blob: ea35bf91fc0f2c9a848f74ed0133d6ce1fc36161 [file] [log] [blame]
Christoph Hellwig79b05c12018-07-31 13:39:26 +02001# SPDX-License-Identifier: GPL-2.0
2
Christoph Hellwigf1639772018-07-31 13:39:27 +02003menu "UML-specific options"
4
5config UML
6 bool
7 default y
8 select ARCH_HAS_KCOV
9 select HAVE_ARCH_AUDITSYSCALL
10 select HAVE_ARCH_SECCOMP_FILTER
11 select HAVE_UID16
12 select HAVE_FUTEX_CMPXCHG if FUTEX
13 select HAVE_DEBUG_KMEMLEAK
14 select GENERIC_IRQ_SHOW
15 select GENERIC_CPU_DEVICES
16 select GENERIC_CLOCKEVENTS
17 select HAVE_GCC_PLUGINS
18 select TTY # Needed for line.c
19
20config MMU
21 bool
22 default y
23
24config NO_IOMEM
25 def_bool y
26
27config ISA
28 bool
29
30config SBUS
31 bool
32
33config PCI
34 bool
35
36config PCMCIA
37 bool
38
39config TRACE_IRQFLAGS_SUPPORT
40 bool
41 default y
42
43config LOCKDEP_SUPPORT
44 bool
45 default y
46
47config STACKTRACE_SUPPORT
48 bool
49 default y
50 select STACKTRACE
51
52config GENERIC_CALIBRATE_DELAY
53 bool
54 default y
55
56config HZ
57 int
58 default 100
59
60config NR_CPUS
61 int
62 range 1 1
63 default 1
64
Christoph Hellwig79b05c12018-07-31 13:39:26 +020065source "arch/$(HEADER_ARCH)/um/Kconfig"
Christoph Hellwigf1639772018-07-31 13:39:27 +020066
67config STATIC_LINK
68 bool "Force a static link"
69 default n
70 help
71 This option gives you the ability to force a static link of UML.
72 Normally, UML is linked as a shared binary. This is inconvenient for
73 use in a chroot jail. So, if you intend to run UML inside a chroot,
74 you probably want to say Y here.
75 Additionally, this option enables using higher memory spaces (up to
76 2.75G) for UML.
77
78source "mm/Kconfig"
79
80config LD_SCRIPT_STATIC
81 bool
82 default y
83 depends on STATIC_LINK
84
85config LD_SCRIPT_DYN
86 bool
87 default y
88 depends on !LD_SCRIPT_STATIC
89 select MODULE_REL_CRCS if MODVERSIONS
90
91source "fs/Kconfig.binfmt"
92
93config HOSTFS
94 tristate "Host filesystem"
95 help
96 While the User-Mode Linux port uses its own root file system for
97 booting and normal file access, this module lets the UML user
98 access files stored on the host. It does not require any
99 network connection between the Host and UML. An example use of
100 this might be:
101
102 mount none /tmp/fromhost -t hostfs -o /tmp/umlshare
103
104 where /tmp/fromhost is an empty directory inside UML and
105 /tmp/umlshare is a directory on the host with files the UML user
106 wishes to access.
107
108 For more information, see
109 <http://user-mode-linux.sourceforge.net/hostfs.html>.
110
111 If you'd like to be able to work with files stored on the host,
112 say Y or M here; otherwise say N.
113
114config MCONSOLE
115 bool "Management console"
116 depends on PROC_FS
117 default y
118 help
119 The user mode linux management console is a low-level interface to
120 the kernel, somewhat like the i386 SysRq interface. Since there is
121 a full-blown operating system running under every user mode linux
122 instance, there is much greater flexibility possible than with the
123 SysRq mechanism.
124
125 If you answer 'Y' to this option, to use this feature, you need the
126 mconsole client (called uml_mconsole) which is present in CVS in
127 2.4.5-9um and later (path /tools/mconsole), and is also in the
128 distribution RPM package in 2.4.6 and later.
129
130 It is safe to say 'Y' here.
131
132config MAGIC_SYSRQ
133 bool "Magic SysRq key"
134 depends on MCONSOLE
135 help
136 If you say Y here, you will have some control over the system even
137 if the system crashes for example during kernel debugging (e.g., you
138 will be able to flush the buffer cache to disk, reboot the system
139 immediately or dump some status information). A key for each of the
140 possible requests is provided.
141
142 This is the feature normally accomplished by pressing a key
143 while holding SysRq (Alt+PrintScreen).
144
145 On UML, this is accomplished by sending a "sysrq" command with
146 mconsole, followed by the letter for the requested command.
147
148 The keys are documented in <file:Documentation/admin-guide/sysrq.rst>. Don't say Y
149 unless you really know what this hack does.
150
151config KERNEL_STACK_ORDER
152 int "Kernel stack size order"
153 default 1 if 64BIT
154 range 1 10 if 64BIT
155 default 0 if !64BIT
156 help
157 This option determines the size of UML kernel stacks. They will
158 be 1 << order pages. The default is OK unless you're running Valgrind
159 on UML, in which case, set this to 3.
160
161config MMAPPER
162 tristate "iomem emulation driver"
163 help
164 This driver allows a host file to be used as emulated IO memory inside
165 UML.
166
167config NO_DMA
168 def_bool y
169
170config PGTABLE_LEVELS
171 int
172 default 3 if 3_LEVEL_PGTABLES
173 default 2
174
175config SECCOMP
176 def_bool y
177 prompt "Enable seccomp to safely compute untrusted bytecode"
178 ---help---
179 This kernel feature is useful for number crunching applications
180 that may need to compute untrusted bytecode during their
181 execution. By using pipes or other transports made available to
182 the process as file descriptors supporting the read/write
183 syscalls, it's possible to isolate those applications in
184 their own address space using seccomp. Once seccomp is
185 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
186 and the task is only allowed to execute a few safe syscalls
187 defined by each seccomp mode.
188
189 If unsure, say Y.
190
191endmenu
192
193source "init/Kconfig"
194
195source "kernel/Kconfig.freezer"
196
Christoph Hellwig9bea1802018-07-31 13:39:28 +0200197source "arch/um/drivers/Kconfig"
Christoph Hellwigf1639772018-07-31 13:39:27 +0200198
199source "drivers/Kconfig"
200
201source "net/Kconfig"
202
Christoph Hellwigf1639772018-07-31 13:39:27 +0200203source "fs/Kconfig"
204
205source "security/Kconfig"
206
207source "crypto/Kconfig"
208
209source "lib/Kconfig"
210
211source "arch/um/Kconfig.debug"