1b2441318SGreg Kroah-Hartman# SPDX-License-Identifier: GPL-2.0 274b469f2SSam Ravnborg# Unified Makefile for i386 and x86_64 374b469f2SSam Ravnborg 42266cfd5SSam Ravnborg# select defconfig based on actual architecture 5d746d647SSam Ravnborgifeq ($(ARCH),x86) 6ffee0de4SDavid Woodhouse ifeq ($(shell uname -m),x86_64) 7ffee0de4SDavid Woodhouse KBUILD_DEFCONFIG := x86_64_defconfig 8ffee0de4SDavid Woodhouse else 9d746d647SSam Ravnborg KBUILD_DEFCONFIG := i386_defconfig 10ffee0de4SDavid Woodhouse endif 11d746d647SSam Ravnborgelse 122266cfd5SSam Ravnborg KBUILD_DEFCONFIG := $(ARCH)_defconfig 13d746d647SSam Ravnborgendif 142266cfd5SSam Ravnborg 15b2f825bfSPeter Zijlstraifdef CONFIG_CC_IS_GCC 16b2f825bfSPeter ZijlstraRETPOLINE_CFLAGS := $(call cc-option,-mindirect-branch=thunk-extern -mindirect-branch-register) 1768cf4f2aSPeter ZijlstraRETPOLINE_CFLAGS += $(call cc-option,-mindirect-branch-cs-prefix) 18b2f825bfSPeter ZijlstraRETPOLINE_VDSO_CFLAGS := $(call cc-option,-mindirect-branch=thunk-inline -mindirect-branch-register) 19b2f825bfSPeter Zijlstraendif 20b2f825bfSPeter Zijlstraifdef CONFIG_CC_IS_CLANG 21b2f825bfSPeter ZijlstraRETPOLINE_CFLAGS := -mretpoline-external-thunk 22b2f825bfSPeter ZijlstraRETPOLINE_VDSO_CFLAGS := -mretpoline 23b2f825bfSPeter Zijlstraendif 24b2f825bfSPeter Zijlstraexport RETPOLINE_CFLAGS 25b2f825bfSPeter Zijlstraexport RETPOLINE_VDSO_CFLAGS 26b2f825bfSPeter Zijlstra 27d77698dfSMatthias Kaehlcke# For gcc stack alignment is specified with -mpreferred-stack-boundary, 28d77698dfSMatthias Kaehlcke# clang has the option -mstack-alignment for that purpose. 29d77698dfSMatthias Kaehlckeifneq ($(call cc-option, -mpreferred-stack-boundary=4),) 308f918697SMatthias Kaehlcke cc_stack_align4 := -mpreferred-stack-boundary=2 318f918697SMatthias Kaehlcke cc_stack_align8 := -mpreferred-stack-boundary=3 328f918697SMatthias Kaehlckeelse ifneq ($(call cc-option, -mstack-alignment=16),) 338f918697SMatthias Kaehlcke cc_stack_align4 := -mstack-alignment=4 348f918697SMatthias Kaehlcke cc_stack_align8 := -mstack-alignment=8 35d77698dfSMatthias Kaehlckeendif 36d77698dfSMatthias Kaehlcke 371c678da3SDavid Woodhouse# How to compile the 16-bit code. Note we always compile for -march=i386; 381c678da3SDavid Woodhouse# that way we can complain to the user if the CPU is insufficient. 39156ff4a5SPeter ZijlstraREALMODE_CFLAGS := -m16 -g -Os -DDISABLE_BRANCH_PROFILING -D__DISABLE_EXPORTS \ 401c678da3SDavid Woodhouse -Wall -Wstrict-prototypes -march=i386 -mregparm=3 \ 411c678da3SDavid Woodhouse -fno-strict-aliasing -fomit-frame-pointer -fno-pic \ 429fcb51c1SArnd Bergmann -mno-mmx -mno-sse $(call cc-option,-fcf-protection=none) 43032a2c4fSMatthias Kaehlcke 44685969e0SMasahiro YamadaREALMODE_CFLAGS += -ffreestanding 45893ab004SMasahiro YamadaREALMODE_CFLAGS += -fno-stack-protector 46989ceac7SNick DesaulniersREALMODE_CFLAGS += -Wno-address-of-packed-member 47989ceac7SNick DesaulniersREALMODE_CFLAGS += $(cc_stack_align4) 488abe7fc2SJohn MillikinREALMODE_CFLAGS += $(CLANG_FLAGS) 491c678da3SDavid Woodhouseexport REALMODE_CFLAGS 501c678da3SDavid Woodhouse 510a6ef376SSam Ravnborg# BITS is used as extension for files which are available in a 32 bit 520a6ef376SSam Ravnborg# and a 64 bit version to simplify shared Makefiles. 530a6ef376SSam Ravnborg# e.g.: obj-y += foo_$(BITS).o 540a6ef376SSam Ravnborgexport BITS 5574b469f2SSam Ravnborg 56b2c51106SAndy Lutomirski# 57b2c51106SAndy Lutomirski# Prevent GCC from generating any FP code by mistake. 58b2c51106SAndy Lutomirski# 59b2c51106SAndy Lutomirski# This must happen before we try the -mpreferred-stack-boundary, see: 60b2c51106SAndy Lutomirski# 61b2c51106SAndy Lutomirski# https://gcc.gnu.org/bugzilla/show_bug.cgi?id=53383 62b2c51106SAndy Lutomirski# 63989ceac7SNick DesaulniersKBUILD_CFLAGS += -mno-sse -mno-mmx -mno-sse2 -mno-3dnow -mno-avx 64b2c51106SAndy Lutomirski 65156ff4a5SPeter Zijlstraifeq ($(CONFIG_X86_KERNEL_IBT),y) 66156ff4a5SPeter Zijlstra# 67156ff4a5SPeter Zijlstra# Kernel IBT has S_CET.NOTRACK_EN=0, as such the compilers must not generate 68156ff4a5SPeter Zijlstra# NOTRACK prefixes. Current generation compilers unconditionally employ NOTRACK 69156ff4a5SPeter Zijlstra# for jump-tables, as such, disable jump-tables for now. 70156ff4a5SPeter Zijlstra# 71156ff4a5SPeter Zijlstra# (jump-tables are implicitly disabled by RETPOLINE) 72156ff4a5SPeter Zijlstra# 73156ff4a5SPeter Zijlstra# https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104816 74156ff4a5SPeter Zijlstra# 75156ff4a5SPeter ZijlstraKBUILD_CFLAGS += $(call cc-option,-fcf-protection=branch -fno-jump-tables) 76156ff4a5SPeter Zijlstraelse 77256b92afSBorislav PetkovKBUILD_CFLAGS += $(call cc-option,-fcf-protection=none) 78156ff4a5SPeter Zijlstraendif 79256b92afSBorislav Petkov 80d746d647SSam Ravnborgifeq ($(CONFIG_X86_32),y) 810a6ef376SSam Ravnborg BITS := 32 828c6531f7SAndreas Herrmann UTS_MACHINE := i386 834ba7e5cdSSam Ravnborg CHECKFLAGS += -D__i386__ 840a6ef376SSam Ravnborg 85989ceac7SNick Desaulniers KBUILD_AFLAGS += -m32 86989ceac7SNick Desaulniers KBUILD_CFLAGS += -m32 870a6ef376SSam Ravnborg 880a6ef376SSam Ravnborg KBUILD_CFLAGS += -msoft-float -mregparm=3 -freg-struct-return 890a6ef376SSam Ravnborg 90484d90eeSAndrew Boie # Never want PIC in a 32-bit kernel, prevent breakage with GCC built 91484d90eeSAndrew Boie # with nonstandard options 92484d90eeSAndrew Boie KBUILD_CFLAGS += -fno-pic 93484d90eeSAndrew Boie 94d77698dfSMatthias Kaehlcke # Align the stack to the register width instead of using the default 95d77698dfSMatthias Kaehlcke # alignment of 16 bytes. This reduces stack usage and the number of 96d77698dfSMatthias Kaehlcke # alignment instructions. 97989ceac7SNick Desaulniers KBUILD_CFLAGS += $(cc_stack_align4) 980a6ef376SSam Ravnborg 990a6ef376SSam Ravnborg # CPU-specific tuning. Anything which can be shared with UML should go here. 100d8285639SMasahiro Yamada include $(srctree)/arch/x86/Makefile_32.cpu 1010a6ef376SSam Ravnborg KBUILD_CFLAGS += $(cflags-y) 1020a6ef376SSam Ravnborg 1030a6ef376SSam Ravnborg # temporary until string.h is fixed 1040a6ef376SSam Ravnborg KBUILD_CFLAGS += -ffreestanding 1053fb0fdb3SAndy Lutomirski 1063fb0fdb3SAndy Lutomirski ifeq ($(CONFIG_STACKPROTECTOR),y) 1073fb0fdb3SAndy Lutomirski ifeq ($(CONFIG_SMP),y) 1083fb0fdb3SAndy Lutomirski KBUILD_CFLAGS += -mstack-protector-guard-reg=fs -mstack-protector-guard-symbol=__stack_chk_guard 1093fb0fdb3SAndy Lutomirski else 1103fb0fdb3SAndy Lutomirski KBUILD_CFLAGS += -mstack-protector-guard=global 1113fb0fdb3SAndy Lutomirski endif 1123fb0fdb3SAndy Lutomirski endif 1130a6ef376SSam Ravnborgelse 1140a6ef376SSam Ravnborg BITS := 64 1150a6ef376SSam Ravnborg UTS_MACHINE := x86_64 1161f2f01b1SLuc Van Oostenryck CHECKFLAGS += -D__x86_64__ 1170a6ef376SSam Ravnborg 1180a6ef376SSam Ravnborg KBUILD_AFLAGS += -m64 1190a6ef376SSam Ravnborg KBUILD_CFLAGS += -m64 1200a6ef376SSam Ravnborg 121be6cb027SIngo Molnar # Align jump targets to 1 byte, not the default 16 bytes: 1222c4fd1acSMatthias Kaehlcke KBUILD_CFLAGS += $(call cc-option,-falign-jumps=1) 123be6cb027SIngo Molnar 12452648e83SIngo Molnar # Pack loops tightly as well: 1252c4fd1acSMatthias Kaehlcke KBUILD_CFLAGS += $(call cc-option,-falign-loops=1) 12652648e83SIngo Molnar 1275c630089SRasmus Villemoes # Don't autogenerate traditional x87 instructions 128989ceac7SNick Desaulniers KBUILD_CFLAGS += -mno-80387 1298f2dd677SBehan Webster KBUILD_CFLAGS += $(call cc-option,-mno-fp-ret-in-387) 1305551a34eSH. Peter Anvin 131d77698dfSMatthias Kaehlcke # By default gcc and clang use a stack alignment of 16 bytes for x86. 132d77698dfSMatthias Kaehlcke # However the standard kernel entry on x86-64 leaves the stack on an 133d77698dfSMatthias Kaehlcke # 8-byte boundary. If the compiler isn't informed about the actual 134d77698dfSMatthias Kaehlcke # alignment it will generate extra alignment instructions for the 135d77698dfSMatthias Kaehlcke # default alignment which keep the stack *mis*aligned. 136d77698dfSMatthias Kaehlcke # Furthermore an alignment to the register width reduces stack usage 137d77698dfSMatthias Kaehlcke # and the number of alignment instructions. 138989ceac7SNick Desaulniers KBUILD_CFLAGS += $(cc_stack_align8) 139d9b0cde9SH.J. Lu 140d9ee948dSH.J. Lu # Use -mskip-rax-setup if supported. 141d9ee948dSH.J. Lu KBUILD_CFLAGS += $(call cc-option,-mskip-rax-setup) 142d9ee948dSH.J. Lu 1430a6ef376SSam Ravnborg # FIXME - should be integrated in Makefile.cpu (Makefile_32.cpu) 144989ceac7SNick Desaulniers cflags-$(CONFIG_MK8) += -march=k8 145989ceac7SNick Desaulniers cflags-$(CONFIG_MPSC) += -march=nocona 146989ceac7SNick Desaulniers cflags-$(CONFIG_MCORE2) += -march=core2 147989ceac7SNick Desaulniers cflags-$(CONFIG_MATOM) += -march=atom 148989ceac7SNick Desaulniers cflags-$(CONFIG_GENERIC_CPU) += -mtune=generic 1490a6ef376SSam Ravnborg KBUILD_CFLAGS += $(cflags-y) 1500a6ef376SSam Ravnborg 1510a6ef376SSam Ravnborg KBUILD_CFLAGS += -mno-red-zone 1520a6ef376SSam Ravnborg KBUILD_CFLAGS += -mcmodel=kernel 1535d707e9cSTejun Heoendif 1540a6ef376SSam Ravnborg 1553f135e57SJosh Poimboeuf# 1563f135e57SJosh Poimboeuf# If the function graph tracer is used with mcount instead of fentry, 1573f135e57SJosh Poimboeuf# '-maccumulate-outgoing-args' is needed to prevent a GCC bug 1583f135e57SJosh Poimboeuf# (https://gcc.gnu.org/bugzilla/show_bug.cgi?id=42109) 1593f135e57SJosh Poimboeuf# 1603f135e57SJosh Poimboeufifdef CONFIG_FUNCTION_GRAPH_TRACER 1613f135e57SJosh Poimboeuf ifndef CONFIG_HAVE_FENTRY 1623f135e57SJosh Poimboeuf ACCUMULATE_OUTGOING_ARGS := 1 1633f135e57SJosh Poimboeuf endif 1643f135e57SJosh Poimboeufendif 1653f135e57SJosh Poimboeuf 1663f135e57SJosh Poimboeufifeq ($(ACCUMULATE_OUTGOING_ARGS), 1) 1674a1bec46SNick Desaulniers # This compiler flag is not supported by Clang: 1684a1bec46SNick Desaulniers KBUILD_CFLAGS += $(call cc-option,-maccumulate-outgoing-args,) 1693f135e57SJosh Poimboeufendif 1703f135e57SJosh Poimboeuf 17125dfeeb7SSam Ravnborg# Workaround for a gcc prelease that unfortunately was shipped in a suse release 17225dfeeb7SSam RavnborgKBUILD_CFLAGS += -Wno-sign-compare 17325dfeeb7SSam Ravnborg# 17425dfeeb7SSam RavnborgKBUILD_CFLAGS += -fno-asynchronous-unwind-tables 1750a6ef376SSam Ravnborg 17676b04384SDavid Woodhouse# Avoid indirect branches in kernel to deal with Spectre 17776b04384SDavid Woodhouseifdef CONFIG_RETPOLINE 1784cd24de3SZhenzhong Duan KBUILD_CFLAGS += $(RETPOLINE_CFLAGS) 179ce02ef06SDaniel Borkmann # Additionally, avoid generating expensive indirect jumps which 180ce02ef06SDaniel Borkmann # are subject to retpolines for small number of switch cases. 181ce02ef06SDaniel Borkmann # clang turns off jump table generation by default when under 182a9d57ef1SDaniel Borkmann # retpoline builds, however, gcc does not for x86. This has 183a9d57ef1SDaniel Borkmann # only been fixed starting from gcc stable version 8.4.0 and 184a9d57ef1SDaniel Borkmann # onwards, but not for older ones. See gcc bug #86952. 185a9d57ef1SDaniel Borkmann ifndef CONFIG_CC_IS_CLANG 186989ceac7SNick Desaulniers KBUILD_CFLAGS += -fno-jump-tables 187a9d57ef1SDaniel Borkmann endif 18876b04384SDavid Woodhouseendif 18976b04384SDavid Woodhouse 190e463a09aSPeter Zijlstraifdef CONFIG_SLS 191e463a09aSPeter Zijlstra KBUILD_CFLAGS += -mharden-sls=all 192e463a09aSPeter Zijlstraendif 193e463a09aSPeter Zijlstra 1940024430eSNathan ChancellorKBUILD_LDFLAGS += -m elf_$(UTS_MACHINE) 1950024430eSNathan Chancellor 1960024430eSNathan Chancellorifdef CONFIG_LTO_CLANG 1972398ce80STor Vicifeq ($(shell test $(CONFIG_LLD_VERSION) -lt 130000; echo $$?),0) 1982398ce80STor VicKBUILD_LDFLAGS += -plugin-opt=-stack-alignment=$(if $(CONFIG_X86_32),4,8) 1992398ce80STor Vicendif 2000024430eSNathan Chancellorendif 201587af649SArvind Sankar 202587af649SArvind Sankarifdef CONFIG_X86_NEED_RELOCS 203587af649SArvind SankarLDFLAGS_vmlinux := --emit-relocs --discard-none 204587af649SArvind Sankarelse 205587af649SArvind SankarLDFLAGS_vmlinux := 206587af649SArvind Sankarendif 207587af649SArvind Sankar 208587af649SArvind Sankar# 209587af649SArvind Sankar# The 64-bit kernel must be aligned to 2MB. Pass -z max-page-size=0x200000 to 210587af649SArvind Sankar# the linker to force 2MB page size regardless of the default page size used 211587af649SArvind Sankar# by the linker. 212587af649SArvind Sankar# 213587af649SArvind Sankarifdef CONFIG_X86_64 214587af649SArvind SankarLDFLAGS_vmlinux += -z max-page-size=0x200000 215587af649SArvind Sankarendif 216587af649SArvind Sankar 21783109d5dSKees Cook 2183ce9e53eSMichal Marekarchscripts: scripts_basic 2196520fe55SH. Peter Anvin $(Q)$(MAKE) $(build)=arch/x86/tools relocs 2206520fe55SH. Peter Anvin 2210a6ef376SSam Ravnborg### 222303395acSH. Peter Anvin# Syscall table generation 223303395acSH. Peter Anvin 224303395acSH. Peter Anvinarchheaders: 2251f57d5d8SIngo Molnar $(Q)$(MAKE) $(build)=arch/x86/entry/syscalls all 226303395acSH. Peter Anvin 227303395acSH. Peter Anvin### 2280a6ef376SSam Ravnborg# Kernel objects 2290a6ef376SSam Ravnborg 2300a6ef376SSam Ravnborghead-y := arch/x86/kernel/head_$(BITS).o 231700efc1bSEric W. Biedermanhead-y += arch/x86/kernel/head$(BITS).o 232f2d85299SLuis R. Rodriguezhead-y += arch/x86/kernel/ebda.o 2338d152e7aSLuis R. Rodriguezhead-y += arch/x86/kernel/platform-quirks.o 2340a6ef376SSam Ravnborg 2350a6ef376SSam Ravnborglibs-y += arch/x86/lib/ 2360a6ef376SSam Ravnborg 2370a6ef376SSam Ravnborg# drivers-y are linked after core-y 2380a6ef376SSam Ravnborgdrivers-$(CONFIG_MATH_EMULATION) += arch/x86/math-emu/ 2390a6ef376SSam Ravnborgdrivers-$(CONFIG_PCI) += arch/x86/pci/ 2400a6ef376SSam Ravnborg 241cf7700feSRafael J. Wysocki# suspend and hibernation support 2420a6ef376SSam Ravnborgdrivers-$(CONFIG_PM) += arch/x86/power/ 243cf7700feSRafael J. Wysocki 2440a6ef376SSam Ravnborgdrivers-$(CONFIG_FB) += arch/x86/video/ 2450a6ef376SSam Ravnborg 2460a6ef376SSam Ravnborg#### 2470a6ef376SSam Ravnborg# boot loader support. Several targets are kept for legacy purposes 2480a6ef376SSam Ravnborg 2490a6ef376SSam Ravnborgboot := arch/x86/boot 2500a6ef376SSam Ravnborg 251f279b49fSH. Peter Anvin (Intel)BOOT_TARGETS = bzdisk fdimage fdimage144 fdimage288 hdimage isoimage 252f9c5107cSH. Peter Anvin 253f9c5107cSH. Peter AnvinPHONY += bzImage $(BOOT_TARGETS) 2540a6ef376SSam Ravnborg 2550a6ef376SSam Ravnborg# Default kernel to build 2560a6ef376SSam Ravnborgall: bzImage 2570a6ef376SSam Ravnborg 2580a6ef376SSam Ravnborg# KBUILD_IMAGE specify target image being built 2590a6ef376SSam RavnborgKBUILD_IMAGE := $(boot)/bzImage 2600a6ef376SSam Ravnborg 261f9c5107cSH. Peter AnvinbzImage: vmlinux 262ca0e9badSMasami Hiramatsuifeq ($(CONFIG_X86_DECODER_SELFTEST),y) 263ca0e9badSMasami Hiramatsu $(Q)$(MAKE) $(build)=arch/x86/tools posttest 264ca0e9badSMasami Hiramatsuendif 2650a6ef376SSam Ravnborg $(Q)$(MAKE) $(build)=$(boot) $(KBUILD_IMAGE) 2660a6ef376SSam Ravnborg $(Q)mkdir -p $(objtree)/arch/$(UTS_MACHINE)/boot 26741b3eae6SJan Beulich $(Q)ln -fsn ../../x86/boot/bzImage $(objtree)/arch/$(UTS_MACHINE)/boot/$@ 2680a6ef376SSam Ravnborg 269f9c5107cSH. Peter Anvin$(BOOT_TARGETS): vmlinux 270f9c5107cSH. Peter Anvin $(Q)$(MAKE) $(build)=$(boot) $@ 2710a6ef376SSam Ravnborg 2726d61b8e6SMasahiro YamadaPHONY += install 2736d61b8e6SMasahiro Yamadainstall: 27408155126SMasahiro Yamada $(CONFIG_SHELL) $(srctree)/$(boot)/install.sh $(KERNELRELEASE) \ 27508155126SMasahiro Yamada $(KBUILD_IMAGE) System.map "$(INSTALL_PATH)" 2761648e4f8SH. Peter Anvin 2770a6ef376SSam RavnborgPHONY += vdso_install 2780a6ef376SSam Ravnborgvdso_install: 279d603c8e1SIngo Molnar $(Q)$(MAKE) $(build)=arch/x86/entry/vdso $@ 2800a6ef376SSam Ravnborg 281829fe4aaSBen Hutchingsarchprepare: checkbin 282829fe4aaSBen Hutchingscheckbin: 283e9666d10SMasahiro Yamadaifndef CONFIG_CC_HAS_ASM_GOTO 284829fe4aaSBen Hutchings @echo Compiler lacks asm-goto support. 285829fe4aaSBen Hutchings @exit 1 286829fe4aaSBen Hutchingsendif 28725896d07SMasahiro Yamadaifdef CONFIG_RETPOLINE 28825896d07SMasahiro Yamadaifeq ($(RETPOLINE_CFLAGS),) 28925896d07SMasahiro Yamada @echo "You are building kernel with non-retpoline compiler." >&2 29025896d07SMasahiro Yamada @echo "Please update your compiler." >&2 29125896d07SMasahiro Yamada @false 29225896d07SMasahiro Yamadaendif 29325896d07SMasahiro Yamadaendif 294829fe4aaSBen Hutchings 2950a6ef376SSam Ravnborgarchclean: 2960a6ef376SSam Ravnborg $(Q)rm -rf $(objtree)/arch/i386 2970a6ef376SSam Ravnborg $(Q)rm -rf $(objtree)/arch/x86_64 2980a6ef376SSam Ravnborg 2990a6ef376SSam Ravnborgdefine archhelp 3000a6ef376SSam Ravnborg echo '* bzImage - Compressed kernel image (arch/x86/boot/bzImage)' 301ac5d0887SBorislav Petkov echo ' install - Install kernel using (your) ~/bin/$(INSTALLKERNEL) or' 302ac5d0887SBorislav Petkov echo ' (distribution) /sbin/$(INSTALLKERNEL) or install to ' 303ac5d0887SBorislav Petkov echo ' $$(INSTALL_PATH) and run lilo' 304ac5d0887SBorislav Petkov echo '' 30537f30e21SAndi Kleen echo ' fdimage - Create 1.4MB boot floppy image (arch/x86/boot/fdimage)' 30637f30e21SAndi Kleen echo ' fdimage144 - Create 1.4MB boot floppy image (arch/x86/boot/fdimage)' 30737f30e21SAndi Kleen echo ' fdimage288 - Create 2.8MB boot floppy image (arch/x86/boot/fdimage)' 308f279b49fSH. Peter Anvin (Intel) echo ' hdimage - Create a BIOS/EFI hard disk image (arch/x86/boot/hdimage)' 30937f30e21SAndi Kleen echo ' isoimage - Create a boot CD-ROM image (arch/x86/boot/image.iso)' 310f279b49fSH. Peter Anvin (Intel) echo ' bzdisk/fdimage*/hdimage/isoimage also accept:' 31137f30e21SAndi Kleen echo ' FDARGS="..." arguments for the booted kernel' 31237f30e21SAndi Kleen echo ' FDINITRD=file initrd for the booted kernel' 313ac5d0887SBorislav Petkov echo '' 314fbaf0aa8SBorislav Petkov echo ' kvm_guest.config - Enable Kconfig items for running this kernel as a KVM guest' 315fbaf0aa8SBorislav Petkov echo ' xen.config - Enable Kconfig items for running this kernel as a Xen guest' 316*9b5a7f4aSDave Hansen echo ' x86_debug.config - Enable tip tree debugging options for testing' 317fbaf0aa8SBorislav Petkov 3180a6ef376SSam Ravnborgendef 319