]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/um/Kconfig.um
Merge tag 'mmc-v4.14-2' of git://git.kernel.org/pub/scm/linux/kernel/git/ulfh/mmc
[mirror_ubuntu-bionic-kernel.git] / arch / um / Kconfig.um
CommitLineData
1da177e4
LT
1config STATIC_LINK
2 bool "Force a static link"
3 default n
1da177e4 4 help
4c9e1385
JD
5 This option gives you the ability to force a static link of UML.
6 Normally, UML is linked as a shared binary. This is inconvenient for
7 use in a chroot jail. So, if you intend to run UML inside a chroot,
8 you probably want to say Y here.
9 Additionally, this option enables using higher memory spaces (up to
10 2.75G) for UML.
1da177e4 11
3f22ab27 12source "mm/Kconfig"
1da177e4
LT
13
14config LD_SCRIPT_STATIC
15 bool
16 default y
42fda663 17 depends on STATIC_LINK
1da177e4
LT
18
19config LD_SCRIPT_DYN
20 bool
21 default y
22 depends on !LD_SCRIPT_STATIC
39940dbc 23 select MODULE_REL_CRCS if MODVERSIONS
1da177e4 24
1da177e4
LT
25source "fs/Kconfig.binfmt"
26
27config HOSTFS
28 tristate "Host filesystem"
29 help
4c9e1385
JD
30 While the User-Mode Linux port uses its own root file system for
31 booting and normal file access, this module lets the UML user
32 access files stored on the host. It does not require any
33 network connection between the Host and UML. An example use of
34 this might be:
1da177e4 35
4c9e1385 36 mount none /tmp/fromhost -t hostfs -o /tmp/umlshare
1da177e4 37
4c9e1385
JD
38 where /tmp/fromhost is an empty directory inside UML and
39 /tmp/umlshare is a directory on the host with files the UML user
40 wishes to access.
1da177e4 41
4c9e1385
JD
42 For more information, see
43 <http://user-mode-linux.sourceforge.net/hostfs.html>.
1da177e4 44
4c9e1385
JD
45 If you'd like to be able to work with files stored on the host,
46 say Y or M here; otherwise say N.
1da177e4 47
1da177e4
LT
48config MCONSOLE
49 bool "Management console"
1eb7c6c7 50 depends on PROC_FS
1da177e4
LT
51 default y
52 help
4c9e1385
JD
53 The user mode linux management console is a low-level interface to
54 the kernel, somewhat like the i386 SysRq interface. Since there is
55 a full-blown operating system running under every user mode linux
56 instance, there is much greater flexibility possible than with the
57 SysRq mechanism.
1da177e4 58
4c9e1385
JD
59 If you answer 'Y' to this option, to use this feature, you need the
60 mconsole client (called uml_mconsole) which is present in CVS in
61 2.4.5-9um and later (path /tools/mconsole), and is also in the
62 distribution RPM package in 2.4.6 and later.
1da177e4 63
4c9e1385 64 It is safe to say 'Y' here.
1da177e4
LT
65
66config MAGIC_SYSRQ
67 bool "Magic SysRq key"
68 depends on MCONSOLE
4c9e1385
JD
69 help
70 If you say Y here, you will have some control over the system even
71 if the system crashes for example during kernel debugging (e.g., you
72 will be able to flush the buffer cache to disk, reboot the system
73 immediately or dump some status information). A key for each of the
74 possible requests is provided.
1da177e4 75
4c9e1385
JD
76 This is the feature normally accomplished by pressing a key
77 while holding SysRq (Alt+PrintScreen).
1da177e4 78
4c9e1385
JD
79 On UML, this is accomplished by sending a "sysrq" command with
80 mconsole, followed by the letter for the requested command.
1da177e4 81
4c9e1385
JD
82 The keys are documented in <file:Documentation/sysrq.txt>. Don't say Y
83 unless you really know what this hack does.
1da177e4 84
1da177e4
LT
85config KERNEL_STACK_ORDER
86 int "Kernel stack size order"
02239c29 87 default 1 if 64BIT
e80ad9b6 88 range 1 10 if 64BIT
02239c29 89 default 0 if !64BIT
1da177e4 90 help
4c9e1385
JD
91 This option determines the size of UML kernel stacks. They will
92 be 1 << order pages. The default is OK unless you're running Valgrind
93 on UML, in which case, set this to 3.
d911202e 94
d805a786
AV
95config MMAPPER
96 tristate "iomem emulation driver"
97 help
98 This driver allows a host file to be used as emulated IO memory inside
99 UML.
100
d911202e
FT
101config NO_DMA
102 def_bool y
6b8ce2a1
KS
103
104config PGTABLE_LEVELS
105 int
106 default 3 if 3_LEVEL_PGTABLES
107 default 2
c50b4659
MS
108
109config SECCOMP
110 def_bool y
111 prompt "Enable seccomp to safely compute untrusted bytecode"
112 ---help---
113 This kernel feature is useful for number crunching applications
114 that may need to compute untrusted bytecode during their
115 execution. By using pipes or other transports made available to
116 the process as file descriptors supporting the read/write
117 syscalls, it's possible to isolate those applications in
118 their own address space using seccomp. Once seccomp is
119 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
120 and the task is only allowed to execute a few safe syscalls
121 defined by each seccomp mode.
122
123 If unsure, say Y.