1 # SPDX-License-Identifier: GPL-2.0
3 menu "UML-specific options"
10 select HAVE_ARCH_AUDITSYSCALL
11 select HAVE_ARCH_SECCOMP_FILTER
12 select HAVE_ASM_MODVERSIONS
14 select HAVE_FUTEX_CMPXCHG if FUTEX
15 select HAVE_DEBUG_KMEMLEAK
16 select HAVE_DEBUG_BUGVERBOSE
17 select HAVE_COPY_THREAD_TLS
18 select GENERIC_IRQ_SHOW
19 select GENERIC_CPU_DEVICES
20 select GENERIC_CLOCKEVENTS
21 select HAVE_GCC_PLUGINS
22 select TTY # Needed for line.c
37 config TRACE_IRQFLAGS_SUPPORT
41 config LOCKDEP_SUPPORT
45 config STACKTRACE_SUPPORT
50 config GENERIC_CALIBRATE_DELAY
63 source "arch/$(HEADER_ARCH)/um/Kconfig"
66 bool "Force a static link"
69 This option gives you the ability to force a static link of UML.
70 Normally, UML is linked as a shared binary. This is inconvenient for
71 use in a chroot jail. So, if you intend to run UML inside a chroot,
72 you probably want to say Y here.
73 Additionally, this option enables using higher memory spaces (up to
76 config LD_SCRIPT_STATIC
79 depends on STATIC_LINK
84 depends on !LD_SCRIPT_STATIC
85 select MODULE_REL_CRCS if MODVERSIONS
88 tristate "Host filesystem"
90 While the User-Mode Linux port uses its own root file system for
91 booting and normal file access, this module lets the UML user
92 access files stored on the host. It does not require any
93 network connection between the Host and UML. An example use of
96 mount none /tmp/fromhost -t hostfs -o /tmp/umlshare
98 where /tmp/fromhost is an empty directory inside UML and
99 /tmp/umlshare is a directory on the host with files the UML user
102 For more information, see
103 <http://user-mode-linux.sourceforge.net/hostfs.html>.
105 If you'd like to be able to work with files stored on the host,
106 say Y or M here; otherwise say N.
109 bool "Management console"
113 The user mode linux management console is a low-level interface to
114 the kernel, somewhat like the i386 SysRq interface. Since there is
115 a full-blown operating system running under every user mode linux
116 instance, there is much greater flexibility possible than with the
119 If you answer 'Y' to this option, to use this feature, you need the
120 mconsole client (called uml_mconsole) which is present in CVS in
121 2.4.5-9um and later (path /tools/mconsole), and is also in the
122 distribution RPM package in 2.4.6 and later.
124 It is safe to say 'Y' here.
127 bool "Magic SysRq key"
130 If you say Y here, you will have some control over the system even
131 if the system crashes for example during kernel debugging (e.g., you
132 will be able to flush the buffer cache to disk, reboot the system
133 immediately or dump some status information). A key for each of the
134 possible requests is provided.
136 This is the feature normally accomplished by pressing a key
137 while holding SysRq (Alt+PrintScreen).
139 On UML, this is accomplished by sending a "sysrq" command with
140 mconsole, followed by the letter for the requested command.
142 The keys are documented in <file:Documentation/admin-guide/sysrq.rst>. Don't say Y
143 unless you really know what this hack does.
145 config KERNEL_STACK_ORDER
146 int "Kernel stack size order"
151 This option determines the size of UML kernel stacks. They will
152 be 1 << order pages. The default is OK unless you're running Valgrind
153 on UML, in which case, set this to 3.
154 It is possible to reduce the stack to 1 for 64BIT and 0 for 32BIT on
155 older (pre-2017) CPUs. It is not recommended on newer CPUs due to the
156 increase in the size of the state which needs to be saved when handling
160 tristate "iomem emulation driver"
162 This driver allows a host file to be used as emulated IO memory inside
168 config PGTABLE_LEVELS
170 default 3 if 3_LEVEL_PGTABLES
175 prompt "Enable seccomp to safely compute untrusted bytecode"
177 This kernel feature is useful for number crunching applications
178 that may need to compute untrusted bytecode during their
179 execution. By using pipes or other transports made available to
180 the process as file descriptors supporting the read/write
181 syscalls, it's possible to isolate those applications in
182 their own address space using seccomp. Once seccomp is
183 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
184 and the task is only allowed to execute a few safe syscalls
185 defined by each seccomp mode.
189 config UML_TIME_TRAVEL_SUPPORT
191 prompt "Support time-travel mode (e.g. for test execution)"
192 # inf-cpu mode is incompatible with the benchmarking
193 depends on !RAID6_PQ_BENCHMARK
195 Enable this option to support time travel inside the UML instance.
197 After enabling this option, two modes are accessible at runtime
198 (selected by the kernel command line), see the kernel's command-
199 line help for more details.
201 It is safe to say Y, but you probably don't need this.
205 source "arch/um/drivers/Kconfig"