Kconfig.um 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. # SPDX-License-Identifier: GPL-2.0
  2. config STATIC_LINK
  3. bool "Force a static link"
  4. default n
  5. help
  6. This option gives you the ability to force a static link of UML.
  7. Normally, UML is linked as a shared binary. This is inconvenient for
  8. use in a chroot jail. So, if you intend to run UML inside a chroot,
  9. you probably want to say Y here.
  10. Additionally, this option enables using higher memory spaces (up to
  11. 2.75G) for UML.
  12. source "mm/Kconfig"
  13. config LD_SCRIPT_STATIC
  14. bool
  15. default y
  16. depends on STATIC_LINK
  17. config LD_SCRIPT_DYN
  18. bool
  19. default y
  20. depends on !LD_SCRIPT_STATIC
  21. select MODULE_REL_CRCS if MODVERSIONS
  22. source "fs/Kconfig.binfmt"
  23. config HOSTFS
  24. tristate "Host filesystem"
  25. help
  26. While the User-Mode Linux port uses its own root file system for
  27. booting and normal file access, this module lets the UML user
  28. access files stored on the host. It does not require any
  29. network connection between the Host and UML. An example use of
  30. this might be:
  31. mount none /tmp/fromhost -t hostfs -o /tmp/umlshare
  32. where /tmp/fromhost is an empty directory inside UML and
  33. /tmp/umlshare is a directory on the host with files the UML user
  34. wishes to access.
  35. For more information, see
  36. <http://user-mode-linux.sourceforge.net/hostfs.html>.
  37. If you'd like to be able to work with files stored on the host,
  38. say Y or M here; otherwise say N.
  39. config MCONSOLE
  40. bool "Management console"
  41. depends on PROC_FS
  42. default y
  43. help
  44. The user mode linux management console is a low-level interface to
  45. the kernel, somewhat like the i386 SysRq interface. Since there is
  46. a full-blown operating system running under every user mode linux
  47. instance, there is much greater flexibility possible than with the
  48. SysRq mechanism.
  49. If you answer 'Y' to this option, to use this feature, you need the
  50. mconsole client (called uml_mconsole) which is present in CVS in
  51. 2.4.5-9um and later (path /tools/mconsole), and is also in the
  52. distribution RPM package in 2.4.6 and later.
  53. It is safe to say 'Y' here.
  54. config MAGIC_SYSRQ
  55. bool "Magic SysRq key"
  56. depends on MCONSOLE
  57. help
  58. If you say Y here, you will have some control over the system even
  59. if the system crashes for example during kernel debugging (e.g., you
  60. will be able to flush the buffer cache to disk, reboot the system
  61. immediately or dump some status information). A key for each of the
  62. possible requests is provided.
  63. This is the feature normally accomplished by pressing a key
  64. while holding SysRq (Alt+PrintScreen).
  65. On UML, this is accomplished by sending a "sysrq" command with
  66. mconsole, followed by the letter for the requested command.
  67. The keys are documented in <file:Documentation/admin-guide/sysrq.rst>. Don't say Y
  68. unless you really know what this hack does.
  69. config KERNEL_STACK_ORDER
  70. int "Kernel stack size order"
  71. default 1 if 64BIT
  72. range 1 10 if 64BIT
  73. default 0 if !64BIT
  74. help
  75. This option determines the size of UML kernel stacks. They will
  76. be 1 << order pages. The default is OK unless you're running Valgrind
  77. on UML, in which case, set this to 3.
  78. config MMAPPER
  79. tristate "iomem emulation driver"
  80. help
  81. This driver allows a host file to be used as emulated IO memory inside
  82. UML.
  83. config NO_DMA
  84. def_bool y
  85. config PGTABLE_LEVELS
  86. int
  87. default 3 if 3_LEVEL_PGTABLES
  88. default 2
  89. config SECCOMP
  90. def_bool y
  91. prompt "Enable seccomp to safely compute untrusted bytecode"
  92. ---help---
  93. This kernel feature is useful for number crunching applications
  94. that may need to compute untrusted bytecode during their
  95. execution. By using pipes or other transports made available to
  96. the process as file descriptors supporting the read/write
  97. syscalls, it's possible to isolate those applications in
  98. their own address space using seccomp. Once seccomp is
  99. enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
  100. and the task is only allowed to execute a few safe syscalls
  101. defined by each seccomp mode.
  102. If unsure, say Y.