xref: /linux/arch/x86/Makefile (revision 68cf4f2a72ef8786e6b7af6fd9a89f27ac0f520d)
1b2441318SGreg Kroah-Hartman# SPDX-License-Identifier: GPL-2.0
274b469f2SSam Ravnborg# Unified Makefile for i386 and x86_64
374b469f2SSam Ravnborg
42266cfd5SSam Ravnborg# select defconfig based on actual architecture
5d746d647SSam Ravnborgifeq ($(ARCH),x86)
6ffee0de4SDavid Woodhouse  ifeq ($(shell uname -m),x86_64)
7ffee0de4SDavid Woodhouse        KBUILD_DEFCONFIG := x86_64_defconfig
8ffee0de4SDavid Woodhouse  else
9d746d647SSam Ravnborg        KBUILD_DEFCONFIG := i386_defconfig
10ffee0de4SDavid Woodhouse  endif
11d746d647SSam Ravnborgelse
122266cfd5SSam Ravnborg        KBUILD_DEFCONFIG := $(ARCH)_defconfig
13d746d647SSam Ravnborgendif
142266cfd5SSam Ravnborg
15b2f825bfSPeter Zijlstraifdef CONFIG_CC_IS_GCC
16b2f825bfSPeter ZijlstraRETPOLINE_CFLAGS	:= $(call cc-option,-mindirect-branch=thunk-extern -mindirect-branch-register)
17*68cf4f2aSPeter ZijlstraRETPOLINE_CFLAGS	+= $(call cc-option,-mindirect-branch-cs-prefix)
18b2f825bfSPeter ZijlstraRETPOLINE_VDSO_CFLAGS	:= $(call cc-option,-mindirect-branch=thunk-inline -mindirect-branch-register)
19b2f825bfSPeter Zijlstraendif
20b2f825bfSPeter Zijlstraifdef CONFIG_CC_IS_CLANG
21b2f825bfSPeter ZijlstraRETPOLINE_CFLAGS	:= -mretpoline-external-thunk
22b2f825bfSPeter ZijlstraRETPOLINE_VDSO_CFLAGS	:= -mretpoline
23b2f825bfSPeter Zijlstraendif
24b2f825bfSPeter Zijlstraexport RETPOLINE_CFLAGS
25b2f825bfSPeter Zijlstraexport RETPOLINE_VDSO_CFLAGS
26b2f825bfSPeter Zijlstra
27d77698dfSMatthias Kaehlcke# For gcc stack alignment is specified with -mpreferred-stack-boundary,
28d77698dfSMatthias Kaehlcke# clang has the option -mstack-alignment for that purpose.
29d77698dfSMatthias Kaehlckeifneq ($(call cc-option, -mpreferred-stack-boundary=4),)
308f918697SMatthias Kaehlcke      cc_stack_align4 := -mpreferred-stack-boundary=2
318f918697SMatthias Kaehlcke      cc_stack_align8 := -mpreferred-stack-boundary=3
328f918697SMatthias Kaehlckeelse ifneq ($(call cc-option, -mstack-alignment=16),)
338f918697SMatthias Kaehlcke      cc_stack_align4 := -mstack-alignment=4
348f918697SMatthias Kaehlcke      cc_stack_align8 := -mstack-alignment=8
35d77698dfSMatthias Kaehlckeendif
36d77698dfSMatthias Kaehlcke
371c678da3SDavid Woodhouse# How to compile the 16-bit code.  Note we always compile for -march=i386;
381c678da3SDavid Woodhouse# that way we can complain to the user if the CPU is insufficient.
392838307bSNick DesaulniersREALMODE_CFLAGS	:= -m16 -g -Os -DDISABLE_BRANCH_PROFILING \
401c678da3SDavid Woodhouse		   -Wall -Wstrict-prototypes -march=i386 -mregparm=3 \
411c678da3SDavid Woodhouse		   -fno-strict-aliasing -fomit-frame-pointer -fno-pic \
429fcb51c1SArnd Bergmann		   -mno-mmx -mno-sse $(call cc-option,-fcf-protection=none)
43032a2c4fSMatthias Kaehlcke
44685969e0SMasahiro YamadaREALMODE_CFLAGS += -ffreestanding
45893ab004SMasahiro YamadaREALMODE_CFLAGS += -fno-stack-protector
46989ceac7SNick DesaulniersREALMODE_CFLAGS += -Wno-address-of-packed-member
47989ceac7SNick DesaulniersREALMODE_CFLAGS += $(cc_stack_align4)
488abe7fc2SJohn MillikinREALMODE_CFLAGS += $(CLANG_FLAGS)
491c678da3SDavid Woodhouseexport REALMODE_CFLAGS
501c678da3SDavid Woodhouse
510a6ef376SSam Ravnborg# BITS is used as extension for files which are available in a 32 bit
520a6ef376SSam Ravnborg# and a 64 bit version to simplify shared Makefiles.
530a6ef376SSam Ravnborg# e.g.: obj-y += foo_$(BITS).o
540a6ef376SSam Ravnborgexport BITS
5574b469f2SSam Ravnborg
56b2c51106SAndy Lutomirski#
57b2c51106SAndy Lutomirski# Prevent GCC from generating any FP code by mistake.
58b2c51106SAndy Lutomirski#
59b2c51106SAndy Lutomirski# This must happen before we try the -mpreferred-stack-boundary, see:
60b2c51106SAndy Lutomirski#
61b2c51106SAndy Lutomirski#    https://gcc.gnu.org/bugzilla/show_bug.cgi?id=53383
62b2c51106SAndy Lutomirski#
63989ceac7SNick DesaulniersKBUILD_CFLAGS += -mno-sse -mno-mmx -mno-sse2 -mno-3dnow -mno-avx
64b2c51106SAndy Lutomirski
65256b92afSBorislav Petkov# Intel CET isn't enabled in the kernel
66256b92afSBorislav PetkovKBUILD_CFLAGS += $(call cc-option,-fcf-protection=none)
67256b92afSBorislav Petkov
68d746d647SSam Ravnborgifeq ($(CONFIG_X86_32),y)
690a6ef376SSam Ravnborg        BITS := 32
708c6531f7SAndreas Herrmann        UTS_MACHINE := i386
714ba7e5cdSSam Ravnborg        CHECKFLAGS += -D__i386__
720a6ef376SSam Ravnborg
73989ceac7SNick Desaulniers        KBUILD_AFLAGS += -m32
74989ceac7SNick Desaulniers        KBUILD_CFLAGS += -m32
750a6ef376SSam Ravnborg
760a6ef376SSam Ravnborg        KBUILD_CFLAGS += -msoft-float -mregparm=3 -freg-struct-return
770a6ef376SSam Ravnborg
78484d90eeSAndrew Boie        # Never want PIC in a 32-bit kernel, prevent breakage with GCC built
79484d90eeSAndrew Boie        # with nonstandard options
80484d90eeSAndrew Boie        KBUILD_CFLAGS += -fno-pic
81484d90eeSAndrew Boie
82d77698dfSMatthias Kaehlcke        # Align the stack to the register width instead of using the default
83d77698dfSMatthias Kaehlcke        # alignment of 16 bytes. This reduces stack usage and the number of
84d77698dfSMatthias Kaehlcke        # alignment instructions.
85989ceac7SNick Desaulniers        KBUILD_CFLAGS += $(cc_stack_align4)
860a6ef376SSam Ravnborg
870a6ef376SSam Ravnborg        # CPU-specific tuning. Anything which can be shared with UML should go here.
88d8285639SMasahiro Yamada        include $(srctree)/arch/x86/Makefile_32.cpu
890a6ef376SSam Ravnborg        KBUILD_CFLAGS += $(cflags-y)
900a6ef376SSam Ravnborg
910a6ef376SSam Ravnborg        # temporary until string.h is fixed
920a6ef376SSam Ravnborg        KBUILD_CFLAGS += -ffreestanding
933fb0fdb3SAndy Lutomirski
943fb0fdb3SAndy Lutomirski	ifeq ($(CONFIG_STACKPROTECTOR),y)
953fb0fdb3SAndy Lutomirski		ifeq ($(CONFIG_SMP),y)
963fb0fdb3SAndy Lutomirski			KBUILD_CFLAGS += -mstack-protector-guard-reg=fs -mstack-protector-guard-symbol=__stack_chk_guard
973fb0fdb3SAndy Lutomirski		else
983fb0fdb3SAndy Lutomirski			KBUILD_CFLAGS += -mstack-protector-guard=global
993fb0fdb3SAndy Lutomirski		endif
1003fb0fdb3SAndy Lutomirski	endif
1010a6ef376SSam Ravnborgelse
1020a6ef376SSam Ravnborg        BITS := 64
1030a6ef376SSam Ravnborg        UTS_MACHINE := x86_64
1041f2f01b1SLuc Van Oostenryck        CHECKFLAGS += -D__x86_64__
1050a6ef376SSam Ravnborg
1060a6ef376SSam Ravnborg        KBUILD_AFLAGS += -m64
1070a6ef376SSam Ravnborg        KBUILD_CFLAGS += -m64
1080a6ef376SSam Ravnborg
109be6cb027SIngo Molnar        # Align jump targets to 1 byte, not the default 16 bytes:
1102c4fd1acSMatthias Kaehlcke        KBUILD_CFLAGS += $(call cc-option,-falign-jumps=1)
111be6cb027SIngo Molnar
11252648e83SIngo Molnar        # Pack loops tightly as well:
1132c4fd1acSMatthias Kaehlcke        KBUILD_CFLAGS += $(call cc-option,-falign-loops=1)
11452648e83SIngo Molnar
1155c630089SRasmus Villemoes        # Don't autogenerate traditional x87 instructions
116989ceac7SNick Desaulniers        KBUILD_CFLAGS += -mno-80387
1178f2dd677SBehan Webster        KBUILD_CFLAGS += $(call cc-option,-mno-fp-ret-in-387)
1185551a34eSH. Peter Anvin
119d77698dfSMatthias Kaehlcke        # By default gcc and clang use a stack alignment of 16 bytes for x86.
120d77698dfSMatthias Kaehlcke        # However the standard kernel entry on x86-64 leaves the stack on an
121d77698dfSMatthias Kaehlcke        # 8-byte boundary. If the compiler isn't informed about the actual
122d77698dfSMatthias Kaehlcke        # alignment it will generate extra alignment instructions for the
123d77698dfSMatthias Kaehlcke        # default alignment which keep the stack *mis*aligned.
124d77698dfSMatthias Kaehlcke        # Furthermore an alignment to the register width reduces stack usage
125d77698dfSMatthias Kaehlcke        # and the number of alignment instructions.
126989ceac7SNick Desaulniers        KBUILD_CFLAGS += $(cc_stack_align8)
127d9b0cde9SH.J. Lu
128d9ee948dSH.J. Lu	# Use -mskip-rax-setup if supported.
129d9ee948dSH.J. Lu	KBUILD_CFLAGS += $(call cc-option,-mskip-rax-setup)
130d9ee948dSH.J. Lu
1310a6ef376SSam Ravnborg        # FIXME - should be integrated in Makefile.cpu (Makefile_32.cpu)
132989ceac7SNick Desaulniers        cflags-$(CONFIG_MK8)		+= -march=k8
133989ceac7SNick Desaulniers        cflags-$(CONFIG_MPSC)		+= -march=nocona
134989ceac7SNick Desaulniers        cflags-$(CONFIG_MCORE2)		+= -march=core2
135989ceac7SNick Desaulniers        cflags-$(CONFIG_MATOM)		+= -march=atom
136989ceac7SNick Desaulniers        cflags-$(CONFIG_GENERIC_CPU)	+= -mtune=generic
1370a6ef376SSam Ravnborg        KBUILD_CFLAGS += $(cflags-y)
1380a6ef376SSam Ravnborg
1390a6ef376SSam Ravnborg        KBUILD_CFLAGS += -mno-red-zone
1400a6ef376SSam Ravnborg        KBUILD_CFLAGS += -mcmodel=kernel
1415d707e9cSTejun Heoendif
1420a6ef376SSam Ravnborg
1430bf62763SH. Peter Anvinifdef CONFIG_X86_X32
1440bf62763SH. Peter Anvin	x32_ld_ok := $(call try-run,\
1450bf62763SH. Peter Anvin			/bin/echo -e '1: .quad 1b' | \
1460bf62763SH. Peter Anvin			$(CC) $(KBUILD_AFLAGS) -c -x assembler -o "$$TMP" - && \
147e3456056SMasahiro Yamada			$(OBJCOPY) -O elf32-x86-64 "$$TMP" "$$TMP.o" && \
148e3456056SMasahiro Yamada			$(LD) -m elf32_x86_64 "$$TMP.o" -o "$$TMP",y,n)
1490bf62763SH. Peter Anvin        ifeq ($(x32_ld_ok),y)
1500bf62763SH. Peter Anvin                CONFIG_X86_X32_ABI := y
1510bf62763SH. Peter Anvin                KBUILD_AFLAGS += -DCONFIG_X86_X32_ABI
1520bf62763SH. Peter Anvin                KBUILD_CFLAGS += -DCONFIG_X86_X32_ABI
1530bf62763SH. Peter Anvin        else
1540bf62763SH. Peter Anvin                $(warning CONFIG_X86_X32 enabled but no binutils support)
1550bf62763SH. Peter Anvin        endif
1560bf62763SH. Peter Anvinendif
1570bf62763SH. Peter Anvinexport CONFIG_X86_X32_ABI
1580bf62763SH. Peter Anvin
1593f135e57SJosh Poimboeuf#
1603f135e57SJosh Poimboeuf# If the function graph tracer is used with mcount instead of fentry,
1613f135e57SJosh Poimboeuf# '-maccumulate-outgoing-args' is needed to prevent a GCC bug
1623f135e57SJosh Poimboeuf# (https://gcc.gnu.org/bugzilla/show_bug.cgi?id=42109)
1633f135e57SJosh Poimboeuf#
1643f135e57SJosh Poimboeufifdef CONFIG_FUNCTION_GRAPH_TRACER
1653f135e57SJosh Poimboeuf  ifndef CONFIG_HAVE_FENTRY
1663f135e57SJosh Poimboeuf	ACCUMULATE_OUTGOING_ARGS := 1
1673f135e57SJosh Poimboeuf  endif
1683f135e57SJosh Poimboeufendif
1693f135e57SJosh Poimboeuf
1703f135e57SJosh Poimboeufifeq ($(ACCUMULATE_OUTGOING_ARGS), 1)
1714a1bec46SNick Desaulniers	# This compiler flag is not supported by Clang:
1724a1bec46SNick Desaulniers	KBUILD_CFLAGS += $(call cc-option,-maccumulate-outgoing-args,)
1733f135e57SJosh Poimboeufendif
1743f135e57SJosh Poimboeuf
17525dfeeb7SSam Ravnborg# Workaround for a gcc prelease that unfortunately was shipped in a suse release
17625dfeeb7SSam RavnborgKBUILD_CFLAGS += -Wno-sign-compare
17725dfeeb7SSam Ravnborg#
17825dfeeb7SSam RavnborgKBUILD_CFLAGS += -fno-asynchronous-unwind-tables
1790a6ef376SSam Ravnborg
18076b04384SDavid Woodhouse# Avoid indirect branches in kernel to deal with Spectre
18176b04384SDavid Woodhouseifdef CONFIG_RETPOLINE
1824cd24de3SZhenzhong Duan  KBUILD_CFLAGS += $(RETPOLINE_CFLAGS)
183ce02ef06SDaniel Borkmann  # Additionally, avoid generating expensive indirect jumps which
184ce02ef06SDaniel Borkmann  # are subject to retpolines for small number of switch cases.
185ce02ef06SDaniel Borkmann  # clang turns off jump table generation by default when under
186a9d57ef1SDaniel Borkmann  # retpoline builds, however, gcc does not for x86. This has
187a9d57ef1SDaniel Borkmann  # only been fixed starting from gcc stable version 8.4.0 and
188a9d57ef1SDaniel Borkmann  # onwards, but not for older ones. See gcc bug #86952.
189a9d57ef1SDaniel Borkmann  ifndef CONFIG_CC_IS_CLANG
190989ceac7SNick Desaulniers    KBUILD_CFLAGS += -fno-jump-tables
191a9d57ef1SDaniel Borkmann  endif
19276b04384SDavid Woodhouseendif
19376b04384SDavid Woodhouse
1940024430eSNathan ChancellorKBUILD_LDFLAGS += -m elf_$(UTS_MACHINE)
1950024430eSNathan Chancellor
1960024430eSNathan Chancellorifdef CONFIG_LTO_CLANG
1972398ce80STor Vicifeq ($(shell test $(CONFIG_LLD_VERSION) -lt 130000; echo $$?),0)
1982398ce80STor VicKBUILD_LDFLAGS	+= -plugin-opt=-stack-alignment=$(if $(CONFIG_X86_32),4,8)
1992398ce80STor Vicendif
2000024430eSNathan Chancellorendif
201587af649SArvind Sankar
202587af649SArvind Sankarifdef CONFIG_X86_NEED_RELOCS
203587af649SArvind SankarLDFLAGS_vmlinux := --emit-relocs --discard-none
204587af649SArvind Sankarelse
205587af649SArvind SankarLDFLAGS_vmlinux :=
206587af649SArvind Sankarendif
207587af649SArvind Sankar
208587af649SArvind Sankar#
209587af649SArvind Sankar# The 64-bit kernel must be aligned to 2MB.  Pass -z max-page-size=0x200000 to
210587af649SArvind Sankar# the linker to force 2MB page size regardless of the default page size used
211587af649SArvind Sankar# by the linker.
212587af649SArvind Sankar#
213587af649SArvind Sankarifdef CONFIG_X86_64
214587af649SArvind SankarLDFLAGS_vmlinux += -z max-page-size=0x200000
215587af649SArvind Sankarendif
216587af649SArvind Sankar
21783109d5dSKees Cook
2183ce9e53eSMichal Marekarchscripts: scripts_basic
2196520fe55SH. Peter Anvin	$(Q)$(MAKE) $(build)=arch/x86/tools relocs
2206520fe55SH. Peter Anvin
2210a6ef376SSam Ravnborg###
222303395acSH. Peter Anvin# Syscall table generation
223303395acSH. Peter Anvin
224303395acSH. Peter Anvinarchheaders:
2251f57d5d8SIngo Molnar	$(Q)$(MAKE) $(build)=arch/x86/entry/syscalls all
226303395acSH. Peter Anvin
227303395acSH. Peter Anvin###
2280a6ef376SSam Ravnborg# Kernel objects
2290a6ef376SSam Ravnborg
2300a6ef376SSam Ravnborghead-y := arch/x86/kernel/head_$(BITS).o
231700efc1bSEric W. Biedermanhead-y += arch/x86/kernel/head$(BITS).o
232f2d85299SLuis R. Rodriguezhead-y += arch/x86/kernel/ebda.o
2338d152e7aSLuis R. Rodriguezhead-y += arch/x86/kernel/platform-quirks.o
2340a6ef376SSam Ravnborg
2350a6ef376SSam Ravnborglibs-y  += arch/x86/lib/
2360a6ef376SSam Ravnborg
2370a6ef376SSam Ravnborg# drivers-y are linked after core-y
2380a6ef376SSam Ravnborgdrivers-$(CONFIG_MATH_EMULATION) += arch/x86/math-emu/
2390a6ef376SSam Ravnborgdrivers-$(CONFIG_PCI)            += arch/x86/pci/
2400a6ef376SSam Ravnborg
241cf7700feSRafael J. Wysocki# suspend and hibernation support
2420a6ef376SSam Ravnborgdrivers-$(CONFIG_PM) += arch/x86/power/
243cf7700feSRafael J. Wysocki
2440a6ef376SSam Ravnborgdrivers-$(CONFIG_FB) += arch/x86/video/
2450a6ef376SSam Ravnborg
2460a6ef376SSam Ravnborg####
2470a6ef376SSam Ravnborg# boot loader support. Several targets are kept for legacy purposes
2480a6ef376SSam Ravnborg
2490a6ef376SSam Ravnborgboot := arch/x86/boot
2500a6ef376SSam Ravnborg
251f279b49fSH. Peter Anvin (Intel)BOOT_TARGETS = bzdisk fdimage fdimage144 fdimage288 hdimage isoimage
252f9c5107cSH. Peter Anvin
253f9c5107cSH. Peter AnvinPHONY += bzImage $(BOOT_TARGETS)
2540a6ef376SSam Ravnborg
2550a6ef376SSam Ravnborg# Default kernel to build
2560a6ef376SSam Ravnborgall: bzImage
2570a6ef376SSam Ravnborg
2580a6ef376SSam Ravnborg# KBUILD_IMAGE specify target image being built
2590a6ef376SSam RavnborgKBUILD_IMAGE := $(boot)/bzImage
2600a6ef376SSam Ravnborg
261f9c5107cSH. Peter AnvinbzImage: vmlinux
262ca0e9badSMasami Hiramatsuifeq ($(CONFIG_X86_DECODER_SELFTEST),y)
263ca0e9badSMasami Hiramatsu	$(Q)$(MAKE) $(build)=arch/x86/tools posttest
264ca0e9badSMasami Hiramatsuendif
2650a6ef376SSam Ravnborg	$(Q)$(MAKE) $(build)=$(boot) $(KBUILD_IMAGE)
2660a6ef376SSam Ravnborg	$(Q)mkdir -p $(objtree)/arch/$(UTS_MACHINE)/boot
26741b3eae6SJan Beulich	$(Q)ln -fsn ../../x86/boot/bzImage $(objtree)/arch/$(UTS_MACHINE)/boot/$@
2680a6ef376SSam Ravnborg
269f9c5107cSH. Peter Anvin$(BOOT_TARGETS): vmlinux
270f9c5107cSH. Peter Anvin	$(Q)$(MAKE) $(build)=$(boot) $@
2710a6ef376SSam Ravnborg
2726d61b8e6SMasahiro YamadaPHONY += install
2736d61b8e6SMasahiro Yamadainstall:
27408155126SMasahiro Yamada	$(CONFIG_SHELL) $(srctree)/$(boot)/install.sh $(KERNELRELEASE) \
27508155126SMasahiro Yamada		$(KBUILD_IMAGE) System.map "$(INSTALL_PATH)"
2761648e4f8SH. Peter Anvin
2770a6ef376SSam RavnborgPHONY += vdso_install
2780a6ef376SSam Ravnborgvdso_install:
279d603c8e1SIngo Molnar	$(Q)$(MAKE) $(build)=arch/x86/entry/vdso $@
2800a6ef376SSam Ravnborg
281829fe4aaSBen Hutchingsarchprepare: checkbin
282829fe4aaSBen Hutchingscheckbin:
283e9666d10SMasahiro Yamadaifndef CONFIG_CC_HAS_ASM_GOTO
284829fe4aaSBen Hutchings	@echo Compiler lacks asm-goto support.
285829fe4aaSBen Hutchings	@exit 1
286829fe4aaSBen Hutchingsendif
28725896d07SMasahiro Yamadaifdef CONFIG_RETPOLINE
28825896d07SMasahiro Yamadaifeq ($(RETPOLINE_CFLAGS),)
28925896d07SMasahiro Yamada	@echo "You are building kernel with non-retpoline compiler." >&2
29025896d07SMasahiro Yamada	@echo "Please update your compiler." >&2
29125896d07SMasahiro Yamada	@false
29225896d07SMasahiro Yamadaendif
29325896d07SMasahiro Yamadaendif
294829fe4aaSBen Hutchings
2950a6ef376SSam Ravnborgarchclean:
2960a6ef376SSam Ravnborg	$(Q)rm -rf $(objtree)/arch/i386
2970a6ef376SSam Ravnborg	$(Q)rm -rf $(objtree)/arch/x86_64
2980a6ef376SSam Ravnborg
2990a6ef376SSam Ravnborgdefine archhelp
3000a6ef376SSam Ravnborg  echo  '* bzImage		- Compressed kernel image (arch/x86/boot/bzImage)'
301ac5d0887SBorislav Petkov  echo  '  install		- Install kernel using (your) ~/bin/$(INSTALLKERNEL) or'
302ac5d0887SBorislav Petkov  echo  '			  (distribution) /sbin/$(INSTALLKERNEL) or install to '
303ac5d0887SBorislav Petkov  echo  '			  $$(INSTALL_PATH) and run lilo'
304ac5d0887SBorislav Petkov  echo  ''
30537f30e21SAndi Kleen  echo  '  fdimage		- Create 1.4MB boot floppy image (arch/x86/boot/fdimage)'
30637f30e21SAndi Kleen  echo  '  fdimage144		- Create 1.4MB boot floppy image (arch/x86/boot/fdimage)'
30737f30e21SAndi Kleen  echo  '  fdimage288		- Create 2.8MB boot floppy image (arch/x86/boot/fdimage)'
308f279b49fSH. Peter Anvin (Intel)  echo  '  hdimage		- Create a BIOS/EFI hard disk image (arch/x86/boot/hdimage)'
30937f30e21SAndi Kleen  echo  '  isoimage		- Create a boot CD-ROM image (arch/x86/boot/image.iso)'
310f279b49fSH. Peter Anvin (Intel)  echo  '			  bzdisk/fdimage*/hdimage/isoimage also accept:'
31137f30e21SAndi Kleen  echo  '			  FDARGS="..."  arguments for the booted kernel'
31237f30e21SAndi Kleen  echo  '			  FDINITRD=file initrd for the booted kernel'
313ac5d0887SBorislav Petkov  echo  ''
314fbaf0aa8SBorislav Petkov  echo  '  kvm_guest.config	- Enable Kconfig items for running this kernel as a KVM guest'
315fbaf0aa8SBorislav Petkov  echo  '  xen.config		- Enable Kconfig items for running this kernel as a Xen guest'
316fbaf0aa8SBorislav Petkov
3170a6ef376SSam Ravnborgendef
318