Lines Matching +full:num +full:- +full:guest +full:- +full:ids

1 # SPDX-License-Identifier: GPL-2.0
4 bool "64-bit kernel" if "$(ARCH)" = "x86"
7 Say yes to build a 64-bit kernel - formerly known as x86_64
8 Say no to build a 32-bit kernel - formerly known as i386
13 # Options that are inherently 32-bit kernel only:
27 # Options that are inherently 64-bit kernel only:
55 # ported to 32-bit as well. )
154 # Word-size accesses may read uninitialized data past the trailing \0
336 default "elf32-i386" if X86_32
337 default "elf64-x86-64" if X86_64
431 …default $(success,$(srctree)/scripts/gcc-x86_64-has-stack-protector.sh $(CC) $(CLANG_FLAGS)) if 64…
432 default $(success,$(srctree)/scripts/gcc-x86_32-has-stack-protector.sh $(CC) $(CLANG_FLAGS))
436 the segment on 32-bit kernels.
441 bool "Symmetric multi-processing support"
447 If you say N here, the kernel will run on uni- and multiprocessor
462 See also <file:Documentation/arch/x86/i386/IO-APIC.rst>,
463 <file:Documentation/admin-guide/lockup-watchdogs.rst> and the SMP-HOWTO available at
474 This allows 32-bit apic IDs (so it can support very large systems),
485 bool "Enable MSI and MSI-x delivery by posted interrupts"
540 bool "Support for extended (non-PC) x86 platforms"
548 for the following non-PC x86 platforms, depending on the value of
551 32-bit platforms (CONFIG_64BIT=n):
554 RDC R-321x SoC
556 STA2X11-based (e.g. Northville)
559 64-bit platforms (CONFIG_64BIT=y):
565 generic distribution kernel, say Y here - otherwise say N.
578 Adds support for Numascale NumaChip large-SMP systems. Needed to
591 supposed to run on these EM64T-based machines. Only choose this option
702 - BayTrail
703 - Braswell
704 - Quark
722 bool "RDC R-321x SoC"
728 This option is needed for RDC R-321x system-on-chip, also known
729 as R-8610-(G).
733 bool "Support non-standard 32-bit SMP architectures"
748 # On 32-bit this adds too big of NODES_SHIFT and we run out of page flags:
749 # On 32-bit SPARSEMEM adds too big of SECTIONS_WIDTH:
760 This adds support for boards based on the STA2X11 IO-Hub,
781 prompt "Single-depth WCHAN output"
792 bool "Linux guest support"
794 Say Y here to enable options for running Linux under various hyper-
799 disabled, and Linux guest support won't be built in.
816 bool "paravirt-ops debugging"
827 spinlock implementation with something virtualization-friendly
841 bool "KVM Guest support (including kvmclock)"
851 underlying device model, the host provides the guest with
863 This option enables the PVH entry point for guest virtual machines
881 bool "Jailhouse non-root cell support"
885 This option allows to run Linux as guest in a Jailhouse non-root
890 bool "ACRN Guest support"
894 This option allows to run Linux as guest in the ACRN hypervisor. ACRN is
895 a flexible, lightweight reference open-source hypervisor, built with
896 real-time and safety-criticality in mind. It is built for embedded
897 IOT with small footprint and real-time features. More details can be
901 bool "Intel TDX (Trust Domain Extensions) - Guest Support"
910 Support running as a guest under Intel TDX. Without this support,
911 the guest kernel can not boot or run under TDX.
913 which protect the confidentiality and integrity of guest
925 Use the IA-PC HPET (High Precision Event Timer) to manage
931 as it is off-chip. The interface used is documented
965 The GART supports full DMA access for devices with 32-bit access
974 32-bit limited device.
999 # The ranges are different on 32-bit and 64-bit kernels, depending on
1061 by sharing mid-level caches, last-level cache tags or internal
1069 prompt "Multi-core scheduler support"
1072 Multi-core scheduler support improves the CPU scheduler's decision
1073 making when dealing with multi-core CPU chips at a cost of slightly
1108 integrated interrupt controller in the CPU. If you have a single-CPU
1112 all. The local APIC supports CPU-generated self-interrupts (timer,
1117 bool "IO-APIC support on uniprocessors"
1120 An IO-APIC (I/O Advanced Programmable Interrupt Controller) is an
1121 SMP-capable replacement for PC-style interrupt controllers. Most
1124 If you have a single-CPU system with an IO-APIC, you can say Y here
1126 an IO-APIC, then the kernel will still run with no slowdown at all.
1154 entry in the chipset's IO-APIC is masked (as, e.g. the RT
1228 mode, which is an 80286-era approximation of 16-bit real mode.
1236 a 16-bit DOS program where 16-bit performance matters, vm86
1240 Note that any app that works on a 64-bit kernel is unlikely to
1241 need this option, as 64-bit kernels don't, and can't, support
1242 V8086 mode. This option is also unrelated to 16-bit protected
1243 mode and is not needed to run most 16-bit programs under Wine.
1255 bool "Enable support for 16-bit segments" if EXPERT
1259 This option is required by programs like Wine to run 16-bit
1262 plus 16K runtime memory on x86-64,
1335 CS5530A and CS5536 chipsets and the RDC R-321x SoC.
1383 tristate "/dev/cpu/*/msr - Model-specific register support"
1386 Model-Specific Registers (MSRs). It is a character device with
1388 MSR accesses are directed to a specific CPU on multi-processor
1392 tristate "/dev/cpu/*/cpuid - CPU information support"
1408 However, the address space of 32-bit x86 processors is only 4
1427 PAE implements 3-level paging on IA32 processors. PAE is fully
1443 Select this if you have a 32-bit processor and between 1 and 4
1451 Select this if you have a 32-bit processor and more than 4
1470 will also likely make your kernel incompatible with binary-only
1510 larger swapspace support for non-overcommit purposes. It
1515 bool "Enable 5-level page tables support"
1521 5-level paging enables access to larger address space:
1528 support 4- or 5-level paging.
1530 See Documentation/arch/x86/x86_64/5level-paging.rst for more
1582 Enable NUMA (Non-Uniform Memory Access) support.
1588 For 64-bit this is recommended if the system is Intel Core i7
1591 For 32-bit this is only needed if you boot a 32-bit
1592 kernel on a 64-bit NUMA platform.
1648 See Documentation/admin-guide/mm/memory-hotplug.rst for more information.
1664 tristate "Support non-standard NVDIMMs and ADR protected memory"
1671 Treat memory marked using the non-standard e820 type of 12 as used
1672 by the Intel Sandy Bridge-EP reference BIOS as protected memory.
1679 bool "Allocate 3rd-level pagetables from highmem"
1684 low memory. Setting this option will put user-space page table
1697 Documentation/admin-guide/kernel-parameters.rst to adjust this.
1705 BIOS-originated corruption always affects the same memory,
1739 emulation can be found in <file:arch/x86/math-emu/README>.
1751 a video (VGA) card on a PCI or AGP bus. Enabling write-combining
1765 The AMD K6-2 (stepping 8 and above) and K6-3 processors have two
1767 write-combining. All of these processors are supported by this code
1794 int "MTRR cleanup enable value (0-1)"
1802 int "MTRR cleanup spare reg num (0-7)"
1822 spontaneous reboots) or a non-working video driver.
1838 specific cases in protected and virtual-8086 modes. Emulated
1845 # https://github.com/llvm/llvm-project/commit/e0b89df2e0f0130881bf6c39bf31d7f6aac00e0f
1846 # https://github.com/llvm/llvm-project/commit/dfcf69770bc522b9e411c66454934a37c1f35332
1847 def_bool ((CC_IS_GCC && $(cc-option, -fcf-protection=branch -mindirect-branch-register)) || \
1849 $(as-instr,endbr64)
1860 # https://github.com/llvm/llvm-project/commit/9d7001eba9c4cb311e03cd8cdc231f9e579f2d0f
1866 hardware support course-grain forward-edge Control Flow Integrity
1881 # Note: only available in 64-bit mode
1887 page-based protections, but without requiring modification of the
1890 For details, see Documentation/core-api/protection-keys.rst
1918 and =auto. See Documentation/admin-guide/kernel-parameters.txt for more
1928 TSX is disabled if possible - equals to tsx=off command line parameter.
1933 TSX is always enabled on TSX capable HW - equals the tsx=on command
1940 side channel attacks- equals the tsx=auto command line parameter.
1991 Intel Trust Domain Extensions (TDX) protects guest VMs from malicious
2012 resultant kernel should continue to boot on existing non-EFI
2023 See Documentation/admin-guide/efi-stub.rst for more information.
2043 bool "EFI mixed-mode support"
2046 Enabling this feature allows a 64-bit kernel to be booted
2047 on a 32-bit firmware, provided that your CPU supports 64-bit
2050 Note that it is not possible to boot a mixed-mode enabled
2051 kernel via the EFI boot stub - a bootloader that supports
2060 Export EFI runtime memory regions to /sys/firmware/efi/runtime-map.
2064 See also Documentation/ABI/testing/sysfs-firmware-efi-runtime-map.
2133 command line boot parameter passed to the panic-ed
2134 kernel. Please take a look at Documentation/admin-guide/kdump/kdump.rst
2176 On 64-bit, the kernel physical and virtual addresses are
2183 On 32-bit, the kernel physical and virtual addresses are
2214 If bootloader loads the kernel at a non-aligned address and
2218 If bootloader loads the kernel at a non-aligned address and
2226 On 32-bit this value must be a multiple of 0x2000. On 64-bit
2276 to 64-bit linear addresses, allowing software to use of the
2288 prompt "Disable the 32-bit vDSO (needed for glibc 2.3.3)"
2292 presented with a 32-bit vDSO that is not mapped at the address
2302 dl_main: Assertion `(void *) ph->p_vaddr == _rtld_local._dl_sysinfo_dso' failed!
2305 option from 1 to 0, which turns off the 32-bit vDSO entirely.
2340 certain uses of the vsyscall area as an ASLR-bypassing
2355 bool "Built-in kernel command line"
2367 Systems with fully functional boot loaders (i.e. non-embedded)
2371 string "Built-in kernel command string"
2383 In most cases, the command line (whether built-in or provided
2388 bool "Built-in command line overrides boot loader arguments"
2392 command line, and use ONLY the built-in command line.
2401 Linux can allow user programs to install a per-process x86
2403 call. This is required to run 16-bit or segmented code such as
2408 context switches and increases the low-level kernel attack
2451 def_bool $(success,echo 'int __seg_fs fs; int __seg_gs gs;' | $(CC) -x c - -S -o /dev/null)
2461 # -fsanitize=kernel-address (KASAN) and -fsanitize=thread
2463 # GCC < 13.3 - see GCC PR sanitizer/111736.
2468 def_bool $(cc-option,-mharden-sls=all)
2471 def_bool $(cc-option,-mfunction-return=thunk-extern)
2474 def_bool $(cc-option,-fpatchable-function-entry=16,16)
2484 # Basically: FUNCTION_ALIGNMENT - 5*CFI_CLANG
2546 kernel-to-user data leaks by avoiding speculative indirect
2547 branches. Requires a compiler with -mindirect-branch=thunk-extern
2551 bool "Enable return-thunks"
2556 Compile the kernel with the return-thunks compiler option to guard
2557 against kernel-to-user data leaks by avoiding return speculation.
2558 Requires a compiler with -mfunction-return=thunk-extern
2576 SKL Return-Stack-Buffer (RSB) underflow issue. The mitigation is off
2578 retbleed=stuff option. For non-affected systems the overhead of this
2579 option is marginal as the call depth tracking is using run-time
2594 kernel command line with 'debug-callthunks'.
2604 spec_rstack_overflow={ibpb,ibpb-vmexit} mitigations.
2620 Enable the SRSO mitigation needed on AMD Zen1-4 machines.
2623 bool "Mitigate Straight-Line-Speculation"
2628 Compile the kernel with straight-line-speculation options to guard
2651 See also <file:Documentation/admin-guide/hw-vuln/reg-file-data-sampling.rst>
2654 bool "Mitigate Spectre-BHB (Branch History Injection)"
2661 See <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2671 See also <file:Documentation/admin-guide/hw-vuln/mds.rst>
2682 See also <file:Documentation/admin-guide/hw-vuln/tsx_async_abort.rst>
2690 Stale Data Vulnerabilities are a class of memory-mapped I/O (MMIO)
2694 <file:Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst>
2704 See <file:Documentation/admin-guide/hw-vuln/l1tf.rst
2727 See also <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2739 See also <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2753 <file:Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst>
2792 battery status information, and user-space programs will receive
2802 and more information, read <file:Documentation/power/apm-acpi.rst>
2803 and the Battery Powered Linux mini-HOWTO, available from
2808 VESA-compliant "green" monitors.
2860 feature is turned off -- see "Do CPU IDLE calls", below). This
2889 do with your VESA-compliant power-saving monitor. Further, this
2890 option doesn't work for all laptops -- it might not turn off your
2900 needs to. Unfortunately, some BIOSes do not -- especially those in
2924 PCI-based systems don't have any BIOS at all. Linux can also try to
2945 bool "OLPC XO-1"
2957 # x86-64 doesn't support PCI BIOS access from long mode so always go direct.
2999 architectures -- if your target machine is modern, it probably does
3004 # x86_64 have no ISA slots, but can have ISA-style DMA.
3006 bool "ISA-style DMA support" if (X86_64 && EXPERT)
3009 Enables ISA-style DMA support for devices requiring such controllers.
3028 PCI-IDs of several on-chip devices, so its a good dependency
3034 tristate "NatSemi SCx200 27MHz High-Resolution Timer Support"
3038 This driver provides a clocksource built upon the on-chip
3039 27MHz high-resolution timer. Its also a workaround for
3040 NSC Geode SC-1100's buggy TSC, which loses time when the
3057 bool "OLPC XO-1 Power Management"
3060 Add support for poweroff and suspend of the OLPC XO-1 laptop.
3063 bool "OLPC XO-1 Real Time Clock"
3066 Add support for the XO-1 real time clock, which can be used as a
3070 bool "OLPC XO-1 SCI extras"
3075 Add support for SCI-based features of the OLPC XO-1 laptop:
3076 - EC-driven system wakeups
3077 - Power button
3078 - Ebook switch
3079 - Lid switch
3080 - AC adapter status updates
3081 - Battery status updates
3084 bool "OLPC XO-1.5 SCI extras"
3088 Add support for SCI-based features of the OLPC XO-1.5 laptop:
3089 - EC-driven system wakeups
3090 - AC adapter status updates
3091 - Battery status updates
3127 bool "Technologic Systems TS-5500 platform support"
3133 This option enables system support for the Technologic Systems TS-5500.
3156 Include code to run legacy 32-bit programs under a
3157 64-bit kernel. You should likely turn this on, unless you're
3158 100% sure that you don't have any 32-bit programs left.
3165 Make IA32 emulation disabled by default. This prevents loading 32-bit
3166 processes and access to 32-bit syscalls. If unsure, leave it to its
3170 bool "x32 ABI for 64-bit mode"
3172 # llvm-objcopy does not convert x86_64 .note.gnu.property or
3176 depends on $(success,$(OBJCOPY) --version | head -n1 | grep -qv llvm)
3178 Include code to run binaries for the x32 native 32-bit ABI
3179 for 64-bit processors. An x32 process gets access to the
3180 full 64-bit register file and wide data path while leaving