1config ARM64 2 def_bool y 3 select ACPI_CCA_REQUIRED if ACPI 4 select ACPI_GENERIC_GSI if ACPI 5 select ACPI_GTDT if ACPI 6 select ACPI_IORT if ACPI 7 select ACPI_REDUCED_HARDWARE_ONLY if ACPI 8 select ACPI_MCFG if ACPI 9 select ACPI_SPCR_TABLE if ACPI 10 select ARCH_CLOCKSOURCE_DATA 11 select ARCH_HAS_DEBUG_VIRTUAL 12 select ARCH_HAS_DEVMEM_IS_ALLOWED 13 select ARCH_HAS_ACPI_TABLE_UPGRADE if ACPI 14 select ARCH_HAS_ELF_RANDOMIZE 15 select ARCH_HAS_FORTIFY_SOURCE 16 select ARCH_HAS_GCOV_PROFILE_ALL 17 select ARCH_HAS_GIGANTIC_PAGE if (MEMORY_ISOLATION && COMPACTION) || CMA 18 select ARCH_HAS_KCOV 19 select ARCH_HAS_MEMBARRIER_SYNC_CORE 20 select ARCH_HAS_SET_MEMORY 21 select ARCH_HAS_SG_CHAIN 22 select ARCH_HAS_STRICT_KERNEL_RWX 23 select ARCH_HAS_STRICT_MODULE_RWX 24 select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST 25 select ARCH_HAVE_NMI_SAFE_CMPXCHG 26 select ARCH_INLINE_READ_LOCK if !PREEMPT 27 select ARCH_INLINE_READ_LOCK_BH if !PREEMPT 28 select ARCH_INLINE_READ_LOCK_IRQ if !PREEMPT 29 select ARCH_INLINE_READ_LOCK_IRQSAVE if !PREEMPT 30 select ARCH_INLINE_READ_UNLOCK if !PREEMPT 31 select ARCH_INLINE_READ_UNLOCK_BH if !PREEMPT 32 select ARCH_INLINE_READ_UNLOCK_IRQ if !PREEMPT 33 select ARCH_INLINE_READ_UNLOCK_IRQRESTORE if !PREEMPT 34 select ARCH_INLINE_WRITE_LOCK if !PREEMPT 35 select ARCH_INLINE_WRITE_LOCK_BH if !PREEMPT 36 select ARCH_INLINE_WRITE_LOCK_IRQ if !PREEMPT 37 select ARCH_INLINE_WRITE_LOCK_IRQSAVE if !PREEMPT 38 select ARCH_INLINE_WRITE_UNLOCK if !PREEMPT 39 select ARCH_INLINE_WRITE_UNLOCK_BH if !PREEMPT 40 select ARCH_INLINE_WRITE_UNLOCK_IRQ if !PREEMPT 41 select ARCH_INLINE_WRITE_UNLOCK_IRQRESTORE if !PREEMPT 42 select ARCH_USE_CMPXCHG_LOCKREF 43 select ARCH_USE_QUEUED_RWLOCKS 44 select ARCH_SUPPORTS_MEMORY_FAILURE 45 select ARCH_SUPPORTS_ATOMIC_RMW 46 select ARCH_SUPPORTS_NUMA_BALANCING 47 select ARCH_WANT_COMPAT_IPC_PARSE_VERSION 48 select ARCH_WANT_FRAME_POINTERS 49 select ARCH_HAS_UBSAN_SANITIZE_ALL 50 select ARM_AMBA 51 select ARM_ARCH_TIMER 52 select ARM_GIC 53 select AUDIT_ARCH_COMPAT_GENERIC 54 select ARM_GIC_V2M if PCI 55 select ARM_GIC_V3 56 select ARM_GIC_V3_ITS if PCI 57 select ARM_PSCI_FW 58 select BUILDTIME_EXTABLE_SORT 59 select CLONE_BACKWARDS 60 select COMMON_CLK 61 select CPU_PM if (SUSPEND || CPU_IDLE) 62 select DCACHE_WORD_ACCESS 63 select DMA_DIRECT_OPS 64 select EDAC_SUPPORT 65 select FRAME_POINTER 66 select GENERIC_ALLOCATOR 67 select GENERIC_ARCH_TOPOLOGY 68 select GENERIC_CLOCKEVENTS 69 select GENERIC_CLOCKEVENTS_BROADCAST 70 select GENERIC_CPU_AUTOPROBE 71 select GENERIC_EARLY_IOREMAP 72 select GENERIC_IDLE_POLL_SETUP 73 select GENERIC_IRQ_PROBE 74 select GENERIC_IRQ_SHOW 75 select GENERIC_IRQ_SHOW_LEVEL 76 select GENERIC_PCI_IOMAP 77 select GENERIC_SCHED_CLOCK 78 select GENERIC_SMP_IDLE_THREAD 79 select GENERIC_STRNCPY_FROM_USER 80 select GENERIC_STRNLEN_USER 81 select GENERIC_TIME_VSYSCALL 82 select HANDLE_DOMAIN_IRQ 83 select HARDIRQS_SW_RESEND 84 select HAVE_ACPI_APEI if (ACPI && EFI) 85 select HAVE_ALIGNED_STRUCT_PAGE if SLUB 86 select HAVE_ARCH_AUDITSYSCALL 87 select HAVE_ARCH_BITREVERSE 88 select HAVE_ARCH_HUGE_VMAP 89 select HAVE_ARCH_JUMP_LABEL 90 select HAVE_ARCH_KASAN if !(ARM64_16K_PAGES && ARM64_VA_BITS_48) 91 select HAVE_ARCH_KGDB 92 select HAVE_ARCH_MMAP_RND_BITS 93 select HAVE_ARCH_MMAP_RND_COMPAT_BITS if COMPAT 94 select HAVE_ARCH_SECCOMP_FILTER 95 select HAVE_ARCH_THREAD_STRUCT_WHITELIST 96 select HAVE_ARCH_TRACEHOOK 97 select HAVE_ARCH_TRANSPARENT_HUGEPAGE 98 select HAVE_ARCH_VMAP_STACK 99 select HAVE_ARM_SMCCC 100 select HAVE_EBPF_JIT 101 select HAVE_C_RECORDMCOUNT 102 select HAVE_CC_STACKPROTECTOR 103 select HAVE_CMPXCHG_DOUBLE 104 select HAVE_CMPXCHG_LOCAL 105 select HAVE_CONTEXT_TRACKING 106 select HAVE_DEBUG_BUGVERBOSE 107 select HAVE_DEBUG_KMEMLEAK 108 select HAVE_DMA_CONTIGUOUS 109 select HAVE_DYNAMIC_FTRACE 110 select HAVE_EFFICIENT_UNALIGNED_ACCESS 111 select HAVE_FTRACE_MCOUNT_RECORD 112 select HAVE_FUNCTION_TRACER 113 select HAVE_FUNCTION_GRAPH_TRACER 114 select HAVE_GCC_PLUGINS 115 select HAVE_GENERIC_DMA_COHERENT 116 select HAVE_HW_BREAKPOINT if PERF_EVENTS 117 select HAVE_IRQ_TIME_ACCOUNTING 118 select HAVE_MEMBLOCK 119 select HAVE_MEMBLOCK_NODE_MAP if NUMA 120 select HAVE_NMI 121 select HAVE_PATA_PLATFORM 122 select HAVE_PERF_EVENTS 123 select HAVE_PERF_REGS 124 select HAVE_PERF_USER_STACK_DUMP 125 select HAVE_REGS_AND_STACK_ACCESS_API 126 select HAVE_RCU_TABLE_FREE 127 select HAVE_SYSCALL_TRACEPOINTS 128 select HAVE_KPROBES 129 select HAVE_KRETPROBES 130 select IOMMU_DMA if IOMMU_SUPPORT 131 select IRQ_DOMAIN 132 select IRQ_FORCED_THREADING 133 select MODULES_USE_ELF_RELA 134 select MULTI_IRQ_HANDLER 135 select NEED_DMA_MAP_STATE 136 select NEED_SG_DMA_LENGTH 137 select NO_BOOTMEM 138 select OF 139 select OF_EARLY_FLATTREE 140 select OF_RESERVED_MEM 141 select PCI_ECAM if ACPI 142 select POWER_RESET 143 select POWER_SUPPLY 144 select REFCOUNT_FULL 145 select SPARSE_IRQ 146 select SYSCTL_EXCEPTION_TRACE 147 select THREAD_INFO_IN_TASK 148 help 149 ARM 64-bit (AArch64) Linux support. 150 151config 64BIT 152 def_bool y 153 154config MMU 155 def_bool y 156 157config ARM64_PAGE_SHIFT 158 int 159 default 16 if ARM64_64K_PAGES 160 default 14 if ARM64_16K_PAGES 161 default 12 162 163config ARM64_CONT_SHIFT 164 int 165 default 5 if ARM64_64K_PAGES 166 default 7 if ARM64_16K_PAGES 167 default 4 168 169config ARCH_MMAP_RND_BITS_MIN 170 default 14 if ARM64_64K_PAGES 171 default 16 if ARM64_16K_PAGES 172 default 18 173 174# max bits determined by the following formula: 175# VA_BITS - PAGE_SHIFT - 3 176config ARCH_MMAP_RND_BITS_MAX 177 default 19 if ARM64_VA_BITS=36 178 default 24 if ARM64_VA_BITS=39 179 default 27 if ARM64_VA_BITS=42 180 default 30 if ARM64_VA_BITS=47 181 default 29 if ARM64_VA_BITS=48 && ARM64_64K_PAGES 182 default 31 if ARM64_VA_BITS=48 && ARM64_16K_PAGES 183 default 33 if ARM64_VA_BITS=48 184 default 14 if ARM64_64K_PAGES 185 default 16 if ARM64_16K_PAGES 186 default 18 187 188config ARCH_MMAP_RND_COMPAT_BITS_MIN 189 default 7 if ARM64_64K_PAGES 190 default 9 if ARM64_16K_PAGES 191 default 11 192 193config ARCH_MMAP_RND_COMPAT_BITS_MAX 194 default 16 195 196config NO_IOPORT_MAP 197 def_bool y if !PCI 198 199config STACKTRACE_SUPPORT 200 def_bool y 201 202config ILLEGAL_POINTER_VALUE 203 hex 204 default 0xdead000000000000 205 206config LOCKDEP_SUPPORT 207 def_bool y 208 209config TRACE_IRQFLAGS_SUPPORT 210 def_bool y 211 212config RWSEM_XCHGADD_ALGORITHM 213 def_bool y 214 215config GENERIC_BUG 216 def_bool y 217 depends on BUG 218 219config GENERIC_BUG_RELATIVE_POINTERS 220 def_bool y 221 depends on GENERIC_BUG 222 223config GENERIC_HWEIGHT 224 def_bool y 225 226config GENERIC_CSUM 227 def_bool y 228 229config GENERIC_CALIBRATE_DELAY 230 def_bool y 231 232config ZONE_DMA32 233 def_bool y 234 235config HAVE_GENERIC_GUP 236 def_bool y 237 238config ARCH_DMA_ADDR_T_64BIT 239 def_bool y 240 241config SMP 242 def_bool y 243 244config SWIOTLB 245 def_bool y 246 247config KERNEL_MODE_NEON 248 def_bool y 249 250config FIX_EARLYCON_MEM 251 def_bool y 252 253config PGTABLE_LEVELS 254 int 255 default 2 if ARM64_16K_PAGES && ARM64_VA_BITS_36 256 default 2 if ARM64_64K_PAGES && ARM64_VA_BITS_42 257 default 3 if ARM64_64K_PAGES && ARM64_VA_BITS_48 258 default 3 if ARM64_4K_PAGES && ARM64_VA_BITS_39 259 default 3 if ARM64_16K_PAGES && ARM64_VA_BITS_47 260 default 4 if !ARM64_64K_PAGES && ARM64_VA_BITS_48 261 262config ARCH_SUPPORTS_UPROBES 263 def_bool y 264 265config ARCH_PROC_KCORE_TEXT 266 def_bool y 267 268config MULTI_IRQ_HANDLER 269 def_bool y 270 271source "init/Kconfig" 272 273source "kernel/Kconfig.freezer" 274 275source "arch/arm64/Kconfig.platforms" 276 277menu "Bus support" 278 279config PCI 280 bool "PCI support" 281 help 282 This feature enables support for PCI bus system. If you say Y 283 here, the kernel will include drivers and infrastructure code 284 to support PCI bus devices. 285 286config PCI_DOMAINS 287 def_bool PCI 288 289config PCI_DOMAINS_GENERIC 290 def_bool PCI 291 292config PCI_SYSCALL 293 def_bool PCI 294 295source "drivers/pci/Kconfig" 296 297endmenu 298 299menu "Kernel Features" 300 301menu "ARM errata workarounds via the alternatives framework" 302 303config ARM64_ERRATUM_826319 304 bool "Cortex-A53: 826319: System might deadlock if a write cannot complete until read data is accepted" 305 default y 306 help 307 This option adds an alternative code sequence to work around ARM 308 erratum 826319 on Cortex-A53 parts up to r0p2 with an AMBA 4 ACE or 309 AXI master interface and an L2 cache. 310 311 If a Cortex-A53 uses an AMBA AXI4 ACE interface to other processors 312 and is unable to accept a certain write via this interface, it will 313 not progress on read data presented on the read data channel and the 314 system can deadlock. 315 316 The workaround promotes data cache clean instructions to 317 data cache clean-and-invalidate. 318 Please note that this does not necessarily enable the workaround, 319 as it depends on the alternative framework, which will only patch 320 the kernel if an affected CPU is detected. 321 322 If unsure, say Y. 323 324config ARM64_ERRATUM_827319 325 bool "Cortex-A53: 827319: Data cache clean instructions might cause overlapping transactions to the interconnect" 326 default y 327 help 328 This option adds an alternative code sequence to work around ARM 329 erratum 827319 on Cortex-A53 parts up to r0p2 with an AMBA 5 CHI 330 master interface and an L2 cache. 331 332 Under certain conditions this erratum can cause a clean line eviction 333 to occur at the same time as another transaction to the same address 334 on the AMBA 5 CHI interface, which can cause data corruption if the 335 interconnect reorders the two transactions. 336 337 The workaround promotes data cache clean instructions to 338 data cache clean-and-invalidate. 339 Please note that this does not necessarily enable the workaround, 340 as it depends on the alternative framework, which will only patch 341 the kernel if an affected CPU is detected. 342 343 If unsure, say Y. 344 345config ARM64_ERRATUM_824069 346 bool "Cortex-A53: 824069: Cache line might not be marked as clean after a CleanShared snoop" 347 default y 348 help 349 This option adds an alternative code sequence to work around ARM 350 erratum 824069 on Cortex-A53 parts up to r0p2 when it is connected 351 to a coherent interconnect. 352 353 If a Cortex-A53 processor is executing a store or prefetch for 354 write instruction at the same time as a processor in another 355 cluster is executing a cache maintenance operation to the same 356 address, then this erratum might cause a clean cache line to be 357 incorrectly marked as dirty. 358 359 The workaround promotes data cache clean instructions to 360 data cache clean-and-invalidate. 361 Please note that this option does not necessarily enable the 362 workaround, as it depends on the alternative framework, which will 363 only patch the kernel if an affected CPU is detected. 364 365 If unsure, say Y. 366 367config ARM64_ERRATUM_819472 368 bool "Cortex-A53: 819472: Store exclusive instructions might cause data corruption" 369 default y 370 help 371 This option adds an alternative code sequence to work around ARM 372 erratum 819472 on Cortex-A53 parts up to r0p1 with an L2 cache 373 present when it is connected to a coherent interconnect. 374 375 If the processor is executing a load and store exclusive sequence at 376 the same time as a processor in another cluster is executing a cache 377 maintenance operation to the same address, then this erratum might 378 cause data corruption. 379 380 The workaround promotes data cache clean instructions to 381 data cache clean-and-invalidate. 382 Please note that this does not necessarily enable the workaround, 383 as it depends on the alternative framework, which will only patch 384 the kernel if an affected CPU is detected. 385 386 If unsure, say Y. 387 388config ARM64_ERRATUM_832075 389 bool "Cortex-A57: 832075: possible deadlock on mixing exclusive memory accesses with device loads" 390 default y 391 help 392 This option adds an alternative code sequence to work around ARM 393 erratum 832075 on Cortex-A57 parts up to r1p2. 394 395 Affected Cortex-A57 parts might deadlock when exclusive load/store 396 instructions to Write-Back memory are mixed with Device loads. 397 398 The workaround is to promote device loads to use Load-Acquire 399 semantics. 400 Please note that this does not necessarily enable the workaround, 401 as it depends on the alternative framework, which will only patch 402 the kernel if an affected CPU is detected. 403 404 If unsure, say Y. 405 406config ARM64_ERRATUM_834220 407 bool "Cortex-A57: 834220: Stage 2 translation fault might be incorrectly reported in presence of a Stage 1 fault" 408 depends on KVM 409 default y 410 help 411 This option adds an alternative code sequence to work around ARM 412 erratum 834220 on Cortex-A57 parts up to r1p2. 413 414 Affected Cortex-A57 parts might report a Stage 2 translation 415 fault as the result of a Stage 1 fault for load crossing a 416 page boundary when there is a permission or device memory 417 alignment fault at Stage 1 and a translation fault at Stage 2. 418 419 The workaround is to verify that the Stage 1 translation 420 doesn't generate a fault before handling the Stage 2 fault. 421 Please note that this does not necessarily enable the workaround, 422 as it depends on the alternative framework, which will only patch 423 the kernel if an affected CPU is detected. 424 425 If unsure, say Y. 426 427config ARM64_ERRATUM_845719 428 bool "Cortex-A53: 845719: a load might read incorrect data" 429 depends on COMPAT 430 default y 431 help 432 This option adds an alternative code sequence to work around ARM 433 erratum 845719 on Cortex-A53 parts up to r0p4. 434 435 When running a compat (AArch32) userspace on an affected Cortex-A53 436 part, a load at EL0 from a virtual address that matches the bottom 32 437 bits of the virtual address used by a recent load at (AArch64) EL1 438 might return incorrect data. 439 440 The workaround is to write the contextidr_el1 register on exception 441 return to a 32-bit task. 442 Please note that this does not necessarily enable the workaround, 443 as it depends on the alternative framework, which will only patch 444 the kernel if an affected CPU is detected. 445 446 If unsure, say Y. 447 448config ARM64_ERRATUM_843419 449 bool "Cortex-A53: 843419: A load or store might access an incorrect address" 450 default y 451 select ARM64_MODULE_PLTS if MODULES 452 help 453 This option links the kernel with '--fix-cortex-a53-843419' and 454 enables PLT support to replace certain ADRP instructions, which can 455 cause subsequent memory accesses to use an incorrect address on 456 Cortex-A53 parts up to r0p4. 457 458 If unsure, say Y. 459 460config ARM64_ERRATUM_1024718 461 bool "Cortex-A55: 1024718: Update of DBM/AP bits without break before make might result in incorrect update" 462 default y 463 help 464 This option adds work around for Arm Cortex-A55 Erratum 1024718. 465 466 Affected Cortex-A55 cores (r0p0, r0p1, r1p0) could cause incorrect 467 update of the hardware dirty bit when the DBM/AP bits are updated 468 without a break-before-make. The work around is to disable the usage 469 of hardware DBM locally on the affected cores. CPUs not affected by 470 erratum will continue to use the feature. 471 472 If unsure, say Y. 473 474config CAVIUM_ERRATUM_22375 475 bool "Cavium erratum 22375, 24313" 476 default y 477 help 478 Enable workaround for erratum 22375, 24313. 479 480 This implements two gicv3-its errata workarounds for ThunderX. Both 481 with small impact affecting only ITS table allocation. 482 483 erratum 22375: only alloc 8MB table size 484 erratum 24313: ignore memory access type 485 486 The fixes are in ITS initialization and basically ignore memory access 487 type and table size provided by the TYPER and BASER registers. 488 489 If unsure, say Y. 490 491config CAVIUM_ERRATUM_23144 492 bool "Cavium erratum 23144: ITS SYNC hang on dual socket system" 493 depends on NUMA 494 default y 495 help 496 ITS SYNC command hang for cross node io and collections/cpu mapping. 497 498 If unsure, say Y. 499 500config CAVIUM_ERRATUM_23154 501 bool "Cavium erratum 23154: Access to ICC_IAR1_EL1 is not sync'ed" 502 default y 503 help 504 The gicv3 of ThunderX requires a modified version for 505 reading the IAR status to ensure data synchronization 506 (access to icc_iar1_el1 is not sync'ed before and after). 507 508 If unsure, say Y. 509 510config CAVIUM_ERRATUM_27456 511 bool "Cavium erratum 27456: Broadcast TLBI instructions may cause icache corruption" 512 default y 513 help 514 On ThunderX T88 pass 1.x through 2.1 parts, broadcast TLBI 515 instructions may cause the icache to become corrupted if it 516 contains data for a non-current ASID. The fix is to 517 invalidate the icache when changing the mm context. 518 519 If unsure, say Y. 520 521config CAVIUM_ERRATUM_30115 522 bool "Cavium erratum 30115: Guest may disable interrupts in host" 523 default y 524 help 525 On ThunderX T88 pass 1.x through 2.2, T81 pass 1.0 through 526 1.2, and T83 Pass 1.0, KVM guest execution may disable 527 interrupts in host. Trapping both GICv3 group-0 and group-1 528 accesses sidesteps the issue. 529 530 If unsure, say Y. 531 532config QCOM_FALKOR_ERRATUM_1003 533 bool "Falkor E1003: Incorrect translation due to ASID change" 534 default y 535 help 536 On Falkor v1, an incorrect ASID may be cached in the TLB when ASID 537 and BADDR are changed together in TTBRx_EL1. Since we keep the ASID 538 in TTBR1_EL1, this situation only occurs in the entry trampoline and 539 then only for entries in the walk cache, since the leaf translation 540 is unchanged. Work around the erratum by invalidating the walk cache 541 entries for the trampoline before entering the kernel proper. 542 543config QCOM_FALKOR_ERRATUM_1009 544 bool "Falkor E1009: Prematurely complete a DSB after a TLBI" 545 default y 546 help 547 On Falkor v1, the CPU may prematurely complete a DSB following a 548 TLBI xxIS invalidate maintenance operation. Repeat the TLBI operation 549 one more time to fix the issue. 550 551 If unsure, say Y. 552 553config QCOM_QDF2400_ERRATUM_0065 554 bool "QDF2400 E0065: Incorrect GITS_TYPER.ITT_Entry_size" 555 default y 556 help 557 On Qualcomm Datacenter Technologies QDF2400 SoC, ITS hardware reports 558 ITE size incorrectly. The GITS_TYPER.ITT_Entry_size field should have 559 been indicated as 16Bytes (0xf), not 8Bytes (0x7). 560 561 If unsure, say Y. 562 563config SOCIONEXT_SYNQUACER_PREITS 564 bool "Socionext Synquacer: Workaround for GICv3 pre-ITS" 565 default y 566 help 567 Socionext Synquacer SoCs implement a separate h/w block to generate 568 MSI doorbell writes with non-zero values for the device ID. 569 570 If unsure, say Y. 571 572config HISILICON_ERRATUM_161600802 573 bool "Hip07 161600802: Erroneous redistributor VLPI base" 574 default y 575 help 576 The HiSilicon Hip07 SoC usees the wrong redistributor base 577 when issued ITS commands such as VMOVP and VMAPP, and requires 578 a 128kB offset to be applied to the target address in this commands. 579 580 If unsure, say Y. 581 582config QCOM_FALKOR_ERRATUM_E1041 583 bool "Falkor E1041: Speculative instruction fetches might cause errant memory access" 584 default y 585 help 586 Falkor CPU may speculatively fetch instructions from an improper 587 memory location when MMU translation is changed from SCTLR_ELn[M]=1 588 to SCTLR_ELn[M]=0. Prefix an ISB instruction to fix the problem. 589 590 If unsure, say Y. 591 592endmenu 593 594 595choice 596 prompt "Page size" 597 default ARM64_4K_PAGES 598 help 599 Page size (translation granule) configuration. 600 601config ARM64_4K_PAGES 602 bool "4KB" 603 help 604 This feature enables 4KB pages support. 605 606config ARM64_16K_PAGES 607 bool "16KB" 608 help 609 The system will use 16KB pages support. AArch32 emulation 610 requires applications compiled with 16K (or a multiple of 16K) 611 aligned segments. 612 613config ARM64_64K_PAGES 614 bool "64KB" 615 help 616 This feature enables 64KB pages support (4KB by default) 617 allowing only two levels of page tables and faster TLB 618 look-up. AArch32 emulation requires applications compiled 619 with 64K aligned segments. 620 621endchoice 622 623choice 624 prompt "Virtual address space size" 625 default ARM64_VA_BITS_39 if ARM64_4K_PAGES 626 default ARM64_VA_BITS_47 if ARM64_16K_PAGES 627 default ARM64_VA_BITS_42 if ARM64_64K_PAGES 628 help 629 Allows choosing one of multiple possible virtual address 630 space sizes. The level of translation table is determined by 631 a combination of page size and virtual address space size. 632 633config ARM64_VA_BITS_36 634 bool "36-bit" if EXPERT 635 depends on ARM64_16K_PAGES 636 637config ARM64_VA_BITS_39 638 bool "39-bit" 639 depends on ARM64_4K_PAGES 640 641config ARM64_VA_BITS_42 642 bool "42-bit" 643 depends on ARM64_64K_PAGES 644 645config ARM64_VA_BITS_47 646 bool "47-bit" 647 depends on ARM64_16K_PAGES 648 649config ARM64_VA_BITS_48 650 bool "48-bit" 651 652endchoice 653 654config ARM64_VA_BITS 655 int 656 default 36 if ARM64_VA_BITS_36 657 default 39 if ARM64_VA_BITS_39 658 default 42 if ARM64_VA_BITS_42 659 default 47 if ARM64_VA_BITS_47 660 default 48 if ARM64_VA_BITS_48 661 662choice 663 prompt "Physical address space size" 664 default ARM64_PA_BITS_48 665 help 666 Choose the maximum physical address range that the kernel will 667 support. 668 669config ARM64_PA_BITS_48 670 bool "48-bit" 671 672config ARM64_PA_BITS_52 673 bool "52-bit (ARMv8.2)" 674 depends on ARM64_64K_PAGES 675 depends on ARM64_PAN || !ARM64_SW_TTBR0_PAN 676 help 677 Enable support for a 52-bit physical address space, introduced as 678 part of the ARMv8.2-LPA extension. 679 680 With this enabled, the kernel will also continue to work on CPUs that 681 do not support ARMv8.2-LPA, but with some added memory overhead (and 682 minor performance overhead). 683 684endchoice 685 686config ARM64_PA_BITS 687 int 688 default 48 if ARM64_PA_BITS_48 689 default 52 if ARM64_PA_BITS_52 690 691config CPU_BIG_ENDIAN 692 bool "Build big-endian kernel" 693 help 694 Say Y if you plan on running a kernel in big-endian mode. 695 696config SCHED_MC 697 bool "Multi-core scheduler support" 698 help 699 Multi-core scheduler support improves the CPU scheduler's decision 700 making when dealing with multi-core CPU chips at a cost of slightly 701 increased overhead in some places. If unsure say N here. 702 703config SCHED_SMT 704 bool "SMT scheduler support" 705 help 706 Improves the CPU scheduler's decision making when dealing with 707 MultiThreading at a cost of slightly increased overhead in some 708 places. If unsure say N here. 709 710config NR_CPUS 711 int "Maximum number of CPUs (2-4096)" 712 range 2 4096 713 # These have to remain sorted largest to smallest 714 default "64" 715 716config HOTPLUG_CPU 717 bool "Support for hot-pluggable CPUs" 718 select GENERIC_IRQ_MIGRATION 719 help 720 Say Y here to experiment with turning CPUs off and on. CPUs 721 can be controlled through /sys/devices/system/cpu. 722 723# Common NUMA Features 724config NUMA 725 bool "Numa Memory Allocation and Scheduler Support" 726 select ACPI_NUMA if ACPI 727 select OF_NUMA 728 help 729 Enable NUMA (Non Uniform Memory Access) support. 730 731 The kernel will try to allocate memory used by a CPU on the 732 local memory of the CPU and add some more 733 NUMA awareness to the kernel. 734 735config NODES_SHIFT 736 int "Maximum NUMA Nodes (as a power of 2)" 737 range 1 10 738 default "2" 739 depends on NEED_MULTIPLE_NODES 740 help 741 Specify the maximum number of NUMA Nodes available on the target 742 system. Increases memory reserved to accommodate various tables. 743 744config USE_PERCPU_NUMA_NODE_ID 745 def_bool y 746 depends on NUMA 747 748config HAVE_SETUP_PER_CPU_AREA 749 def_bool y 750 depends on NUMA 751 752config NEED_PER_CPU_EMBED_FIRST_CHUNK 753 def_bool y 754 depends on NUMA 755 756config HOLES_IN_ZONE 757 def_bool y 758 depends on NUMA 759 760source kernel/Kconfig.preempt 761source kernel/Kconfig.hz 762 763config ARCH_SUPPORTS_DEBUG_PAGEALLOC 764 def_bool y 765 766config ARCH_HAS_HOLES_MEMORYMODEL 767 def_bool y if SPARSEMEM 768 769config ARCH_SPARSEMEM_ENABLE 770 def_bool y 771 select SPARSEMEM_VMEMMAP_ENABLE 772 773config ARCH_SPARSEMEM_DEFAULT 774 def_bool ARCH_SPARSEMEM_ENABLE 775 776config ARCH_SELECT_MEMORY_MODEL 777 def_bool ARCH_SPARSEMEM_ENABLE 778 779config HAVE_ARCH_PFN_VALID 780 def_bool ARCH_HAS_HOLES_MEMORYMODEL || !SPARSEMEM 781 782config HW_PERF_EVENTS 783 def_bool y 784 depends on ARM_PMU 785 786config SYS_SUPPORTS_HUGETLBFS 787 def_bool y 788 789config ARCH_WANT_HUGE_PMD_SHARE 790 def_bool y if ARM64_4K_PAGES || (ARM64_16K_PAGES && !ARM64_VA_BITS_36) 791 792config ARCH_HAS_CACHE_LINE_SIZE 793 def_bool y 794 795source "mm/Kconfig" 796 797config SECCOMP 798 bool "Enable seccomp to safely compute untrusted bytecode" 799 ---help--- 800 This kernel feature is useful for number crunching applications 801 that may need to compute untrusted bytecode during their 802 execution. By using pipes or other transports made available to 803 the process as file descriptors supporting the read/write 804 syscalls, it's possible to isolate those applications in 805 their own address space using seccomp. Once seccomp is 806 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled 807 and the task is only allowed to execute a few safe syscalls 808 defined by each seccomp mode. 809 810config PARAVIRT 811 bool "Enable paravirtualization code" 812 help 813 This changes the kernel so it can modify itself when it is run 814 under a hypervisor, potentially improving performance significantly 815 over full virtualization. 816 817config PARAVIRT_TIME_ACCOUNTING 818 bool "Paravirtual steal time accounting" 819 select PARAVIRT 820 default n 821 help 822 Select this option to enable fine granularity task steal time 823 accounting. Time spent executing other tasks in parallel with 824 the current vCPU is discounted from the vCPU power. To account for 825 that, there can be a small performance impact. 826 827 If in doubt, say N here. 828 829config KEXEC 830 depends on PM_SLEEP_SMP 831 select KEXEC_CORE 832 bool "kexec system call" 833 ---help--- 834 kexec is a system call that implements the ability to shutdown your 835 current kernel, and to start another kernel. It is like a reboot 836 but it is independent of the system firmware. And like a reboot 837 you can start any kernel with it, not just Linux. 838 839config CRASH_DUMP 840 bool "Build kdump crash kernel" 841 help 842 Generate crash dump after being started by kexec. This should 843 be normally only set in special crash dump kernels which are 844 loaded in the main kernel with kexec-tools into a specially 845 reserved region and then later executed after a crash by 846 kdump/kexec. 847 848 For more details see Documentation/kdump/kdump.txt 849 850config XEN_DOM0 851 def_bool y 852 depends on XEN 853 854config XEN 855 bool "Xen guest support on ARM64" 856 depends on ARM64 && OF 857 select SWIOTLB_XEN 858 select PARAVIRT 859 help 860 Say Y if you want to run Linux in a Virtual Machine on Xen on ARM64. 861 862config FORCE_MAX_ZONEORDER 863 int 864 default "14" if (ARM64_64K_PAGES && TRANSPARENT_HUGEPAGE) 865 default "12" if (ARM64_16K_PAGES && TRANSPARENT_HUGEPAGE) 866 default "11" 867 help 868 The kernel memory allocator divides physically contiguous memory 869 blocks into "zones", where each zone is a power of two number of 870 pages. This option selects the largest power of two that the kernel 871 keeps in the memory allocator. If you need to allocate very large 872 blocks of physically contiguous memory, then you may need to 873 increase this value. 874 875 This config option is actually maximum order plus one. For example, 876 a value of 11 means that the largest free memory block is 2^10 pages. 877 878 We make sure that we can allocate upto a HugePage size for each configuration. 879 Hence we have : 880 MAX_ORDER = (PMD_SHIFT - PAGE_SHIFT) + 1 => PAGE_SHIFT - 2 881 882 However for 4K, we choose a higher default value, 11 as opposed to 10, giving us 883 4M allocations matching the default size used by generic code. 884 885config UNMAP_KERNEL_AT_EL0 886 bool "Unmap kernel when running in userspace (aka \"KAISER\")" if EXPERT 887 default y 888 help 889 Speculation attacks against some high-performance processors can 890 be used to bypass MMU permission checks and leak kernel data to 891 userspace. This can be defended against by unmapping the kernel 892 when running in userspace, mapping it back in on exception entry 893 via a trampoline page in the vector table. 894 895 If unsure, say Y. 896 897config HARDEN_BRANCH_PREDICTOR 898 bool "Harden the branch predictor against aliasing attacks" if EXPERT 899 default y 900 help 901 Speculation attacks against some high-performance processors rely on 902 being able to manipulate the branch predictor for a victim context by 903 executing aliasing branches in the attacker context. Such attacks 904 can be partially mitigated against by clearing internal branch 905 predictor state and limiting the prediction logic in some situations. 906 907 This config option will take CPU-specific actions to harden the 908 branch predictor against aliasing attacks and may rely on specific 909 instruction sequences or control bits being set by the system 910 firmware. 911 912 If unsure, say Y. 913 914config HARDEN_EL2_VECTORS 915 bool "Harden EL2 vector mapping against system register leak" if EXPERT 916 default y 917 help 918 Speculation attacks against some high-performance processors can 919 be used to leak privileged information such as the vector base 920 register, resulting in a potential defeat of the EL2 layout 921 randomization. 922 923 This config option will map the vectors to a fixed location, 924 independent of the EL2 code mapping, so that revealing VBAR_EL2 925 to an attacker does not give away any extra information. This 926 only gets enabled on affected CPUs. 927 928 If unsure, say Y. 929 930menuconfig ARMV8_DEPRECATED 931 bool "Emulate deprecated/obsolete ARMv8 instructions" 932 depends on COMPAT 933 depends on SYSCTL 934 help 935 Legacy software support may require certain instructions 936 that have been deprecated or obsoleted in the architecture. 937 938 Enable this config to enable selective emulation of these 939 features. 940 941 If unsure, say Y 942 943if ARMV8_DEPRECATED 944 945config SWP_EMULATION 946 bool "Emulate SWP/SWPB instructions" 947 help 948 ARMv8 obsoletes the use of A32 SWP/SWPB instructions such that 949 they are always undefined. Say Y here to enable software 950 emulation of these instructions for userspace using LDXR/STXR. 951 952 In some older versions of glibc [<=2.8] SWP is used during futex 953 trylock() operations with the assumption that the code will not 954 be preempted. This invalid assumption may be more likely to fail 955 with SWP emulation enabled, leading to deadlock of the user 956 application. 957 958 NOTE: when accessing uncached shared regions, LDXR/STXR rely 959 on an external transaction monitoring block called a global 960 monitor to maintain update atomicity. If your system does not 961 implement a global monitor, this option can cause programs that 962 perform SWP operations to uncached memory to deadlock. 963 964 If unsure, say Y 965 966config CP15_BARRIER_EMULATION 967 bool "Emulate CP15 Barrier instructions" 968 help 969 The CP15 barrier instructions - CP15ISB, CP15DSB, and 970 CP15DMB - are deprecated in ARMv8 (and ARMv7). It is 971 strongly recommended to use the ISB, DSB, and DMB 972 instructions instead. 973 974 Say Y here to enable software emulation of these 975 instructions for AArch32 userspace code. When this option is 976 enabled, CP15 barrier usage is traced which can help 977 identify software that needs updating. 978 979 If unsure, say Y 980 981config SETEND_EMULATION 982 bool "Emulate SETEND instruction" 983 help 984 The SETEND instruction alters the data-endianness of the 985 AArch32 EL0, and is deprecated in ARMv8. 986 987 Say Y here to enable software emulation of the instruction 988 for AArch32 userspace code. 989 990 Note: All the cpus on the system must have mixed endian support at EL0 991 for this feature to be enabled. If a new CPU - which doesn't support mixed 992 endian - is hotplugged in after this feature has been enabled, there could 993 be unexpected results in the applications. 994 995 If unsure, say Y 996endif 997 998config ARM64_SW_TTBR0_PAN 999 bool "Emulate Privileged Access Never using TTBR0_EL1 switching" 1000 help 1001 Enabling this option prevents the kernel from accessing 1002 user-space memory directly by pointing TTBR0_EL1 to a reserved 1003 zeroed area and reserved ASID. The user access routines 1004 restore the valid TTBR0_EL1 temporarily. 1005 1006menu "ARMv8.1 architectural features" 1007 1008config ARM64_HW_AFDBM 1009 bool "Support for hardware updates of the Access and Dirty page flags" 1010 default y 1011 help 1012 The ARMv8.1 architecture extensions introduce support for 1013 hardware updates of the access and dirty information in page 1014 table entries. When enabled in TCR_EL1 (HA and HD bits) on 1015 capable processors, accesses to pages with PTE_AF cleared will 1016 set this bit instead of raising an access flag fault. 1017 Similarly, writes to read-only pages with the DBM bit set will 1018 clear the read-only bit (AP[2]) instead of raising a 1019 permission fault. 1020 1021 Kernels built with this configuration option enabled continue 1022 to work on pre-ARMv8.1 hardware and the performance impact is 1023 minimal. If unsure, say Y. 1024 1025config ARM64_PAN 1026 bool "Enable support for Privileged Access Never (PAN)" 1027 default y 1028 help 1029 Privileged Access Never (PAN; part of the ARMv8.1 Extensions) 1030 prevents the kernel or hypervisor from accessing user-space (EL0) 1031 memory directly. 1032 1033 Choosing this option will cause any unprotected (not using 1034 copy_to_user et al) memory access to fail with a permission fault. 1035 1036 The feature is detected at runtime, and will remain as a 'nop' 1037 instruction if the cpu does not implement the feature. 1038 1039config ARM64_LSE_ATOMICS 1040 bool "Atomic instructions" 1041 help 1042 As part of the Large System Extensions, ARMv8.1 introduces new 1043 atomic instructions that are designed specifically to scale in 1044 very large systems. 1045 1046 Say Y here to make use of these instructions for the in-kernel 1047 atomic routines. This incurs a small overhead on CPUs that do 1048 not support these instructions and requires the kernel to be 1049 built with binutils >= 2.25. 1050 1051config ARM64_VHE 1052 bool "Enable support for Virtualization Host Extensions (VHE)" 1053 default y 1054 help 1055 Virtualization Host Extensions (VHE) allow the kernel to run 1056 directly at EL2 (instead of EL1) on processors that support 1057 it. This leads to better performance for KVM, as they reduce 1058 the cost of the world switch. 1059 1060 Selecting this option allows the VHE feature to be detected 1061 at runtime, and does not affect processors that do not 1062 implement this feature. 1063 1064endmenu 1065 1066menu "ARMv8.2 architectural features" 1067 1068config ARM64_UAO 1069 bool "Enable support for User Access Override (UAO)" 1070 default y 1071 help 1072 User Access Override (UAO; part of the ARMv8.2 Extensions) 1073 causes the 'unprivileged' variant of the load/store instructions to 1074 be overridden to be privileged. 1075 1076 This option changes get_user() and friends to use the 'unprivileged' 1077 variant of the load/store instructions. This ensures that user-space 1078 really did have access to the supplied memory. When addr_limit is 1079 set to kernel memory the UAO bit will be set, allowing privileged 1080 access to kernel memory. 1081 1082 Choosing this option will cause copy_to_user() et al to use user-space 1083 memory permissions. 1084 1085 The feature is detected at runtime, the kernel will use the 1086 regular load/store instructions if the cpu does not implement the 1087 feature. 1088 1089config ARM64_PMEM 1090 bool "Enable support for persistent memory" 1091 select ARCH_HAS_PMEM_API 1092 select ARCH_HAS_UACCESS_FLUSHCACHE 1093 help 1094 Say Y to enable support for the persistent memory API based on the 1095 ARMv8.2 DCPoP feature. 1096 1097 The feature is detected at runtime, and the kernel will use DC CVAC 1098 operations if DC CVAP is not supported (following the behaviour of 1099 DC CVAP itself if the system does not define a point of persistence). 1100 1101config ARM64_RAS_EXTN 1102 bool "Enable support for RAS CPU Extensions" 1103 default y 1104 help 1105 CPUs that support the Reliability, Availability and Serviceability 1106 (RAS) Extensions, part of ARMv8.2 are able to track faults and 1107 errors, classify them and report them to software. 1108 1109 On CPUs with these extensions system software can use additional 1110 barriers to determine if faults are pending and read the 1111 classification from a new set of registers. 1112 1113 Selecting this feature will allow the kernel to use these barriers 1114 and access the new registers if the system supports the extension. 1115 Platform RAS features may additionally depend on firmware support. 1116 1117endmenu 1118 1119config ARM64_SVE 1120 bool "ARM Scalable Vector Extension support" 1121 default y 1122 help 1123 The Scalable Vector Extension (SVE) is an extension to the AArch64 1124 execution state which complements and extends the SIMD functionality 1125 of the base architecture to support much larger vectors and to enable 1126 additional vectorisation opportunities. 1127 1128 To enable use of this extension on CPUs that implement it, say Y. 1129 1130 Note that for architectural reasons, firmware _must_ implement SVE 1131 support when running on SVE capable hardware. The required support 1132 is present in: 1133 1134 * version 1.5 and later of the ARM Trusted Firmware 1135 * the AArch64 boot wrapper since commit 5e1261e08abf 1136 ("bootwrapper: SVE: Enable SVE for EL2 and below"). 1137 1138 For other firmware implementations, consult the firmware documentation 1139 or vendor. 1140 1141 If you need the kernel to boot on SVE-capable hardware with broken 1142 firmware, you may need to say N here until you get your firmware 1143 fixed. Otherwise, you may experience firmware panics or lockups when 1144 booting the kernel. If unsure and you are not observing these 1145 symptoms, you should assume that it is safe to say Y. 1146 1147config ARM64_MODULE_PLTS 1148 bool 1149 select HAVE_MOD_ARCH_SPECIFIC 1150 1151config RELOCATABLE 1152 bool 1153 help 1154 This builds the kernel as a Position Independent Executable (PIE), 1155 which retains all relocation metadata required to relocate the 1156 kernel binary at runtime to a different virtual address than the 1157 address it was linked at. 1158 Since AArch64 uses the RELA relocation format, this requires a 1159 relocation pass at runtime even if the kernel is loaded at the 1160 same address it was linked at. 1161 1162config RANDOMIZE_BASE 1163 bool "Randomize the address of the kernel image" 1164 select ARM64_MODULE_PLTS if MODULES 1165 select RELOCATABLE 1166 help 1167 Randomizes the virtual address at which the kernel image is 1168 loaded, as a security feature that deters exploit attempts 1169 relying on knowledge of the location of kernel internals. 1170 1171 It is the bootloader's job to provide entropy, by passing a 1172 random u64 value in /chosen/kaslr-seed at kernel entry. 1173 1174 When booting via the UEFI stub, it will invoke the firmware's 1175 EFI_RNG_PROTOCOL implementation (if available) to supply entropy 1176 to the kernel proper. In addition, it will randomise the physical 1177 location of the kernel Image as well. 1178 1179 If unsure, say N. 1180 1181config RANDOMIZE_MODULE_REGION_FULL 1182 bool "Randomize the module region over a 4 GB range" 1183 depends on RANDOMIZE_BASE 1184 default y 1185 help 1186 Randomizes the location of the module region inside a 4 GB window 1187 covering the core kernel. This way, it is less likely for modules 1188 to leak information about the location of core kernel data structures 1189 but it does imply that function calls between modules and the core 1190 kernel will need to be resolved via veneers in the module PLT. 1191 1192 When this option is not set, the module region will be randomized over 1193 a limited range that contains the [_stext, _etext] interval of the 1194 core kernel, so branch relocations are always in range. 1195 1196endmenu 1197 1198menu "Boot options" 1199 1200config ARM64_ACPI_PARKING_PROTOCOL 1201 bool "Enable support for the ARM64 ACPI parking protocol" 1202 depends on ACPI 1203 help 1204 Enable support for the ARM64 ACPI parking protocol. If disabled 1205 the kernel will not allow booting through the ARM64 ACPI parking 1206 protocol even if the corresponding data is present in the ACPI 1207 MADT table. 1208 1209config CMDLINE 1210 string "Default kernel command string" 1211 default "" 1212 help 1213 Provide a set of default command-line options at build time by 1214 entering them here. As a minimum, you should specify the the 1215 root device (e.g. root=/dev/nfs). 1216 1217config CMDLINE_FORCE 1218 bool "Always use the default kernel command string" 1219 help 1220 Always use the default kernel command string, even if the boot 1221 loader passes other arguments to the kernel. 1222 This is useful if you cannot or don't want to change the 1223 command-line options your boot loader passes to the kernel. 1224 1225config EFI_STUB 1226 bool 1227 1228config EFI 1229 bool "UEFI runtime support" 1230 depends on OF && !CPU_BIG_ENDIAN 1231 depends on KERNEL_MODE_NEON 1232 select LIBFDT 1233 select UCS2_STRING 1234 select EFI_PARAMS_FROM_FDT 1235 select EFI_RUNTIME_WRAPPERS 1236 select EFI_STUB 1237 select EFI_ARMSTUB 1238 default y 1239 help 1240 This option provides support for runtime services provided 1241 by UEFI firmware (such as non-volatile variables, realtime 1242 clock, and platform reset). A UEFI stub is also provided to 1243 allow the kernel to be booted as an EFI application. This 1244 is only useful on systems that have UEFI firmware. 1245 1246config DMI 1247 bool "Enable support for SMBIOS (DMI) tables" 1248 depends on EFI 1249 default y 1250 help 1251 This enables SMBIOS/DMI feature for systems. 1252 1253 This option is only useful on systems that have UEFI firmware. 1254 However, even with this option, the resultant kernel should 1255 continue to boot on existing non-UEFI platforms. 1256 1257endmenu 1258 1259menu "Userspace binary formats" 1260 1261source "fs/Kconfig.binfmt" 1262 1263config COMPAT 1264 bool "Kernel support for 32-bit EL0" 1265 depends on ARM64_4K_PAGES || EXPERT 1266 select COMPAT_BINFMT_ELF if BINFMT_ELF 1267 select HAVE_UID16 1268 select OLD_SIGSUSPEND3 1269 select COMPAT_OLD_SIGACTION 1270 help 1271 This option enables support for a 32-bit EL0 running under a 64-bit 1272 kernel at EL1. AArch32-specific components such as system calls, 1273 the user helper functions, VFP support and the ptrace interface are 1274 handled appropriately by the kernel. 1275 1276 If you use a page size other than 4KB (i.e, 16KB or 64KB), please be aware 1277 that you will only be able to execute AArch32 binaries that were compiled 1278 with page size aligned segments. 1279 1280 If you want to execute 32-bit userspace applications, say Y. 1281 1282config SYSVIPC_COMPAT 1283 def_bool y 1284 depends on COMPAT && SYSVIPC 1285 1286endmenu 1287 1288menu "Power management options" 1289 1290source "kernel/power/Kconfig" 1291 1292config ARCH_HIBERNATION_POSSIBLE 1293 def_bool y 1294 depends on CPU_PM 1295 1296config ARCH_HIBERNATION_HEADER 1297 def_bool y 1298 depends on HIBERNATION 1299 1300config ARCH_SUSPEND_POSSIBLE 1301 def_bool y 1302 1303endmenu 1304 1305menu "CPU Power Management" 1306 1307source "drivers/cpuidle/Kconfig" 1308 1309source "drivers/cpufreq/Kconfig" 1310 1311endmenu 1312 1313source "net/Kconfig" 1314 1315source "drivers/Kconfig" 1316 1317source "drivers/firmware/Kconfig" 1318 1319source "drivers/acpi/Kconfig" 1320 1321source "fs/Kconfig" 1322 1323source "arch/arm64/kvm/Kconfig" 1324 1325source "arch/arm64/Kconfig.debug" 1326 1327source "security/Kconfig" 1328 1329source "crypto/Kconfig" 1330if CRYPTO 1331source "arch/arm64/crypto/Kconfig" 1332endif 1333 1334source "lib/Kconfig" 1335