Lines Matching +full:lock +full:- +full:detect +full:- +full:function +full:- +full:integer +full:- +full:n +full:- +full:enable
1 # SPDX-License-Identifier: GPL-2.0
4 bool "64-bit kernel" if "$(ARCH)" = "x86"
7 Say yes to build a 64-bit kernel - formerly known as x86_64
8 Say no to build a 32-bit kernel - formerly known as i386
13 # Options that are inherently 32-bit kernel only:
27 # Options that are inherently 64-bit kernel only:
46 We keep the static function tracing (!DYNAMIC_FTRACE) around
47 in order to test the non static function tracing in the
55 # ported to 32-bit as well. )
153 # Word-size accesses may read uninitialized data past the trailing \0
332 default "elf32-i386" if X86_32
333 default "elf64-x86-64" if X86_64
427 …default $(success,$(srctree)/scripts/gcc-x86_64-has-stack-protector.sh $(CC) $(CLANG_FLAGS)) if 64…
428 default $(success,$(srctree)/scripts/gcc-x86_32-has-stack-protector.sh $(CC) $(CLANG_FLAGS))
432 the segment on 32-bit kernels.
437 bool "Symmetric multi-processing support"
440 a system with only one CPU, say N. If you have a system with more
443 If you say N here, the kernel will run on uni- and multiprocessor
447 will run faster if you say N here.
458 See also <file:Documentation/arch/x86/i386/IO-APIC.rst>,
459 <file:Documentation/admin-guide/lockup-watchdogs.rst> and the SMP-HOWTO available at
462 If you don't know what to do here, say N.
470 This allows 32-bit apic IDs (so it can support very large systems),
478 If you don't know what to do here, say N.
481 bool "Enable MSI and MSI-x delivery by posted interrupts"
489 If you don't know what to do here, say N.
492 bool "Enable MPS table" if ACPI
505 Enable x86 CPU resource control support.
518 Say N if unsure.
536 bool "Support for extended (non-PC) x86 platforms"
543 If you enable this option then you'll be able to select support
544 for the following non-PC x86 platforms, depending on the value of
547 32-bit platforms (CONFIG_64BIT=n):
550 RDC R-321x SoC
552 STA2X11-based (e.g. Northville)
555 64-bit platforms (CONFIG_64BIT=y):
561 generic distribution kernel, say Y here - otherwise say N.
574 Adds support for Numascale NumaChip large-SMP systems. Needed to
575 enable more than ~168 cores.
576 If you don't have one of these, you should say N here.
587 supposed to run on these EM64T-based machines. Only choose this option
601 If you don't have one of these, you should say N here.
610 Enable support for the Goldfish virtual platform used primarily
612 Goldfish emulator say N here.
642 interfaces. If you are building for a PC class system say N here.
698 - BayTrail
699 - Braswell
700 - Quark
705 bool "Enable IOSF sideband access through debugfs"
715 If you don't require the option or are in doubt, say N.
718 bool "RDC R-321x SoC"
724 This option is needed for RDC R-321x system-on-chip, also known
725 as R-8610-(G).
726 If you don't have one of these chips, you should say N here.
729 bool "Support non-standard 32-bit SMP architectures"
744 # On 32-bit this adds too big of NODES_SHIFT and we run out of page flags:
745 # On 32-bit SPARSEMEM adds too big of SECTIONS_WIDTH:
756 This adds support for boards based on the STA2X11 IO-Hub,
773 If unused, say N.
777 prompt "Single-depth WCHAN output"
782 caller function. This provides more accurate wchan values,
790 Say Y here to enable options for running Linux under various hyper-
794 If you say N, all options in this submenu will be skipped and
800 bool "Enable paravirtualization code"
812 bool "paravirt-ops debugging"
815 Enable to debug paravirt_ops internals. Specifically, BUG if
823 spinlock implementation with something virtualization-friendly
832 def_bool n
851 def_bool n
866 Select this option to enable fine granularity task steal time
871 If in doubt, say N here.
877 bool "Jailhouse non-root cell support"
881 This option allows to run Linux as guest in a Jailhouse non-root
891 a flexible, lightweight reference open-source hypervisor, built with
892 real-time and safety-criticality in mind. It is built for embedded
893 IOT with small footprint and real-time features. More details can be
897 bool "Intel TDX (Trust Domain Extensions) - Guest Support"
921 Use the IA-PC HPET (High Precision Event Timer) to manage
927 as it is off-chip. The interface used is documented
934 Choose N to continue using the legacy 8254 timer.
945 bool "Enable DMI scanning" if EXPERT
961 The GART supports full DMA access for devices with 32-bit access
970 32-bit limited device.
981 bool "Enable Maximum number of SMP Processors and NUMA Nodes"
985 Enable maximum number of CPUS and NUMA Nodes for this architecture.
986 If unsure, say N.
995 # The ranges are different on 32-bit and 64-bit kernels, depending on
1057 by sharing mid-level caches, last-level cache tags or internal
1065 prompt "Multi-core scheduler support"
1068 Multi-core scheduler support improves the CPU scheduler's decision
1069 making when dealing with multi-core CPU chips at a cost of slightly
1070 increased overhead in some places. If unsure say N here.
1104 integrated interrupt controller in the CPU. If you have a single-CPU
1106 enable and use it. If you say Y here even though your machine doesn't
1108 all. The local APIC supports CPU-generated self-interrupts (timer,
1113 bool "IO-APIC support on uniprocessors"
1116 An IO-APIC (I/O Advanced Programmable Interrupt Controller) is an
1117 SMP-capable replacement for PC-style interrupt controllers. Most
1120 If you have a single-CPU system with an IO-APIC, you can say Y here
1122 an IO-APIC, then the kernel will still run with no slowdown at all.
1150 entry in the chipset's IO-APIC is masked (as, e.g. the RT
1177 Enable support for /dev/mcelog which is needed by the old mcelog
1215 QA it is safe to say n.
1224 mode, which is an 80286-era approximation of 16-bit real mode.
1232 a 16-bit DOS program where 16-bit performance matters, vm86
1234 enable this option.
1236 Note that any app that works on a 64-bit kernel is unlikely to
1237 need this option, as 64-bit kernels don't, and can't, support
1238 V8086 mode. This option is also unrelated to 16-bit protected
1239 mode and is not needed to run most 16-bit programs under Wine.
1244 If unsure, say N here.
1251 bool "Enable support for 16-bit segments" if EXPERT
1255 This option is required by programs like Wine to run 16-bit
1258 plus 16K runtime memory on x86-64,
1269 bool "Enable vsyscall emulation" if EXPERT
1276 tries to use a vsyscall. With this option set to N, offending
1281 care should be used even with newer programs if set to N.
1318 Say N otherwise.
1321 bool "Enable X86 board specific fixups for reboot"
1331 CS5530A and CS5536 chipsets and the RDC R-321x SoC.
1333 Say Y if you want to enable the fixup. Currently, it's safe to
1334 enable this option even if you don't need it.
1335 Say N otherwise.
1347 default n
1361 default n
1378 tristate "/dev/cpu/*/msr - Model-specific register support"
1381 Model-Specific Registers (MSRs). It is a character device with
1383 MSR accesses are directed to a specific CPU on multi-processor
1387 tristate "/dev/cpu/*/cpuid - CPU information support"
1403 However, the address space of 32-bit x86 processors is only 4
1422 PAE implements 3-level paging on IA32 processors. PAE is fully
1438 Select this if you have a 32-bit processor and between 1 and 4
1446 Select this if you have a 32-bit processor and more than 4
1465 will also likely make your kernel incompatible with binary-only
1505 larger swapspace support for non-overcommit purposes. It
1510 bool "Enable 5-level page tables support"
1516 5-level paging enables access to larger address space:
1523 support 4- or 5-level paging.
1525 See Documentation/arch/x86/x86_64/5level-paging.rst for more
1528 Say N if unsure.
1540 bool "Enable statistic for Change Page Attribute"
1550 def_bool n
1563 Say yes to enable support for the encryption of system memory.
1576 Enable NUMA (Non-Uniform Memory Access) support.
1582 For 64-bit this is recommended if the system is Intel Core i7
1585 For 32-bit this is only needed if you boot a 32-bit
1586 kernel on a 64-bit NUMA platform.
1588 Otherwise, you should say N.
1595 Enable AMD NUMA node topology detection. You should say Y here if
1607 Enable ACPI SRAT based node topology detection.
1638 bool "Enable sysfs memory/probe interface"
1642 See Documentation/admin-guide/mm/memory-hotplug.rst for more information.
1643 If you are unsure how to answer this question, answer N.
1658 tristate "Support non-standard NVDIMMs and ADR protected memory"
1665 Treat memory marked using the non-standard e820 type of 12 as used
1666 by the Intel Sandy Bridge-EP reference BIOS as protected memory.
1673 bool "Allocate 3rd-level pagetables from highmem"
1678 low memory. Setting this option will put user-space page table
1686 configuration, it is disabled at runtime. Enable it by
1691 Documentation/admin-guide/kernel-parameters.rst to adjust this.
1699 BIOS-originated corruption always affects the same memory,
1733 emulation can be found in <file:arch/x86/math-emu/README>.
1745 a video (VGA) card on a PCI or AGP bus. Enabling write-combining
1759 The AMD K6-2 (stepping 8 and above) and K6-3 processors have two
1761 write-combining. All of these processors are supported by this code
1788 int "MTRR cleanup enable value (0-1)"
1793 Enable mtrr cleanup default value
1796 int "MTRR cleanup spare reg num (0-7)"
1802 mtrr_spare_reg_nr=N on the kernel command line.
1815 Say N here if you see bootup problems (boot crash, boot hang,
1816 spontaneous reboots) or a non-working video driver.
1832 specific cases in protected and virtual-8086 modes. Emulated
1839 # https://github.com/llvm/llvm-project/commit/e0b89df2e0f0130881bf6c39bf31d7f6aac00e0f
1840 # https://github.com/llvm/llvm-project/commit/dfcf69770bc522b9e411c66454934a37c1f35332
1841 def_bool ((CC_IS_GCC && $(cc-option, -fcf-protection=branch -mindirect-branch-register)) || \
1843 $(as-instr,endbr64)
1846 def_bool n
1854 # https://github.com/llvm/llvm-project/commit/9d7001eba9c4cb311e03cd8cdc231f9e579f2d0f
1860 hardware support course-grain forward-edge Control Flow Integrity
1875 # Note: only available in 64-bit mode
1881 page-based protections, but without requiring modification of the
1884 For details, see Documentation/core-api/protection-keys.rst
1893 prompt "TSX enable mode"
1898 allows to optimize locking protocols through lock elision which
1907 Even with TSX enabled, the kernel will attempt to enable the best
1912 and =auto. See Documentation/admin-guide/kernel-parameters.txt for more
1922 TSX is disabled if possible - equals to tsx=off command line parameter.
1927 TSX is always enabled on TSX capable HW - equals the tsx=on command
1934 side channel attacks- equals the tsx=auto command line parameter.
1953 If unsure, say N.
1963 Shadow stack protection is a hardware feature that detects function
1972 If unsure, say N.
1989 If unsure, say N.
2006 resultant kernel should continue to boot on existing non-EFI
2017 See Documentation/admin-guide/efi-stub.rst for more information.
2037 bool "EFI mixed-mode support"
2040 Enabling this feature allows a 64-bit kernel to be booted
2041 on a 32-bit firmware, provided that your CPU supports 64-bit
2044 Note that it is not possible to boot a mixed-mode enabled
2045 kernel via the EFI boot stub - a bootloader that supports
2048 If unsure, say N.
2054 Export EFI runtime memory regions to /sys/firmware/efi/runtime-map.
2058 See also Documentation/ABI/testing/sysfs-firmware-efi-runtime-map.
2106 If the kernel is not relocatable (CONFIG_RELOCATABLE=n) then bzImage
2127 command line boot parameter passed to the panic-ed
2128 kernel. Please take a look at Documentation/admin-guide/kdump/kdump.rst
2170 On 64-bit, the kernel physical and virtual addresses are
2177 On 32-bit, the kernel physical and virtual addresses are
2208 If bootloader loads the kernel at a non-aligned address and
2212 If bootloader loads the kernel at a non-aligned address and
2220 On 32-bit this value must be a multiple of 0x2000. On 64-bit
2270 to 64-bit linear addresses, allowing software to use of the
2281 def_bool n
2282 prompt "Disable the 32-bit vDSO (needed for glibc 2.3.3)"
2286 presented with a 32-bit vDSO that is not mapped at the address
2296 dl_main: Assertion `(void *) ph->p_vaddr == _rtld_local._dl_sysinfo_dso' failed!
2299 option from 1 to 0, which turns off the 32-bit vDSO entirely.
2302 If unsure, say N: if you are compiling your own kernel, you
2334 certain uses of the vsyscall area as an ASLR-bypassing
2349 bool "Built-in kernel command line"
2361 Systems with fully functional boot loaders (i.e. non-embedded)
2362 should leave this option set to 'N'.
2365 string "Built-in kernel command string"
2377 In most cases, the command line (whether built-in or provided
2382 bool "Built-in command line overrides boot loader arguments"
2386 command line, and use ONLY the built-in command line.
2389 be set to 'N' under normal conditions.
2392 bool "Enable the LDT (local descriptor table)" if EXPERT
2395 Linux can allow user programs to install a per-process x86
2397 call. This is required to run 16-bit or segmented code such as
2402 context switches and increases the low-level kernel attack
2405 Saying 'N' here may make sense for embedded or server kernels.
2421 Say 'N' unless you want to really enforce this check.
2435 bool "Split Lock Detect and Bus Lock Detect support"
2439 Enable Split Lock Detect and Bus Lock Detect functionalities.
2445 def_bool $(success,echo 'int __seg_fs fs; int __seg_gs gs;' | $(CC) -x c - -S -o /dev/null)
2455 # -fsanitize=kernel-address (KASAN) and -fsanitize=thread
2457 # GCC < 13.3 - see GCC PR sanitizer/111736.
2462 def_bool $(cc-option,-mharden-sls=all)
2465 def_bool $(cc-option,-mfunction-return=thunk-extern)
2468 def_bool $(cc-option,-fpatchable-function-entry=16,16)
2478 # Basically: FUNCTION_ALIGNMENT - 5*CFI_CLANG
2486 def_bool n
2500 def_bool n
2511 Say Y here to enable options which enable mitigations for hardware
2516 If you say N, all mitigations will be disabled. This CANNOT be
2540 kernel-to-user data leaks by avoiding speculative indirect
2541 branches. Requires a compiler with -mindirect-branch=thunk-extern
2545 bool "Enable return-thunks"
2550 Compile the kernel with the return-thunks compiler option to guard
2551 against kernel-to-user data leaks by avoiding return speculation.
2552 Requires a compiler with -mfunction-return=thunk-extern
2556 bool "Enable UNRET on kernel entry"
2570 SKL Return-Stack-Buffer (RSB) underflow issue. The mitigation is off
2572 retbleed=stuff option. For non-affected systems the overhead of this
2573 option is marginal as the call depth tracking is using run-time
2580 bool "Enable call thunks and call depth tracking debugging"
2583 default n
2585 Enable call/ret counters for imbalance detection and build in
2588 kernel command line with 'debug-callthunks'.
2589 Only enable this when you are debugging call thunks as this
2590 creates a noticeable runtime overhead. If unsure say N.
2593 bool "Enable IBPB on kernel entry"
2600 bool "Enable IBRS on kernel entry"
2613 Enable the SRSO mitigation needed on AMD Zen1-4 machines.
2616 bool "Mitigate Straight-Line-Speculation"
2619 default n
2621 Compile the kernel with straight-line-speculation options to guard
2630 Enable mitigation for Gather Data Sampling (GDS). GDS is a hardware
2640 Enable mitigation for Register File Data Sampling (RFDS) by default.
2643 stored in floating point, vector and integer registers.
2644 See also <file:Documentation/admin-guide/hw-vuln/reg-file-data-sampling.rst>
2647 bool "Mitigate Spectre-BHB (Branch History Injection)"
2651 Enable BHI mitigations. BHI attacks are a form of Spectre V2 attacks
2654 See <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2661 Enable mitigation for Microarchitectural Data Sampling (MDS). MDS is
2664 See also <file:Documentation/admin-guide/hw-vuln/mds.rst>
2671 Enable mitigation for TSX Asynchronous Abort (TAA). TAA is a hardware
2675 See also <file:Documentation/admin-guide/hw-vuln/tsx_async_abort.rst>
2682 Enable mitigation for MMIO Stale Data hardware bugs. Processor MMIO
2683 Stale Data Vulnerabilities are a class of memory-mapped I/O (MMIO)
2687 <file:Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst>
2697 See <file:Documentation/admin-guide/hw-vuln/l1tf.rst
2704 Enable mitigation for RETBleed (Arbitrary Speculative Code Execution
2716 Enable mitigation for Spectre V1 (Bounds Check Bypass). Spectre V1 is a
2720 See also <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2726 Enable mitigation for Spectre V2 (Branch Target Injection). Spectre
2732 See also <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2739 Enable mitigation for Special Register Buffer Data Sampling (SRBDS).
2746 <file:Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst>
2752 Enable mitigation for Speculative Store Bypass (SSB). SSB is a
2785 battery status information, and user-space programs will receive
2795 and more information, read <file:Documentation/power/apm-acpi.rst>
2796 and the Battery Powered Linux mini-HOWTO, available from
2801 VESA-compliant "green" monitors.
2809 much point in using this driver and you should say N. If you get
2842 compliant APM BIOS, you want to say N. However, on the NEC Versa M
2846 bool "Enable PM at boot time"
2848 Enable APM features at boot time. From page 36 of the APM BIOS
2853 feature is turned off -- see "Do CPU IDLE calls", below). This
2866 Enable calls to APM CPU Idle/CPU Busy inside the kernel's idle loop.
2875 bool "Enable console blanking using APM"
2877 Enable console blanking using the APM. Some laptops can use this to
2882 do with your VESA-compliant power-saving monitor. Further, this
2883 option doesn't work for all laptops -- it might not turn off your
2893 needs to. Unfortunately, some BIOSes do not -- especially those in
2895 suspend, try setting this to Y. Otherwise, say N.
2914 On PCI systems, the BIOS can be used to detect the PCI devices and
2917 PCI-based systems don't have any BIOS at all. Linux can also try to
2918 detect the PCI hardware directly without using the BIOS.
2920 With this option, you can specify how Linux should detect the
2938 bool "OLPC XO-1"
2950 # x86-64 doesn't support PCI BIOS access from long mode so always go direct.
2984 You should say N unless you know you need this.
2990 configuration. Enable this option if your target machine has an ISA
2992 architectures -- if your target machine is modern, it probably does
2995 If unsure, say N.
2997 # x86_64 have no ISA slots, but can have ISA-style DMA.
2999 bool "ISA-style DMA support" if (X86_64 && EXPERT)
3002 Enables ISA-style DMA support for devices requiring such controllers.
3014 newer boards don't support it. If you have ISA, say Y, otherwise N.
3021 PCI-IDs of several on-chip devices, so its a good dependency
3027 tristate "NatSemi SCx200 27MHz High-Resolution Timer Support"
3031 This driver provides a clocksource built upon the on-chip
3032 27MHz high-resolution timer. Its also a workaround for
3033 NSC Geode SC-1100's buggy TSC, which loses time when the
3050 bool "OLPC XO-1 Power Management"
3053 Add support for poweroff and suspend of the OLPC XO-1 laptop.
3056 bool "OLPC XO-1 Real Time Clock"
3059 Add support for the XO-1 real time clock, which can be used as a
3063 bool "OLPC XO-1 SCI extras"
3068 Add support for SCI-based features of the OLPC XO-1 laptop:
3069 - EC-driven system wakeups
3070 - Power button
3071 - Ebook switch
3072 - Lid switch
3073 - AC adapter status updates
3074 - Battery status updates
3077 bool "OLPC XO-1.5 SCI extras"
3081 Add support for SCI-based features of the OLPC XO-1.5 laptop:
3082 - EC-driven system wakeups
3083 - AC adapter status updates
3084 - Battery status updates
3099 Note: You must still enable the drivers for GPIO and LED support
3120 bool "Technologic Systems TS-5500 platform support"
3126 This option enables system support for the Technologic Systems TS-5500.
3145 Include code to run legacy 32-bit programs under a
3146 64-bit kernel. You should likely turn this on, unless you're
3147 100% sure that you don't have any 32-bit programs left.
3151 default n
3154 Make IA32 emulation disabled by default. This prevents loading 32-bit
3155 processes and access to 32-bit syscalls. If unsure, leave it to its
3159 bool "x32 ABI for 64-bit mode"
3161 # llvm-objcopy does not convert x86_64 .note.gnu.property or
3165 depends on $(success,$(OBJCOPY) --version | head -n1 | grep -qv llvm)
3167 Include code to run binaries for the x32 native 32-bit ABI
3168 for 64-bit processors. An x32 process gets access to the
3169 full 64-bit register file and wide data path while leaving