Lines Matching +full:uefi +full:- +full:rtc +full:- +full:info

1 # SPDX-License-Identifier: GPL-2.0
4 bool "64-bit kernel" if "$(ARCH)" = "x86"
7 Say yes to build a 64-bit kernel - formerly known as x86_64
8 Say no to build a 32-bit kernel - formerly known as i386
13 # Options that are inherently 32-bit kernel only:
26 # Options that are inherently 64-bit kernel only:
56 # ported to 32-bit as well. )
158 # Word-size accesses may read uninitialized data past the trailing \0
346 default "elf32-i386" if X86_32
347 default "elf64-x86-64" if X86_64
437 bool "Symmetric multi-processing support"
443 If you say N here, the kernel will run on uni- and multiprocessor
458 See also <file:Documentation/arch/x86/i386/IO-APIC.rst>,
459 <file:Documentation/admin-guide/lockup-watchdogs.rst> and the SMP-HOWTO available at
495 APIC accesses and support for managing guest owned APIC state for SEV-SNP
502 bool "Enable MSI and MSI-x delivery by posted interrupts"
553 bool "Support for extended (non-PC) x86 platforms"
561 for the following non-PC x86 platforms, depending on the value of
564 32-bit platforms (CONFIG_64BIT=n):
568 RDC R-321x SoC
570 64-bit platforms (CONFIG_64BIT=y):
578 generic distribution kernel, say Y here - otherwise say N.
591 Adds support for Numascale NumaChip large-SMP systems. Needed to
604 supposed to run on these EM64T-based machines. Only choose this option
631 Select to build a kernel capable of supporting 64-bit Intel MID
640 If you are building for a PC class system or non-MID tablet
690 bool "RDC R-321x SoC"
696 This option is needed for RDC R-321x system-on-chip, also known
697 as R-8610-(G).
734 - BayTrail
735 - Braswell
736 - Quark
757 # On 32-bit this adds too big of NODES_SHIFT and we run out of page flags:
758 # On 32-bit SPARSEMEM adds too big of SECTIONS_WIDTH:
777 prompt "Single-depth WCHAN output"
790 Say Y here to enable options for running Linux under various hyper-
813 bool "paravirt-ops debugging"
824 spinlock implementation with something virtualization-friendly
878 bool "Jailhouse non-root cell support"
882 This option allows to run Linux as guest in a Jailhouse non-root
892 a flexible, lightweight reference open-source hypervisor, built with
893 real-time and safety-criticality in mind. It is built for embedded
894 IOT with small footprint and real-time features. More details can be
907 bool "Intel TDX (Trust Domain Extensions) - Guest Support"
932 Use the IA-PC HPET (High Precision Event Timer) to manage
933 time in preference to the PIT and RTC, if a HPET is
938 as it is off-chip. The interface used is documented
972 The GART supports full DMA access for devices with 32-bit access
981 32-bit limited device.
1006 # The ranges are different on 32-bit and 64-bit kernels, depending on
1090 integrated interrupt controller in the CPU. If you have a single-CPU
1094 all. The local APIC supports CPU-generated self-interrupts (timer,
1099 bool "IO-APIC support on uniprocessors"
1102 An IO-APIC (I/O Advanced Programmable Interrupt Controller) is an
1103 SMP-capable replacement for PC-style interrupt controllers. Most
1106 If you have a single-CPU system with an IO-APIC, you can say Y here
1108 an IO-APIC, then the kernel will still run with no slowdown at all.
1136 entry in the chipset's IO-APIC is masked (as, e.g. the RT
1210 mode, which is an 80286-era approximation of 16-bit real mode.
1218 a 16-bit DOS program where 16-bit performance matters, vm86
1222 Note that any app that works on a 64-bit kernel is unlikely to
1223 need this option, as 64-bit kernels don't, and can't, support
1224 V8086 mode. This option is also unrelated to 16-bit protected
1225 mode and is not needed to run most 16-bit programs under Wine.
1237 bool "Enable support for 16-bit segments" if EXPERT
1241 This option is required by programs like Wine to run 16-bit
1244 plus 16K runtime memory on x86-64,
1317 CS5530A and CS5536 chipsets and the RDC R-321x SoC.
1377 tristate "/dev/cpu/*/msr - Model-specific register support"
1380 Model-Specific Registers (MSRs). It is a character device with
1382 MSR accesses are directed to a specific CPU on multi-processor
1386 tristate "/dev/cpu/*/cpuid - CPU information support"
1398 However, the address space of 32-bit x86 processors is only 4
1431 will also likely make your kernel incompatible with binary-only
1469 larger swapspace support for non-overcommit purposes. It
1519 Enable NUMA (Non-Uniform Memory Access) support.
1525 For 64-bit this is recommended if the system is Intel Core i7
1581 See Documentation/admin-guide/mm/memory-hotplug.rst for more information.
1597 tristate "Support non-standard NVDIMMs and ADR protected memory"
1604 Treat memory marked using the non-standard e820 type of 12 as used
1605 by the Intel Sandy Bridge-EP reference BIOS as protected memory.
1621 Documentation/admin-guide/kernel-parameters.rst to adjust this.
1629 BIOS-originated corruption always affects the same memory,
1663 emulation can be found in <file:arch/x86/math-emu/README>.
1675 a video (VGA) card on a PCI or AGP bus. Enabling write-combining
1689 The AMD K6-2 (stepping 8 and above) and K6-3 processors have two
1691 write-combining. All of these processors are supported by this code
1718 int "MTRR cleanup enable value (0-1)"
1726 int "MTRR cleanup spare reg num (0-7)"
1746 spontaneous reboots) or a non-working video driver.
1762 specific cases in protected and virtual-8086 modes. Emulated
1768 …def_bool ((CC_IS_GCC && $(cc-option, -fcf-protection=branch -mindirect-branch-register)) || CC_IS_…
1769 $(as-instr,endbr64)
1784 hardware support course-grain forward-edge Control Flow Integrity
1799 # Note: only available in 64-bit mode
1805 page-based protections, but without requiring modification of the
1808 For details, see Documentation/core-api/protection-keys.rst
1836 and =auto. See Documentation/admin-guide/kernel-parameters.txt for more
1846 TSX is disabled if possible - equals to tsx=off command line parameter.
1851 TSX is always enabled on TSX capable HW - equals the tsx=on command
1858 side channel attacks- equals the tsx=auto command line parameter.
1928 resultant kernel should continue to boot on existing non-EFI
1939 See Documentation/admin-guide/efi-stub.rst for more information.
1948 EFI stub. This is a practice that has no basis in the UEFI
1959 bool "EFI mixed-mode support"
1962 Enabling this feature allows a 64-bit kernel to be booted
1963 on a 32-bit firmware, provided that your CPU supports 64-bit
1966 Note that it is not possible to boot a mixed-mode enabled
1967 kernel via the EFI boot stub - a bootloader that supports
1976 Export EFI runtime memory regions to /sys/firmware/efi/runtime-map.
1980 See also Documentation/ABI/testing/sysfs-firmware-efi-runtime-map.
2052 command line boot parameter passed to the panic-ed
2053 kernel. Please take a look at Documentation/admin-guide/kdump/kdump.rst
2095 On 64-bit, the kernel physical and virtual addresses are
2102 On 32-bit, the kernel physical and virtual addresses are
2134 If bootloader loads the kernel at a non-aligned address and
2138 If bootloader loads the kernel at a non-aligned address and
2146 On 32-bit this value must be a multiple of 0x2000. On 64-bit
2189 to 64-bit linear addresses, allowing software to use of the
2205 presented with a 32-bit vDSO that is not mapped at the address
2215 dl_main: Assertion `(void *) ph->p_vaddr == _rtld_local._dl_sysinfo_dso' failed!
2218 option from 1 to 0, which turns off the 32-bit vDSO entirely.
2253 certain uses of the vsyscall area as an ASLR-bypassing
2268 bool "Built-in kernel command line"
2280 Systems with fully functional boot loaders (i.e. non-embedded)
2284 string "Built-in kernel command string"
2296 In most cases, the command line (whether built-in or provided
2301 bool "Built-in command line overrides boot loader arguments"
2305 command line, and use ONLY the built-in command line.
2314 Linux can allow user programs to install a per-process x86
2316 call. This is required to run 16-bit or segmented code such as
2321 context switches and increases the low-level kernel attack
2365 def_bool $(success,echo 'int __seg_fs fs; int __seg_gs gs;' | $(CC) -x c - -S -o /dev/null)
2369 # -fsanitize=kernel-address (KASAN) and -fsanitize=thread (KCSAN)
2384 def_bool $(cc-option,-mharden-sls=all)
2387 def_bool $(cc-option,-mfunction-return=thunk-extern)
2390 def_bool $(cc-option,-fpatchable-function-entry=16,16)
2393 def_bool $(cc-option,-fsanitize=kcfi -fsanitize-kcfi-arity)
2404 # Basically: FUNCTION_ALIGNMENT - 5*CFI
2470 kernel-to-user data leaks by avoiding speculative indirect
2471 branches. Requires a compiler with -mindirect-branch=thunk-extern
2475 bool "Enable return-thunks"
2480 Compile the kernel with the return-thunks compiler option to guard
2481 against kernel-to-user data leaks by avoiding return speculation.
2482 Requires a compiler with -mfunction-return=thunk-extern
2500 SKL Return-Stack-Buffer (RSB) underflow issue. The mitigation is off
2502 retbleed=stuff option. For non-affected systems the overhead of this
2503 option is marginal as the call depth tracking is using run-time
2518 kernel command line with 'debug-callthunks'.
2528 spec_rstack_overflow={ibpb,ibpb-vmexit} mitigations.
2544 Enable the SRSO mitigation needed on AMD Zen1-4 machines.
2547 bool "Mitigate Straight-Line-Speculation"
2552 Compile the kernel with straight-line-speculation options to guard
2575 See also <file:Documentation/admin-guide/hw-vuln/reg-file-data-sampling.rst>
2578 bool "Mitigate Spectre-BHB (Branch History Injection)"
2585 See <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2595 See also <file:Documentation/admin-guide/hw-vuln/mds.rst>
2606 See also <file:Documentation/admin-guide/hw-vuln/tsx_async_abort.rst>
2614 Stale Data Vulnerabilities are a class of memory-mapped I/O (MMIO)
2618 <file:Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst>
2628 See <file:Documentation/admin-guide/hw-vuln/l1tf.rst
2651 See also <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2663 See also <file:Documentation/admin-guide/hw-vuln/spectre.rst>
2677 <file:Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst>
2698 See <file:Documentation/admin-guide/hw-vuln/indirect-target-selection.rst>
2707 invalid info to subsequent instructions and thus can affect their
2746 battery status information, and user-space programs will receive
2756 and more information, read <file:Documentation/power/apm-acpi.rst>
2757 and the Battery Powered Linux mini-HOWTO, available from
2762 VESA-compliant "green" monitors.
2814 feature is turned off -- see "Do CPU IDLE calls", below). This
2843 do with your VESA-compliant power-saving monitor. Further, this
2844 option doesn't work for all laptops -- it might not turn off your
2854 needs to. Unfortunately, some BIOSes do not -- especially those in
2878 PCI-based systems don't have any BIOS at all. Linux can also try to
2899 bool "OLPC XO-1"
2911 # x86-64 doesn't support PCI BIOS access from long mode so always go direct.
2960 lspci -nn | grep '1166:0009'
2974 architectures -- if your target machine is modern, it probably does
2979 # x86_64 have no ISA slots, but can have ISA-style DMA.
2981 bool "ISA-style DMA support" if (X86_64 && EXPERT)
2984 Enables ISA-style DMA support for devices requiring such controllers.
3003 PCI-IDs of several on-chip devices, so its a good dependency
3009 tristate "NatSemi SCx200 27MHz High-Resolution Timer Support"
3013 This driver provides a clocksource built upon the on-chip
3014 27MHz high-resolution timer. Its also a workaround for
3015 NSC Geode SC-1100's buggy TSC, which loses time when the
3032 bool "OLPC XO-1 Power Management"
3035 Add support for poweroff and suspend of the OLPC XO-1 laptop.
3038 bool "OLPC XO-1 Real Time Clock"
3041 Add support for the XO-1 real time clock, which can be used as a
3045 bool "OLPC XO-1 SCI extras"
3050 Add support for SCI-based features of the OLPC XO-1 laptop:
3051 - EC-driven system wakeups
3052 - Power button
3053 - Ebook switch
3054 - Lid switch
3055 - AC adapter status updates
3056 - Battery status updates
3059 bool "OLPC XO-1.5 SCI extras"
3063 Add support for SCI-based features of the OLPC XO-1.5 laptop:
3064 - EC-driven system wakeups
3065 - AC adapter status updates
3066 - Battery status updates
3102 bool "Technologic Systems TS-5500 platform support"
3108 This option enables system support for the Technologic Systems TS-5500.
3131 Include code to run legacy 32-bit programs under a
3132 64-bit kernel. You should likely turn this on, unless you're
3133 100% sure that you don't have any 32-bit programs left.
3140 Make IA32 emulation disabled by default. This prevents loading 32-bit
3141 processes and access to 32-bit syscalls. If unsure, leave it to its
3145 bool "x32 ABI for 64-bit mode"
3147 # llvm-objcopy does not convert x86_64 .note.gnu.property or
3151 depends on $(success,$(OBJCOPY) --version | head -n1 | grep -qv llvm)
3153 Include code to run binaries for the x32 native 32-bit ABI
3154 for 64-bit processors. An x32 process gets access to the
3155 full 64-bit register file and wide data path while leaving