linux/arch/um/Kconfig.um
<<
>>
Prefs
   1# SPDX-License-Identifier: GPL-2.0
   2config STATIC_LINK
   3        bool "Force a static link"
   4        default n
   5        help
   6          This option gives you the ability to force a static link of UML.
   7          Normally, UML is linked as a shared binary.  This is inconvenient for
   8          use in a chroot jail.  So, if you intend to run UML inside a chroot,
   9          you probably want to say Y here.
  10          Additionally, this option enables using higher memory spaces (up to
  11          2.75G) for UML.
  12
  13source "mm/Kconfig"
  14
  15config LD_SCRIPT_STATIC
  16        bool
  17        default y
  18        depends on STATIC_LINK
  19
  20config LD_SCRIPT_DYN
  21        bool
  22        default y
  23        depends on !LD_SCRIPT_STATIC
  24        select MODULE_REL_CRCS if MODVERSIONS
  25
  26source "fs/Kconfig.binfmt"
  27
  28config HOSTFS
  29        tristate "Host filesystem"
  30        help
  31          While the User-Mode Linux port uses its own root file system for
  32          booting and normal file access, this module lets the UML user
  33          access files stored on the host.  It does not require any
  34          network connection between the Host and UML.  An example use of
  35          this might be:
  36
  37          mount none /tmp/fromhost -t hostfs -o /tmp/umlshare
  38
  39          where /tmp/fromhost is an empty directory inside UML and
  40          /tmp/umlshare is a directory on the host with files the UML user
  41          wishes to access.
  42
  43          For more information, see
  44          <http://user-mode-linux.sourceforge.net/hostfs.html>.
  45
  46          If you'd like to be able to work with files stored on the host,
  47          say Y or M here; otherwise say N.
  48
  49config MCONSOLE
  50        bool "Management console"
  51        depends on PROC_FS
  52        default y
  53        help
  54          The user mode linux management console is a low-level interface to
  55          the kernel, somewhat like the i386 SysRq interface.  Since there is
  56          a full-blown operating system running under every user mode linux
  57          instance, there is much greater flexibility possible than with the
  58          SysRq mechanism.
  59
  60          If you answer 'Y' to this option, to use this feature, you need the
  61          mconsole client (called uml_mconsole) which is present in CVS in
  62          2.4.5-9um and later (path /tools/mconsole), and is also in the
  63          distribution RPM package in 2.4.6 and later.
  64
  65          It is safe to say 'Y' here.
  66
  67config MAGIC_SYSRQ
  68        bool "Magic SysRq key"
  69        depends on MCONSOLE
  70        help
  71          If you say Y here, you will have some control over the system even
  72          if the system crashes for example during kernel debugging (e.g., you
  73          will be able to flush the buffer cache to disk, reboot the system
  74          immediately or dump some status information). A key for each of the
  75          possible requests is provided.
  76
  77          This is the feature normally accomplished by pressing a key
  78          while holding SysRq (Alt+PrintScreen).
  79
  80          On UML, this is accomplished by sending a "sysrq" command with
  81          mconsole, followed by the letter for the requested command.
  82
  83          The keys are documented in <file:Documentation/admin-guide/sysrq.rst>. Don't say Y
  84          unless you really know what this hack does.
  85
  86config KERNEL_STACK_ORDER
  87        int "Kernel stack size order"
  88        default 1 if 64BIT
  89        range 1 10 if 64BIT
  90        default 0 if !64BIT
  91        help
  92          This option determines the size of UML kernel stacks.  They will
  93          be 1 << order pages.  The default is OK unless you're running Valgrind
  94          on UML, in which case, set this to 3.
  95
  96config MMAPPER
  97        tristate "iomem emulation driver"
  98        help
  99          This driver allows a host file to be used as emulated IO memory inside
 100          UML.
 101
 102config NO_DMA
 103        def_bool y
 104
 105config PGTABLE_LEVELS
 106        int
 107        default 3 if 3_LEVEL_PGTABLES
 108        default 2
 109
 110config SECCOMP
 111        def_bool y
 112        prompt "Enable seccomp to safely compute untrusted bytecode"
 113        ---help---
 114          This kernel feature is useful for number crunching applications
 115          that may need to compute untrusted bytecode during their
 116          execution. By using pipes or other transports made available to
 117          the process as file descriptors supporting the read/write
 118          syscalls, it's possible to isolate those applications in
 119          their own address space using seccomp. Once seccomp is
 120          enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
 121          and the task is only allowed to execute a few safe syscalls
 122          defined by each seccomp mode.
 123
 124          If unsure, say Y.
 125