIRECT << 2938 def_bool y << 2939 depends on PCI && (X86_64 || (PCI_GOD << 2940 << 2941 config PCI_MMCONFIG << 2942 bool "Support mmconfig PCI config spa << 2943 default y << 2944 depends on PCI && (ACPI || JAILHOUSE_ << 2945 depends on X86_64 || (PCI_GOANY || PC << 2946 << 2947 config PCI_OLPC << 2948 def_bool y << 2949 depends on PCI && OLPC && (PCI_GOOLPC << 2950 << 2951 config PCI_XEN << 2952 def_bool y << 2953 depends on PCI && XEN << 2954 << 2955 config MMCONF_FAM10H << 2956 def_bool y << 2957 depends on X86_64 && PCI_MMCONFIG && << 2958 << 2959 config PCI_CNB20LE_QUIRK << 2960 bool "Read CNB20LE Host Bridge Window << 2961 depends on PCI << 2962 help << 2963 Read the PCI windows out of the CNB << 2964 PCI hotplug to work on systems with << 2965 not have ACPI. << 2966 << 2967 There's no public spec for this chi << 2968 is known to be incomplete. << 2969 << 2970 You should say N unless you know yo << 2971 << 2972 config ISA_BUS << 2973 bool "ISA bus support on modern syste << 2974 help << 2975 Expose ISA bus device drivers and o << 2976 configuration. Enable this option i << 2977 bus. ISA is an older system, displa << 2978 architectures -- if your target mac << 2979 not have an ISA bus. << 2980 << 2981 If unsure, say N. << 2982 << 2983 # x86_64 have no ISA slots, but can have ISA- << 2984 config ISA_DMA_API << 2985 bool "ISA-style DMA support" if (X86_ << 2986 default y << 2987 help << 2988 Enables ISA-style DMA support for d << 2989 If unsure, say Y. << 2990 << 2991 if X86_32 << 2992 << 2993 config ISA << 2994 bool "ISA support" << 2995 help << 2996 Find out whether you have ISA slots << 2997 name of a bus system, i.e. the way << 2998 inside your box. Other bus systems << 2999 (MCA) or VESA. ISA is an older sys << 3000 newer boards don't support it. If << 3001 << 3002 config SCx200 << 3003 tristate "NatSemi SCx200 support" << 3004 help << 3005 This provides basic support for Nat << 3006 (now AMD's) Geode processors. The << 3007 PCI-IDs of several on-chip devices, << 3008 for other scx200_* drivers. << 3009 << 3010 If compiled as a module, the driver << 3011 << 3012 config SCx200HR_TIMER << 3013 tristate "NatSemi SCx200 27MHz High-R << 3014 depends on SCx200 << 3015 default y << 3016 help << 3017 This driver provides a clocksource << 3018 27MHz high-resolution timer. Its a << 3019 NSC Geode SC-1100's buggy TSC, whic << 3020 processor goes idle (as is done by << 3021 other workaround is idle=poll boot << 3022 << 3023 config OLPC << 3024 bool "One Laptop Per Child support" << 3025 depends on !X86_PAE << 3026 select GPIOLIB << 3027 select OF << 3028 select OF_PROMTREE << 3029 select IRQ_DOMAIN << 3030 select OLPC_EC << 3031 help << 3032 Add support for detecting the uniqu << 3033 XO hardware. << 3034 << 3035 config OLPC_XO1_PM << 3036 bool "OLPC XO-1 Power Management" << 3037 depends on OLPC && MFD_CS5535=y && PM << 3038 help << 3039 Add support for poweroff and suspen << 3040 << 3041 config OLPC_XO1_RTC << 3042 bool "OLPC XO-1 Real Time Clock" << 3043 depends on OLPC_XO1_PM && RTC_DRV_CMO << 3044 help << 3045 Add support for the XO-1 real time << 3046 programmable wakeup source. << 3047 << 3048 config OLPC_XO1_SCI << 3049 bool "OLPC XO-1 SCI extras" << 3050 depends on OLPC && OLPC_XO1_PM && GPI << 3051 depends on INPUT=y << 3052 select POWER_SUPPLY << 3053 help << 3054 Add support for SCI-based features << 3055 - EC-driven system wakeups << 3056 - Power button << 3057 - Ebook switch << 3058 - Lid switch << 3059 - AC adapter status updates << 3060 - Battery status updates << 3061 << 3062 config OLPC_XO15_SCI << 3063 bool "OLPC XO-1.5 SCI extras" << 3064 depends on OLPC && ACPI << 3065 select POWER_SUPPLY << 3066 help << 3067 Add support for SCI-based features << 3068 - EC-driven system wakeups << 3069 - AC adapter status updates << 3070 - Battery status updates << 3071 << 3072 config GEODE_COMMON << 3073 bool 487 bool 3074 !! 488 depends on SPARC64 3075 config ALIX !! 489 default y 3076 bool "PCEngines ALIX System Support ( !! 490 select HAVE_UID16 3077 select GPIOLIB << 3078 select GEODE_COMMON << 3079 help << 3080 This option enables system support << 3081 At present this just sets up LEDs f << 3082 ALIX2/3/6 boards. However, other s << 3083 get added here. << 3084 << 3085 Note: You must still enable the dri << 3086 (GPIO_CS5535 & LEDS_GPIO) to actual << 3087 << 3088 Note: You have to set alix.force=1 << 3089 << 3090 config NET5501 << 3091 bool "Soekris Engineering net5501 Sys << 3092 select GPIOLIB << 3093 select GEODE_COMMON << 3094 help << 3095 This option enables system support << 3096 << 3097 config GEOS << 3098 bool "Traverse Technologies GEOS Syst << 3099 select GPIOLIB << 3100 select GEODE_COMMON << 3101 depends on DMI << 3102 help << 3103 This option enables system support << 3104 << 3105 config TS5500 << 3106 bool "Technologic Systems TS-5500 pla << 3107 depends on MELAN << 3108 select CHECK_SIGNATURE << 3109 select NEW_LEDS << 3110 select LEDS_CLASS << 3111 help << 3112 This option enables system support << 3113 << 3114 endif # X86_32 << 3115 << 3116 config AMD_NB << 3117 def_bool y << 3118 depends on CPU_SUP_AMD && PCI << 3119 << 3120 endmenu << 3121 << 3122 menu "Binary Emulations" << 3123 << 3124 config IA32_EMULATION << 3125 bool "IA32 Emulation" << 3126 depends on X86_64 << 3127 select ARCH_WANT_OLD_COMPAT_IPC 491 select ARCH_WANT_OLD_COMPAT_IPC 3128 select BINFMT_ELF << 3129 select COMPAT_OLD_SIGACTION 492 select COMPAT_OLD_SIGACTION 3130 help << 3131 Include code to run legacy 32-bit p << 3132 64-bit kernel. You should likely tu << 3133 100% sure that you don't have any 3 << 3134 << 3135 config IA32_EMULATION_DEFAULT_DISABLED << 3136 bool "IA32 emulation disabled by defa << 3137 default n << 3138 depends on IA32_EMULATION << 3139 help << 3140 Make IA32 emulation disabled by def << 3141 processes and access to 32-bit sysc << 3142 default value. << 3143 << 3144 config X86_X32_ABI << 3145 bool "x32 ABI for 64-bit mode" << 3146 depends on X86_64 << 3147 # llvm-objcopy does not convert x86_6 << 3148 # compressed debug sections to x86_x3 << 3149 # https://github.com/ClangBuiltLinux/ << 3150 # https://github.com/ClangBuiltLinux/ << 3151 depends on $(success,$(OBJCOPY) --ver << 3152 help << 3153 Include code to run binaries for th << 3154 for 64-bit processors. An x32 proc << 3155 full 64-bit register file and wide << 3156 pointers at 32 bits for smaller mem << 3157 << 3158 config COMPAT_32 << 3159 def_bool y << 3160 depends on IA32_EMULATION || X86_32 << 3161 select HAVE_UID16 << 3162 select OLD_SIGSUSPEND3 << 3163 << 3164 config COMPAT << 3165 def_bool y << 3166 depends on IA32_EMULATION || X86_X32_ << 3167 << 3168 config COMPAT_FOR_U64_ALIGNMENT << 3169 def_bool y << 3170 depends on COMPAT << 3171 << 3172 endmenu << 3173 << 3174 config HAVE_ATOMIC_IOMAP << 3175 def_bool y << 3176 depends on X86_32 << 3177 << 3178 source "arch/x86/kvm/Kconfig" << 3179 493 3180 source "arch/x86/Kconfig.assembler" !! 494 source "drivers/sbus/char/Kconfig"
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.