diff options
author | Linus Torvalds <torvalds@g5.osdl.org> | 2006-09-26 16:07:55 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@g5.osdl.org> | 2006-09-26 16:07:55 -0400 |
commit | b278240839e20fa9384ea430df463b367b90e04e (patch) | |
tree | f99f0c8cdd4cc7f177cd75440e6bd181cded7fb3 /arch/x86_64/Kconfig | |
parent | dd77a4ee0f3981693d4229aa1d57cea9e526ff47 (diff) | |
parent | 3f75f42d7733e73aca5c78326489efd4189e0111 (diff) |
Merge branch 'for-linus' of git://one.firstfloor.org/home/andi/git/linux-2.6
* 'for-linus' of git://one.firstfloor.org/home/andi/git/linux-2.6: (225 commits)
[PATCH] Don't set calgary iommu as default y
[PATCH] i386/x86-64: New Intel feature flags
[PATCH] x86: Add a cumulative thermal throttle event counter.
[PATCH] i386: Make the jiffies compares use the 64bit safe macros.
[PATCH] x86: Refactor thermal throttle processing
[PATCH] Add 64bit jiffies compares (for use with get_jiffies_64)
[PATCH] Fix unwinder warning in traps.c
[PATCH] x86: Allow disabling early pci scans with pci=noearly or disallowing conf1
[PATCH] x86: Move direct PCI scanning functions out of line
[PATCH] i386/x86-64: Make all early PCI scans dependent on CONFIG_PCI
[PATCH] Don't leak NT bit into next task
[PATCH] i386/x86-64: Work around gcc bug with noreturn functions in unwinder
[PATCH] Fix some broken white space in ia32_signal.c
[PATCH] Initialize argument registers for 32bit signal handlers.
[PATCH] Remove all traces of signal number conversion
[PATCH] Don't synchronize time reading on single core AMD systems
[PATCH] Remove outdated comment in x86-64 mmconfig code
[PATCH] Use string instructions for Core2 copy/clear
[PATCH] x86: - restore i8259A eoi status on resume
[PATCH] i386: Split multi-line printk in oops output.
...
Diffstat (limited to 'arch/x86_64/Kconfig')
-rw-r--r-- | arch/x86_64/Kconfig | 40 |
1 files changed, 35 insertions, 5 deletions
diff --git a/arch/x86_64/Kconfig b/arch/x86_64/Kconfig index 581ce9af0ec8..efe249e7d6b3 100644 --- a/arch/x86_64/Kconfig +++ b/arch/x86_64/Kconfig | |||
@@ -109,6 +109,7 @@ config X86_PC | |||
109 | 109 | ||
110 | config X86_VSMP | 110 | config X86_VSMP |
111 | bool "Support for ScaleMP vSMP" | 111 | bool "Support for ScaleMP vSMP" |
112 | depends on PCI | ||
112 | help | 113 | help |
113 | Support for ScaleMP vSMP systems. Say 'Y' here if this kernel is | 114 | Support for ScaleMP vSMP systems. Say 'Y' here if this kernel is |
114 | supposed to run on these EM64T-based machines. Only choose this option | 115 | supposed to run on these EM64T-based machines. Only choose this option |
@@ -295,7 +296,7 @@ config NUMA | |||
295 | 296 | ||
296 | config K8_NUMA | 297 | config K8_NUMA |
297 | bool "Old style AMD Opteron NUMA detection" | 298 | bool "Old style AMD Opteron NUMA detection" |
298 | depends on NUMA | 299 | depends on NUMA && PCI |
299 | default y | 300 | default y |
300 | help | 301 | help |
301 | Enable K8 NUMA node topology detection. You should say Y here if | 302 | Enable K8 NUMA node topology detection. You should say Y here if |
@@ -425,7 +426,6 @@ config IOMMU | |||
425 | 426 | ||
426 | config CALGARY_IOMMU | 427 | config CALGARY_IOMMU |
427 | bool "IBM Calgary IOMMU support" | 428 | bool "IBM Calgary IOMMU support" |
428 | default y | ||
429 | select SWIOTLB | 429 | select SWIOTLB |
430 | depends on PCI && EXPERIMENTAL | 430 | depends on PCI && EXPERIMENTAL |
431 | help | 431 | help |
@@ -472,8 +472,7 @@ config X86_MCE_AMD | |||
472 | the DRAM Error Threshold. | 472 | the DRAM Error Threshold. |
473 | 473 | ||
474 | config KEXEC | 474 | config KEXEC |
475 | bool "kexec system call (EXPERIMENTAL)" | 475 | bool "kexec system call" |
476 | depends on EXPERIMENTAL | ||
477 | help | 476 | help |
478 | kexec is a system call that implements the ability to shutdown your | 477 | kexec is a system call that implements the ability to shutdown your |
479 | current kernel, and to start another kernel. It is like a reboot | 478 | current kernel, and to start another kernel. It is like a reboot |
@@ -492,7 +491,14 @@ config CRASH_DUMP | |||
492 | bool "kernel crash dumps (EXPERIMENTAL)" | 491 | bool "kernel crash dumps (EXPERIMENTAL)" |
493 | depends on EXPERIMENTAL | 492 | depends on EXPERIMENTAL |
494 | help | 493 | help |
495 | Generate crash dump after being started by kexec. | 494 | Generate crash dump after being started by kexec. |
495 | This should be normally only set in special crash dump kernels | ||
496 | which are loaded in the main kernel with kexec-tools into | ||
497 | a specially reserved region and then later executed after | ||
498 | a crash by kdump/kexec. The crash dump kernel must be compiled | ||
499 | to a memory address not used by the main kernel or BIOS using | ||
500 | PHYSICAL_START. | ||
501 | For more details see Documentation/kdump/kdump.txt | ||
496 | 502 | ||
497 | config PHYSICAL_START | 503 | config PHYSICAL_START |
498 | hex "Physical address where the kernel is loaded" if (EMBEDDED || CRASH_DUMP) | 504 | hex "Physical address where the kernel is loaded" if (EMBEDDED || CRASH_DUMP) |
@@ -530,6 +536,30 @@ config SECCOMP | |||
530 | 536 | ||
531 | If unsure, say Y. Only embedded should say N here. | 537 | If unsure, say Y. Only embedded should say N here. |
532 | 538 | ||
539 | config CC_STACKPROTECTOR | ||
540 | bool "Enable -fstack-protector buffer overflow detection (EXPRIMENTAL)" | ||
541 | depends on EXPERIMENTAL | ||
542 | help | ||
543 | This option turns on the -fstack-protector GCC feature. This | ||
544 | feature puts, at the beginning of critical functions, a canary | ||
545 | value on the stack just before the return address, and validates | ||
546 | the value just before actually returning. Stack based buffer | ||
547 | overflows (that need to overwrite this return address) now also | ||
548 | overwrite the canary, which gets detected and the attack is then | ||
549 | neutralized via a kernel panic. | ||
550 | |||
551 | This feature requires gcc version 4.2 or above, or a distribution | ||
552 | gcc with the feature backported. Older versions are automatically | ||
553 | detected and for those versions, this configuration option is ignored. | ||
554 | |||
555 | config CC_STACKPROTECTOR_ALL | ||
556 | bool "Use stack-protector for all functions" | ||
557 | depends on CC_STACKPROTECTOR | ||
558 | help | ||
559 | Normally, GCC only inserts the canary value protection for | ||
560 | functions that use large-ish on-stack buffers. By enabling | ||
561 | this option, GCC will be asked to do this for ALL functions. | ||
562 | |||
533 | source kernel/Kconfig.hz | 563 | source kernel/Kconfig.hz |
534 | 564 | ||
535 | config REORDER | 565 | config REORDER |