Kconfig (ef70fcc0cd5d98f5e2df82c9e598b47f351d4f66) | Kconfig (70c70d97809c3cdb8ff04f38ee3718c5385a2a4d) |
---|---|
1# 2# For a description of the syntax of this configuration file, 3# see Documentation/kbuild/kconfig-language.txt. 4# 5 6mainmenu "Linux Kernel Configuration" 7 8config ARM --- 257 unchanged lines hidden (view full) --- 266 select PLAT_VERSATILE 267 help 268 This enables support for the ARM Ltd Versatile Express boards. 269 270config ARCH_AT91 271 bool "Atmel AT91" 272 select ARCH_REQUIRE_GPIOLIB 273 select HAVE_CLK | 1# 2# For a description of the syntax of this configuration file, 3# see Documentation/kbuild/kconfig-language.txt. 4# 5 6mainmenu "Linux Kernel Configuration" 7 8config ARM --- 257 unchanged lines hidden (view full) --- 266 select PLAT_VERSATILE 267 help 268 This enables support for the ARM Ltd Versatile Express boards. 269 270config ARCH_AT91 271 bool "Atmel AT91" 272 select ARCH_REQUIRE_GPIOLIB 273 select HAVE_CLK |
274 select ARCH_USES_GETTIMEOFFSET | |
275 help 276 This enables support for systems based on the Atmel AT91RM9200, 277 AT91SAM9 and AT91CAP9 processors. 278 279config ARCH_BCMRING 280 bool "Broadcom BCMRING" 281 depends on MMU 282 select CPU_V6 --- 763 unchanged lines hidden (view full) --- 1046 This option enables the workaround for the 460075 Cortex-A8 (r2p0) 1047 erratum. Any asynchronous access to the L2 cache may encounter a 1048 situation in which recent store transactions to the L2 cache are lost 1049 and overwritten with stale memory contents from external memory. The 1050 workaround disables the write-allocate mode for the L2 cache via the 1051 ACTLR register. Note that setting specific bits in the ACTLR register 1052 may not be available in non-secure mode. 1053 | 274 help 275 This enables support for systems based on the Atmel AT91RM9200, 276 AT91SAM9 and AT91CAP9 processors. 277 278config ARCH_BCMRING 279 bool "Broadcom BCMRING" 280 depends on MMU 281 select CPU_V6 --- 763 unchanged lines hidden (view full) --- 1045 This option enables the workaround for the 460075 Cortex-A8 (r2p0) 1046 erratum. Any asynchronous access to the L2 cache may encounter a 1047 situation in which recent store transactions to the L2 cache are lost 1048 and overwritten with stale memory contents from external memory. The 1049 workaround disables the write-allocate mode for the L2 cache via the 1050 ACTLR register. Note that setting specific bits in the ACTLR register 1051 may not be available in non-secure mode. 1052 |
1053config ARM_ERRATA_742230 1054 bool "ARM errata: DMB operation may be faulty" 1055 depends on CPU_V7 && SMP 1056 help 1057 This option enables the workaround for the 742230 Cortex-A9 1058 (r1p0..r2p2) erratum. Under rare circumstances, a DMB instruction 1059 between two write operations may not ensure the correct visibility 1060 ordering of the two writes. This workaround sets a specific bit in 1061 the diagnostic register of the Cortex-A9 which causes the DMB 1062 instruction to behave as a DSB, ensuring the correct behaviour of 1063 the two writes. 1064 1065config ARM_ERRATA_742231 1066 bool "ARM errata: Incorrect hazard handling in the SCU may lead to data corruption" 1067 depends on CPU_V7 && SMP 1068 help 1069 This option enables the workaround for the 742231 Cortex-A9 1070 (r2p0..r2p2) erratum. Under certain conditions, specific to the 1071 Cortex-A9 MPCore micro-architecture, two CPUs working in SMP mode, 1072 accessing some data located in the same cache line, may get corrupted 1073 data due to bad handling of the address hazard when the line gets 1074 replaced from one of the CPUs at the same time as another CPU is 1075 accessing it. This workaround sets specific bits in the diagnostic 1076 register of the Cortex-A9 which reduces the linefill issuing 1077 capabilities of the processor. 1078 |
|
1054config PL310_ERRATA_588369 1055 bool "Clean & Invalidate maintenance operations do not invalidate clean lines" 1056 depends on CACHE_L2X0 && ARCH_OMAP4 1057 help 1058 The PL310 L2 cache controller implements three types of Clean & 1059 Invalidate maintenance operations: by Physical Address 1060 (offset 0x7F0), by Index/Way (0x7F8) and by Way (0x7FC). 1061 They are architecturally defined to behave as the execution of a --- 371 unchanged lines hidden (view full) --- 1433 1434 A possible side effect is a slight increase in scheduling latency 1435 between threads sharing the same address space if they invoke 1436 such copy operations with large buffers. 1437 1438 However, if the CPU data cache is using a write-allocate mode, 1439 this option is unlikely to provide any performance gain. 1440 | 1079config PL310_ERRATA_588369 1080 bool "Clean & Invalidate maintenance operations do not invalidate clean lines" 1081 depends on CACHE_L2X0 && ARCH_OMAP4 1082 help 1083 The PL310 L2 cache controller implements three types of Clean & 1084 Invalidate maintenance operations: by Physical Address 1085 (offset 0x7F0), by Index/Way (0x7F8) and by Way (0x7FC). 1086 They are architecturally defined to behave as the execution of a --- 371 unchanged lines hidden (view full) --- 1458 1459 A possible side effect is a slight increase in scheduling latency 1460 between threads sharing the same address space if they invoke 1461 such copy operations with large buffers. 1462 1463 However, if the CPU data cache is using a write-allocate mode, 1464 this option is unlikely to provide any performance gain. 1465 |
1466config SECCOMP 1467 bool 1468 prompt "Enable seccomp to safely compute untrusted bytecode" 1469 ---help--- 1470 This kernel feature is useful for number crunching applications 1471 that may need to compute untrusted bytecode during their 1472 execution. By using pipes or other transports made available to 1473 the process as file descriptors supporting the read/write 1474 syscalls, it's possible to isolate those applications in 1475 their own address space using seccomp. Once seccomp is 1476 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled 1477 and the task is only allowed to execute a few safe syscalls 1478 defined by each seccomp mode. 1479 |
|
1441config CC_STACKPROTECTOR 1442 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)" 1443 help 1444 This option turns on the -fstack-protector GCC feature. This 1445 feature puts, at the beginning of functions, a canary value on 1446 the stack just before the return address, and validates 1447 the value just before actually returning. Stack based buffer 1448 overflows (that need to overwrite this return address) now also --- 323 unchanged lines hidden --- | 1480config CC_STACKPROTECTOR 1481 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)" 1482 help 1483 This option turns on the -fstack-protector GCC feature. This 1484 feature puts, at the beginning of functions, a canary value on 1485 the stack just before the return address, and validates 1486 the value just before actually returning. Stack based buffer 1487 overflows (that need to overwrite this return address) now also --- 323 unchanged lines hidden --- |