arm64, numa: Add NUMA support for arm64 platforms.
[linux-2.6-block.git] / arch / arm64 / Kconfig
CommitLineData
8c2c3df3
CM
1config ARM64
2 def_bool y
b6197b93 3 select ACPI_CCA_REQUIRED if ACPI
d8f4f161 4 select ACPI_GENERIC_GSI if ACPI
6933de0c 5 select ACPI_REDUCED_HARDWARE_ONLY if ACPI
21266be9 6 select ARCH_HAS_DEVMEM_IS_ALLOWED
8c2c3df3 7 select ARCH_HAS_ATOMIC64_DEC_IF_POSITIVE
2b68f6ca 8 select ARCH_HAS_ELF_RANDOMIZE
957e3fac 9 select ARCH_HAS_GCOV_PROFILE_ALL
308c09f1 10 select ARCH_HAS_SG_CHAIN
1f85008e 11 select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST
c63c8700 12 select ARCH_USE_CMPXCHG_LOCKREF
4badad35 13 select ARCH_SUPPORTS_ATOMIC_RMW
9170100e 14 select ARCH_WANT_OPTIONAL_GPIOLIB
6212a512 15 select ARCH_WANT_COMPAT_IPC_PARSE_VERSION
b6f35981 16 select ARCH_WANT_FRAME_POINTERS
f0b7f8a4 17 select ARCH_HAS_UBSAN_SANITIZE_ALL
25c92a37 18 select ARM_AMBA
1aee5d7a 19 select ARM_ARCH_TIMER
c4188edc 20 select ARM_GIC
875cbf3e 21 select AUDIT_ARCH_COMPAT_GENERIC
853a33ce 22 select ARM_GIC_V2M if PCI_MSI
021f6537 23 select ARM_GIC_V3
19812729 24 select ARM_GIC_V3_ITS if PCI_MSI
bff60792 25 select ARM_PSCI_FW
adace895 26 select BUILDTIME_EXTABLE_SORT
db2789b5 27 select CLONE_BACKWARDS
7ca2ef33 28 select COMMON_CLK
166936ba 29 select CPU_PM if (SUSPEND || CPU_IDLE)
7bc13fd3 30 select DCACHE_WORD_ACCESS
ef37566c 31 select EDAC_SUPPORT
2f34f173 32 select FRAME_POINTER
d4932f9e 33 select GENERIC_ALLOCATOR
8c2c3df3 34 select GENERIC_CLOCKEVENTS
4b3dc967 35 select GENERIC_CLOCKEVENTS_BROADCAST
3be1a5c4 36 select GENERIC_CPU_AUTOPROBE
bf4b558e 37 select GENERIC_EARLY_IOREMAP
2314ee4d 38 select GENERIC_IDLE_POLL_SETUP
8c2c3df3
CM
39 select GENERIC_IRQ_PROBE
40 select GENERIC_IRQ_SHOW
6544e67b 41 select GENERIC_IRQ_SHOW_LEVEL
cb61f676 42 select GENERIC_PCI_IOMAP
65cd4f6c 43 select GENERIC_SCHED_CLOCK
8c2c3df3 44 select GENERIC_SMP_IDLE_THREAD
12a0ef7b
WD
45 select GENERIC_STRNCPY_FROM_USER
46 select GENERIC_STRNLEN_USER
8c2c3df3 47 select GENERIC_TIME_VSYSCALL
a1ddc74a 48 select HANDLE_DOMAIN_IRQ
8c2c3df3 49 select HARDIRQS_SW_RESEND
5284e1b4 50 select HAVE_ALIGNED_STRUCT_PAGE if SLUB
875cbf3e 51 select HAVE_ARCH_AUDITSYSCALL
8e7a4cef 52 select HAVE_ARCH_BITREVERSE
324420bf 53 select HAVE_ARCH_HUGE_VMAP
9732cafd 54 select HAVE_ARCH_JUMP_LABEL
f1b9032f 55 select HAVE_ARCH_KASAN if SPARSEMEM_VMEMMAP && !(ARM64_16K_PAGES && ARM64_VA_BITS_48)
9529247d 56 select HAVE_ARCH_KGDB
8f0d3aa9
DC
57 select HAVE_ARCH_MMAP_RND_BITS
58 select HAVE_ARCH_MMAP_RND_COMPAT_BITS if COMPAT
a1ae65b2 59 select HAVE_ARCH_SECCOMP_FILTER
8c2c3df3 60 select HAVE_ARCH_TRACEHOOK
e54bcde3 61 select HAVE_BPF_JIT
af64d2aa 62 select HAVE_C_RECORDMCOUNT
c0c264ae 63 select HAVE_CC_STACKPROTECTOR
5284e1b4 64 select HAVE_CMPXCHG_DOUBLE
95eff6b2 65 select HAVE_CMPXCHG_LOCAL
9b2a60c4 66 select HAVE_DEBUG_BUGVERBOSE
b69ec42b 67 select HAVE_DEBUG_KMEMLEAK
8c2c3df3 68 select HAVE_DMA_API_DEBUG
6ac2104d 69 select HAVE_DMA_CONTIGUOUS
bd7d38db 70 select HAVE_DYNAMIC_FTRACE
50afc33a 71 select HAVE_EFFICIENT_UNALIGNED_ACCESS
af64d2aa 72 select HAVE_FTRACE_MCOUNT_RECORD
819e50e2
AT
73 select HAVE_FUNCTION_TRACER
74 select HAVE_FUNCTION_GRAPH_TRACER
8c2c3df3 75 select HAVE_GENERIC_DMA_COHERENT
8c2c3df3 76 select HAVE_HW_BREAKPOINT if PERF_EVENTS
24da208d 77 select HAVE_IRQ_TIME_ACCOUNTING
8c2c3df3 78 select HAVE_MEMBLOCK
1a2db300 79 select HAVE_MEMBLOCK_NODE_MAP if NUMA
55834a77 80 select HAVE_PATA_PLATFORM
8c2c3df3 81 select HAVE_PERF_EVENTS
2ee0d7fd
JP
82 select HAVE_PERF_REGS
83 select HAVE_PERF_USER_STACK_DUMP
5e5f6dc1 84 select HAVE_RCU_TABLE_FREE
055b1212 85 select HAVE_SYSCALL_TRACEPOINTS
876945db 86 select IOMMU_DMA if IOMMU_SUPPORT
8c2c3df3 87 select IRQ_DOMAIN
e8557d1f 88 select IRQ_FORCED_THREADING
fea2acaa 89 select MODULES_USE_ELF_RELA
8c2c3df3
CM
90 select NO_BOOTMEM
91 select OF
92 select OF_EARLY_FLATTREE
9bf14b7c 93 select OF_RESERVED_MEM
8c2c3df3 94 select PERF_USE_VMALLOC
aa1e8ec1
CM
95 select POWER_RESET
96 select POWER_SUPPLY
8c2c3df3
CM
97 select RTC_LIB
98 select SPARSE_IRQ
7ac57a89 99 select SYSCTL_EXCEPTION_TRACE
6c81fe79 100 select HAVE_CONTEXT_TRACKING
14457459 101 select HAVE_ARM_SMCCC
1a2db300 102 select OF_NUMA if NUMA && OF
8c2c3df3
CM
103 help
104 ARM 64-bit (AArch64) Linux support.
105
106config 64BIT
107 def_bool y
108
109config ARCH_PHYS_ADDR_T_64BIT
110 def_bool y
111
112config MMU
113 def_bool y
114
8f0d3aa9
DC
115config ARCH_MMAP_RND_BITS_MIN
116 default 14 if ARM64_64K_PAGES
117 default 16 if ARM64_16K_PAGES
118 default 18
119
120# max bits determined by the following formula:
121# VA_BITS - PAGE_SHIFT - 3
122config ARCH_MMAP_RND_BITS_MAX
123 default 19 if ARM64_VA_BITS=36
124 default 24 if ARM64_VA_BITS=39
125 default 27 if ARM64_VA_BITS=42
126 default 30 if ARM64_VA_BITS=47
127 default 29 if ARM64_VA_BITS=48 && ARM64_64K_PAGES
128 default 31 if ARM64_VA_BITS=48 && ARM64_16K_PAGES
129 default 33 if ARM64_VA_BITS=48
130 default 14 if ARM64_64K_PAGES
131 default 16 if ARM64_16K_PAGES
132 default 18
133
134config ARCH_MMAP_RND_COMPAT_BITS_MIN
135 default 7 if ARM64_64K_PAGES
136 default 9 if ARM64_16K_PAGES
137 default 11
138
139config ARCH_MMAP_RND_COMPAT_BITS_MAX
140 default 16
141
ce816fa8 142config NO_IOPORT_MAP
d1e6dc91 143 def_bool y if !PCI
8c2c3df3
CM
144
145config STACKTRACE_SUPPORT
146 def_bool y
147
bf0c4e04
JVS
148config ILLEGAL_POINTER_VALUE
149 hex
150 default 0xdead000000000000
151
8c2c3df3
CM
152config LOCKDEP_SUPPORT
153 def_bool y
154
155config TRACE_IRQFLAGS_SUPPORT
156 def_bool y
157
c209f799 158config RWSEM_XCHGADD_ALGORITHM
8c2c3df3
CM
159 def_bool y
160
9fb7410f
DM
161config GENERIC_BUG
162 def_bool y
163 depends on BUG
164
165config GENERIC_BUG_RELATIVE_POINTERS
166 def_bool y
167 depends on GENERIC_BUG
168
8c2c3df3
CM
169config GENERIC_HWEIGHT
170 def_bool y
171
172config GENERIC_CSUM
173 def_bool y
174
175config GENERIC_CALIBRATE_DELAY
176 def_bool y
177
19e7640d 178config ZONE_DMA
8c2c3df3
CM
179 def_bool y
180
29e56940
SC
181config HAVE_GENERIC_RCU_GUP
182 def_bool y
183
8c2c3df3
CM
184config ARCH_DMA_ADDR_T_64BIT
185 def_bool y
186
187config NEED_DMA_MAP_STATE
188 def_bool y
189
190config NEED_SG_DMA_LENGTH
191 def_bool y
192
4b3dc967
WD
193config SMP
194 def_bool y
195
8c2c3df3
CM
196config SWIOTLB
197 def_bool y
198
199config IOMMU_HELPER
200 def_bool SWIOTLB
201
4cfb3613
AB
202config KERNEL_MODE_NEON
203 def_bool y
204
92cc15fc
RH
205config FIX_EARLYCON_MEM
206 def_bool y
207
9f25e6ad
KS
208config PGTABLE_LEVELS
209 int
21539939 210 default 2 if ARM64_16K_PAGES && ARM64_VA_BITS_36
9f25e6ad
KS
211 default 2 if ARM64_64K_PAGES && ARM64_VA_BITS_42
212 default 3 if ARM64_64K_PAGES && ARM64_VA_BITS_48
213 default 3 if ARM64_4K_PAGES && ARM64_VA_BITS_39
44eaacf1
SP
214 default 3 if ARM64_16K_PAGES && ARM64_VA_BITS_47
215 default 4 if !ARM64_64K_PAGES && ARM64_VA_BITS_48
9f25e6ad 216
8c2c3df3
CM
217source "init/Kconfig"
218
219source "kernel/Kconfig.freezer"
220
6a377491 221source "arch/arm64/Kconfig.platforms"
8c2c3df3
CM
222
223menu "Bus support"
224
d1e6dc91
LD
225config PCI
226 bool "PCI support"
227 help
228 This feature enables support for PCI bus system. If you say Y
229 here, the kernel will include drivers and infrastructure code
230 to support PCI bus devices.
231
232config PCI_DOMAINS
233 def_bool PCI
234
235config PCI_DOMAINS_GENERIC
236 def_bool PCI
237
238config PCI_SYSCALL
239 def_bool PCI
240
241source "drivers/pci/Kconfig"
d1e6dc91 242
8c2c3df3
CM
243endmenu
244
245menu "Kernel Features"
246
c0a01b84
AP
247menu "ARM errata workarounds via the alternatives framework"
248
249config ARM64_ERRATUM_826319
250 bool "Cortex-A53: 826319: System might deadlock if a write cannot complete until read data is accepted"
251 default y
252 help
253 This option adds an alternative code sequence to work around ARM
254 erratum 826319 on Cortex-A53 parts up to r0p2 with an AMBA 4 ACE or
255 AXI master interface and an L2 cache.
256
257 If a Cortex-A53 uses an AMBA AXI4 ACE interface to other processors
258 and is unable to accept a certain write via this interface, it will
259 not progress on read data presented on the read data channel and the
260 system can deadlock.
261
262 The workaround promotes data cache clean instructions to
263 data cache clean-and-invalidate.
264 Please note that this does not necessarily enable the workaround,
265 as it depends on the alternative framework, which will only patch
266 the kernel if an affected CPU is detected.
267
268 If unsure, say Y.
269
270config ARM64_ERRATUM_827319
271 bool "Cortex-A53: 827319: Data cache clean instructions might cause overlapping transactions to the interconnect"
272 default y
273 help
274 This option adds an alternative code sequence to work around ARM
275 erratum 827319 on Cortex-A53 parts up to r0p2 with an AMBA 5 CHI
276 master interface and an L2 cache.
277
278 Under certain conditions this erratum can cause a clean line eviction
279 to occur at the same time as another transaction to the same address
280 on the AMBA 5 CHI interface, which can cause data corruption if the
281 interconnect reorders the two transactions.
282
283 The workaround promotes data cache clean instructions to
284 data cache clean-and-invalidate.
285 Please note that this does not necessarily enable the workaround,
286 as it depends on the alternative framework, which will only patch
287 the kernel if an affected CPU is detected.
288
289 If unsure, say Y.
290
291config ARM64_ERRATUM_824069
292 bool "Cortex-A53: 824069: Cache line might not be marked as clean after a CleanShared snoop"
293 default y
294 help
295 This option adds an alternative code sequence to work around ARM
296 erratum 824069 on Cortex-A53 parts up to r0p2 when it is connected
297 to a coherent interconnect.
298
299 If a Cortex-A53 processor is executing a store or prefetch for
300 write instruction at the same time as a processor in another
301 cluster is executing a cache maintenance operation to the same
302 address, then this erratum might cause a clean cache line to be
303 incorrectly marked as dirty.
304
305 The workaround promotes data cache clean instructions to
306 data cache clean-and-invalidate.
307 Please note that this option does not necessarily enable the
308 workaround, as it depends on the alternative framework, which will
309 only patch the kernel if an affected CPU is detected.
310
311 If unsure, say Y.
312
313config ARM64_ERRATUM_819472
314 bool "Cortex-A53: 819472: Store exclusive instructions might cause data corruption"
315 default y
316 help
317 This option adds an alternative code sequence to work around ARM
318 erratum 819472 on Cortex-A53 parts up to r0p1 with an L2 cache
319 present when it is connected to a coherent interconnect.
320
321 If the processor is executing a load and store exclusive sequence at
322 the same time as a processor in another cluster is executing a cache
323 maintenance operation to the same address, then this erratum might
324 cause data corruption.
325
326 The workaround promotes data cache clean instructions to
327 data cache clean-and-invalidate.
328 Please note that this does not necessarily enable the workaround,
329 as it depends on the alternative framework, which will only patch
330 the kernel if an affected CPU is detected.
331
332 If unsure, say Y.
333
334config ARM64_ERRATUM_832075
335 bool "Cortex-A57: 832075: possible deadlock on mixing exclusive memory accesses with device loads"
336 default y
337 help
338 This option adds an alternative code sequence to work around ARM
339 erratum 832075 on Cortex-A57 parts up to r1p2.
340
341 Affected Cortex-A57 parts might deadlock when exclusive load/store
342 instructions to Write-Back memory are mixed with Device loads.
343
344 The workaround is to promote device loads to use Load-Acquire
345 semantics.
346 Please note that this does not necessarily enable the workaround,
498cd5c3
MZ
347 as it depends on the alternative framework, which will only patch
348 the kernel if an affected CPU is detected.
349
350 If unsure, say Y.
351
352config ARM64_ERRATUM_834220
353 bool "Cortex-A57: 834220: Stage 2 translation fault might be incorrectly reported in presence of a Stage 1 fault"
354 depends on KVM
355 default y
356 help
357 This option adds an alternative code sequence to work around ARM
358 erratum 834220 on Cortex-A57 parts up to r1p2.
359
360 Affected Cortex-A57 parts might report a Stage 2 translation
361 fault as the result of a Stage 1 fault for load crossing a
362 page boundary when there is a permission or device memory
363 alignment fault at Stage 1 and a translation fault at Stage 2.
364
365 The workaround is to verify that the Stage 1 translation
366 doesn't generate a fault before handling the Stage 2 fault.
367 Please note that this does not necessarily enable the workaround,
c0a01b84
AP
368 as it depends on the alternative framework, which will only patch
369 the kernel if an affected CPU is detected.
370
371 If unsure, say Y.
372
905e8c5d
WD
373config ARM64_ERRATUM_845719
374 bool "Cortex-A53: 845719: a load might read incorrect data"
375 depends on COMPAT
376 default y
377 help
378 This option adds an alternative code sequence to work around ARM
379 erratum 845719 on Cortex-A53 parts up to r0p4.
380
381 When running a compat (AArch32) userspace on an affected Cortex-A53
382 part, a load at EL0 from a virtual address that matches the bottom 32
383 bits of the virtual address used by a recent load at (AArch64) EL1
384 might return incorrect data.
385
386 The workaround is to write the contextidr_el1 register on exception
387 return to a 32-bit task.
388 Please note that this does not necessarily enable the workaround,
389 as it depends on the alternative framework, which will only patch
390 the kernel if an affected CPU is detected.
391
392 If unsure, say Y.
393
df057cc7
WD
394config ARM64_ERRATUM_843419
395 bool "Cortex-A53: 843419: A load or store might access an incorrect address"
396 depends on MODULES
397 default y
fd045f6c 398 select ARM64_MODULE_CMODEL_LARGE
df057cc7
WD
399 help
400 This option builds kernel modules using the large memory model in
401 order to avoid the use of the ADRP instruction, which can cause
402 a subsequent memory access to use an incorrect address on Cortex-A53
403 parts up to r0p4.
404
405 Note that the kernel itself must be linked with a version of ld
406 which fixes potentially affected ADRP instructions through the
407 use of veneers.
408
409 If unsure, say Y.
410
94100970
RR
411config CAVIUM_ERRATUM_22375
412 bool "Cavium erratum 22375, 24313"
413 default y
414 help
415 Enable workaround for erratum 22375, 24313.
416
417 This implements two gicv3-its errata workarounds for ThunderX. Both
418 with small impact affecting only ITS table allocation.
419
420 erratum 22375: only alloc 8MB table size
421 erratum 24313: ignore memory access type
422
423 The fixes are in ITS initialization and basically ignore memory access
424 type and table size provided by the TYPER and BASER registers.
425
426 If unsure, say Y.
427
6d4e11c5
RR
428config CAVIUM_ERRATUM_23154
429 bool "Cavium erratum 23154: Access to ICC_IAR1_EL1 is not sync'ed"
430 default y
431 help
432 The gicv3 of ThunderX requires a modified version for
433 reading the IAR status to ensure data synchronization
434 (access to icc_iar1_el1 is not sync'ed before and after).
435
436 If unsure, say Y.
437
104a0c02
AP
438config CAVIUM_ERRATUM_27456
439 bool "Cavium erratum 27456: Broadcast TLBI instructions may cause icache corruption"
440 default y
441 help
442 On ThunderX T88 pass 1.x through 2.1 parts, broadcast TLBI
443 instructions may cause the icache to become corrupted if it
444 contains data for a non-current ASID. The fix is to
445 invalidate the icache when changing the mm context.
446
447 If unsure, say Y.
448
c0a01b84
AP
449endmenu
450
451
e41ceed0
JL
452choice
453 prompt "Page size"
454 default ARM64_4K_PAGES
455 help
456 Page size (translation granule) configuration.
457
458config ARM64_4K_PAGES
459 bool "4KB"
460 help
461 This feature enables 4KB pages support.
462
44eaacf1
SP
463config ARM64_16K_PAGES
464 bool "16KB"
465 help
466 The system will use 16KB pages support. AArch32 emulation
467 requires applications compiled with 16K (or a multiple of 16K)
468 aligned segments.
469
8c2c3df3 470config ARM64_64K_PAGES
e41ceed0 471 bool "64KB"
8c2c3df3
CM
472 help
473 This feature enables 64KB pages support (4KB by default)
474 allowing only two levels of page tables and faster TLB
db488be3
SP
475 look-up. AArch32 emulation requires applications compiled
476 with 64K aligned segments.
8c2c3df3 477
e41ceed0
JL
478endchoice
479
480choice
481 prompt "Virtual address space size"
482 default ARM64_VA_BITS_39 if ARM64_4K_PAGES
44eaacf1 483 default ARM64_VA_BITS_47 if ARM64_16K_PAGES
e41ceed0
JL
484 default ARM64_VA_BITS_42 if ARM64_64K_PAGES
485 help
486 Allows choosing one of multiple possible virtual address
487 space sizes. The level of translation table is determined by
488 a combination of page size and virtual address space size.
489
21539939 490config ARM64_VA_BITS_36
56a3f30e 491 bool "36-bit" if EXPERT
21539939
SP
492 depends on ARM64_16K_PAGES
493
e41ceed0
JL
494config ARM64_VA_BITS_39
495 bool "39-bit"
496 depends on ARM64_4K_PAGES
497
498config ARM64_VA_BITS_42
499 bool "42-bit"
500 depends on ARM64_64K_PAGES
501
44eaacf1
SP
502config ARM64_VA_BITS_47
503 bool "47-bit"
504 depends on ARM64_16K_PAGES
505
c79b954b
JL
506config ARM64_VA_BITS_48
507 bool "48-bit"
c79b954b 508
e41ceed0
JL
509endchoice
510
511config ARM64_VA_BITS
512 int
21539939 513 default 36 if ARM64_VA_BITS_36
e41ceed0
JL
514 default 39 if ARM64_VA_BITS_39
515 default 42 if ARM64_VA_BITS_42
44eaacf1 516 default 47 if ARM64_VA_BITS_47
c79b954b 517 default 48 if ARM64_VA_BITS_48
e41ceed0 518
a872013d
WD
519config CPU_BIG_ENDIAN
520 bool "Build big-endian kernel"
521 help
522 Say Y if you plan on running a kernel in big-endian mode.
523
f6e763b9
MB
524config SCHED_MC
525 bool "Multi-core scheduler support"
f6e763b9
MB
526 help
527 Multi-core scheduler support improves the CPU scheduler's decision
528 making when dealing with multi-core CPU chips at a cost of slightly
529 increased overhead in some places. If unsure say N here.
530
531config SCHED_SMT
532 bool "SMT scheduler support"
f6e763b9
MB
533 help
534 Improves the CPU scheduler's decision making when dealing with
535 MultiThreading at a cost of slightly increased overhead in some
536 places. If unsure say N here.
537
8c2c3df3 538config NR_CPUS
62aa9655
GK
539 int "Maximum number of CPUs (2-4096)"
540 range 2 4096
15942853 541 # These have to remain sorted largest to smallest
e3672649 542 default "64"
8c2c3df3 543
9327e2c6
MR
544config HOTPLUG_CPU
545 bool "Support for hot-pluggable CPUs"
217d453d 546 select GENERIC_IRQ_MIGRATION
9327e2c6
MR
547 help
548 Say Y here to experiment with turning CPUs off and on. CPUs
549 can be controlled through /sys/devices/system/cpu.
550
1a2db300
GK
551# Common NUMA Features
552config NUMA
553 bool "Numa Memory Allocation and Scheduler Support"
554 depends on SMP
555 help
556 Enable NUMA (Non Uniform Memory Access) support.
557
558 The kernel will try to allocate memory used by a CPU on the
559 local memory of the CPU and add some more
560 NUMA awareness to the kernel.
561
562config NODES_SHIFT
563 int "Maximum NUMA Nodes (as a power of 2)"
564 range 1 10
565 default "2"
566 depends on NEED_MULTIPLE_NODES
567 help
568 Specify the maximum number of NUMA Nodes available on the target
569 system. Increases memory reserved to accommodate various tables.
570
571config USE_PERCPU_NUMA_NODE_ID
572 def_bool y
573 depends on NUMA
574
8c2c3df3 575source kernel/Kconfig.preempt
f90df5e2 576source kernel/Kconfig.hz
8c2c3df3 577
83863f25
LA
578config ARCH_SUPPORTS_DEBUG_PAGEALLOC
579 def_bool y
580
8c2c3df3
CM
581config ARCH_HAS_HOLES_MEMORYMODEL
582 def_bool y if SPARSEMEM
583
584config ARCH_SPARSEMEM_ENABLE
585 def_bool y
586 select SPARSEMEM_VMEMMAP_ENABLE
587
588config ARCH_SPARSEMEM_DEFAULT
589 def_bool ARCH_SPARSEMEM_ENABLE
590
591config ARCH_SELECT_MEMORY_MODEL
592 def_bool ARCH_SPARSEMEM_ENABLE
593
594config HAVE_ARCH_PFN_VALID
595 def_bool ARCH_HAS_HOLES_MEMORYMODEL || !SPARSEMEM
596
597config HW_PERF_EVENTS
6475b2d8
MR
598 def_bool y
599 depends on ARM_PMU
8c2c3df3 600
084bd298
SC
601config SYS_SUPPORTS_HUGETLBFS
602 def_bool y
603
084bd298 604config ARCH_WANT_HUGE_PMD_SHARE
21539939 605 def_bool y if ARM64_4K_PAGES || (ARM64_16K_PAGES && !ARM64_VA_BITS_36)
084bd298 606
af074848
SC
607config HAVE_ARCH_TRANSPARENT_HUGEPAGE
608 def_bool y
609
a41dc0e8
CM
610config ARCH_HAS_CACHE_LINE_SIZE
611 def_bool y
612
8c2c3df3
CM
613source "mm/Kconfig"
614
a1ae65b2
AT
615config SECCOMP
616 bool "Enable seccomp to safely compute untrusted bytecode"
617 ---help---
618 This kernel feature is useful for number crunching applications
619 that may need to compute untrusted bytecode during their
620 execution. By using pipes or other transports made available to
621 the process as file descriptors supporting the read/write
622 syscalls, it's possible to isolate those applications in
623 their own address space using seccomp. Once seccomp is
624 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
625 and the task is only allowed to execute a few safe syscalls
626 defined by each seccomp mode.
627
dfd57bc3
SS
628config PARAVIRT
629 bool "Enable paravirtualization code"
630 help
631 This changes the kernel so it can modify itself when it is run
632 under a hypervisor, potentially improving performance significantly
633 over full virtualization.
634
635config PARAVIRT_TIME_ACCOUNTING
636 bool "Paravirtual steal time accounting"
637 select PARAVIRT
638 default n
639 help
640 Select this option to enable fine granularity task steal time
641 accounting. Time spent executing other tasks in parallel with
642 the current vCPU is discounted from the vCPU power. To account for
643 that, there can be a small performance impact.
644
645 If in doubt, say N here.
646
aa42aa13
SS
647config XEN_DOM0
648 def_bool y
649 depends on XEN
650
651config XEN
c2ba1f7d 652 bool "Xen guest support on ARM64"
aa42aa13 653 depends on ARM64 && OF
83862ccf 654 select SWIOTLB_XEN
dfd57bc3 655 select PARAVIRT
aa42aa13
SS
656 help
657 Say Y if you want to run Linux in a Virtual Machine on Xen on ARM64.
658
d03bb145
SC
659config FORCE_MAX_ZONEORDER
660 int
661 default "14" if (ARM64_64K_PAGES && TRANSPARENT_HUGEPAGE)
44eaacf1 662 default "12" if (ARM64_16K_PAGES && TRANSPARENT_HUGEPAGE)
d03bb145 663 default "11"
44eaacf1
SP
664 help
665 The kernel memory allocator divides physically contiguous memory
666 blocks into "zones", where each zone is a power of two number of
667 pages. This option selects the largest power of two that the kernel
668 keeps in the memory allocator. If you need to allocate very large
669 blocks of physically contiguous memory, then you may need to
670 increase this value.
671
672 This config option is actually maximum order plus one. For example,
673 a value of 11 means that the largest free memory block is 2^10 pages.
674
675 We make sure that we can allocate upto a HugePage size for each configuration.
676 Hence we have :
677 MAX_ORDER = (PMD_SHIFT - PAGE_SHIFT) + 1 => PAGE_SHIFT - 2
678
679 However for 4K, we choose a higher default value, 11 as opposed to 10, giving us
680 4M allocations matching the default size used by generic code.
d03bb145 681
1b907f46
WD
682menuconfig ARMV8_DEPRECATED
683 bool "Emulate deprecated/obsolete ARMv8 instructions"
684 depends on COMPAT
685 help
686 Legacy software support may require certain instructions
687 that have been deprecated or obsoleted in the architecture.
688
689 Enable this config to enable selective emulation of these
690 features.
691
692 If unsure, say Y
693
694if ARMV8_DEPRECATED
695
696config SWP_EMULATION
697 bool "Emulate SWP/SWPB instructions"
698 help
699 ARMv8 obsoletes the use of A32 SWP/SWPB instructions such that
700 they are always undefined. Say Y here to enable software
701 emulation of these instructions for userspace using LDXR/STXR.
702
703 In some older versions of glibc [<=2.8] SWP is used during futex
704 trylock() operations with the assumption that the code will not
705 be preempted. This invalid assumption may be more likely to fail
706 with SWP emulation enabled, leading to deadlock of the user
707 application.
708
709 NOTE: when accessing uncached shared regions, LDXR/STXR rely
710 on an external transaction monitoring block called a global
711 monitor to maintain update atomicity. If your system does not
712 implement a global monitor, this option can cause programs that
713 perform SWP operations to uncached memory to deadlock.
714
715 If unsure, say Y
716
717config CP15_BARRIER_EMULATION
718 bool "Emulate CP15 Barrier instructions"
719 help
720 The CP15 barrier instructions - CP15ISB, CP15DSB, and
721 CP15DMB - are deprecated in ARMv8 (and ARMv7). It is
722 strongly recommended to use the ISB, DSB, and DMB
723 instructions instead.
724
725 Say Y here to enable software emulation of these
726 instructions for AArch32 userspace code. When this option is
727 enabled, CP15 barrier usage is traced which can help
728 identify software that needs updating.
729
730 If unsure, say Y
731
2d888f48
SP
732config SETEND_EMULATION
733 bool "Emulate SETEND instruction"
734 help
735 The SETEND instruction alters the data-endianness of the
736 AArch32 EL0, and is deprecated in ARMv8.
737
738 Say Y here to enable software emulation of the instruction
739 for AArch32 userspace code.
740
741 Note: All the cpus on the system must have mixed endian support at EL0
742 for this feature to be enabled. If a new CPU - which doesn't support mixed
743 endian - is hotplugged in after this feature has been enabled, there could
744 be unexpected results in the applications.
745
746 If unsure, say Y
1b907f46
WD
747endif
748
0e4a0709
WD
749menu "ARMv8.1 architectural features"
750
751config ARM64_HW_AFDBM
752 bool "Support for hardware updates of the Access and Dirty page flags"
753 default y
754 help
755 The ARMv8.1 architecture extensions introduce support for
756 hardware updates of the access and dirty information in page
757 table entries. When enabled in TCR_EL1 (HA and HD bits) on
758 capable processors, accesses to pages with PTE_AF cleared will
759 set this bit instead of raising an access flag fault.
760 Similarly, writes to read-only pages with the DBM bit set will
761 clear the read-only bit (AP[2]) instead of raising a
762 permission fault.
763
764 Kernels built with this configuration option enabled continue
765 to work on pre-ARMv8.1 hardware and the performance impact is
766 minimal. If unsure, say Y.
767
768config ARM64_PAN
769 bool "Enable support for Privileged Access Never (PAN)"
770 default y
771 help
772 Privileged Access Never (PAN; part of the ARMv8.1 Extensions)
773 prevents the kernel or hypervisor from accessing user-space (EL0)
774 memory directly.
775
776 Choosing this option will cause any unprotected (not using
777 copy_to_user et al) memory access to fail with a permission fault.
778
779 The feature is detected at runtime, and will remain as a 'nop'
780 instruction if the cpu does not implement the feature.
781
782config ARM64_LSE_ATOMICS
783 bool "Atomic instructions"
784 help
785 As part of the Large System Extensions, ARMv8.1 introduces new
786 atomic instructions that are designed specifically to scale in
787 very large systems.
788
789 Say Y here to make use of these instructions for the in-kernel
790 atomic routines. This incurs a small overhead on CPUs that do
791 not support these instructions and requires the kernel to be
792 built with binutils >= 2.25.
793
1f364c8c
MZ
794config ARM64_VHE
795 bool "Enable support for Virtualization Host Extensions (VHE)"
796 default y
797 help
798 Virtualization Host Extensions (VHE) allow the kernel to run
799 directly at EL2 (instead of EL1) on processors that support
800 it. This leads to better performance for KVM, as they reduce
801 the cost of the world switch.
802
803 Selecting this option allows the VHE feature to be detected
804 at runtime, and does not affect processors that do not
805 implement this feature.
806
0e4a0709
WD
807endmenu
808
f993318b
WD
809menu "ARMv8.2 architectural features"
810
57f4959b
JM
811config ARM64_UAO
812 bool "Enable support for User Access Override (UAO)"
813 default y
814 help
815 User Access Override (UAO; part of the ARMv8.2 Extensions)
816 causes the 'unprivileged' variant of the load/store instructions to
817 be overriden to be privileged.
818
819 This option changes get_user() and friends to use the 'unprivileged'
820 variant of the load/store instructions. This ensures that user-space
821 really did have access to the supplied memory. When addr_limit is
822 set to kernel memory the UAO bit will be set, allowing privileged
823 access to kernel memory.
824
825 Choosing this option will cause copy_to_user() et al to use user-space
826 memory permissions.
827
828 The feature is detected at runtime, the kernel will use the
829 regular load/store instructions if the cpu does not implement the
830 feature.
831
f993318b
WD
832endmenu
833
fd045f6c
AB
834config ARM64_MODULE_CMODEL_LARGE
835 bool
836
837config ARM64_MODULE_PLTS
838 bool
839 select ARM64_MODULE_CMODEL_LARGE
840 select HAVE_MOD_ARCH_SPECIFIC
841
1e48ef7f
AB
842config RELOCATABLE
843 bool
844 help
845 This builds the kernel as a Position Independent Executable (PIE),
846 which retains all relocation metadata required to relocate the
847 kernel binary at runtime to a different virtual address than the
848 address it was linked at.
849 Since AArch64 uses the RELA relocation format, this requires a
850 relocation pass at runtime even if the kernel is loaded at the
851 same address it was linked at.
852
f80fb3a3
AB
853config RANDOMIZE_BASE
854 bool "Randomize the address of the kernel image"
855 select ARM64_MODULE_PLTS
856 select RELOCATABLE
857 help
858 Randomizes the virtual address at which the kernel image is
859 loaded, as a security feature that deters exploit attempts
860 relying on knowledge of the location of kernel internals.
861
862 It is the bootloader's job to provide entropy, by passing a
863 random u64 value in /chosen/kaslr-seed at kernel entry.
864
2b5fe07a
AB
865 When booting via the UEFI stub, it will invoke the firmware's
866 EFI_RNG_PROTOCOL implementation (if available) to supply entropy
867 to the kernel proper. In addition, it will randomise the physical
868 location of the kernel Image as well.
869
f80fb3a3
AB
870 If unsure, say N.
871
872config RANDOMIZE_MODULE_REGION_FULL
873 bool "Randomize the module region independently from the core kernel"
874 depends on RANDOMIZE_BASE
875 default y
876 help
877 Randomizes the location of the module region without considering the
878 location of the core kernel. This way, it is impossible for modules
879 to leak information about the location of core kernel data structures
880 but it does imply that function calls between modules and the core
881 kernel will need to be resolved via veneers in the module PLT.
882
883 When this option is not set, the module region will be randomized over
884 a limited range that contains the [_stext, _etext] interval of the
885 core kernel, so branch relocations are always in range.
886
8c2c3df3
CM
887endmenu
888
889menu "Boot options"
890
5e89c55e
LP
891config ARM64_ACPI_PARKING_PROTOCOL
892 bool "Enable support for the ARM64 ACPI parking protocol"
893 depends on ACPI
894 help
895 Enable support for the ARM64 ACPI parking protocol. If disabled
896 the kernel will not allow booting through the ARM64 ACPI parking
897 protocol even if the corresponding data is present in the ACPI
898 MADT table.
899
8c2c3df3
CM
900config CMDLINE
901 string "Default kernel command string"
902 default ""
903 help
904 Provide a set of default command-line options at build time by
905 entering them here. As a minimum, you should specify the the
906 root device (e.g. root=/dev/nfs).
907
908config CMDLINE_FORCE
909 bool "Always use the default kernel command string"
910 help
911 Always use the default kernel command string, even if the boot
912 loader passes other arguments to the kernel.
913 This is useful if you cannot or don't want to change the
914 command-line options your boot loader passes to the kernel.
915
f4f75ad5
AB
916config EFI_STUB
917 bool
918
f84d0275
MS
919config EFI
920 bool "UEFI runtime support"
921 depends on OF && !CPU_BIG_ENDIAN
922 select LIBFDT
923 select UCS2_STRING
924 select EFI_PARAMS_FROM_FDT
e15dd494 925 select EFI_RUNTIME_WRAPPERS
f4f75ad5
AB
926 select EFI_STUB
927 select EFI_ARMSTUB
f84d0275
MS
928 default y
929 help
930 This option provides support for runtime services provided
931 by UEFI firmware (such as non-volatile variables, realtime
3c7f2550
MS
932 clock, and platform reset). A UEFI stub is also provided to
933 allow the kernel to be booted as an EFI application. This
934 is only useful on systems that have UEFI firmware.
f84d0275 935
d1ae8c00
YL
936config DMI
937 bool "Enable support for SMBIOS (DMI) tables"
938 depends on EFI
939 default y
940 help
941 This enables SMBIOS/DMI feature for systems.
942
943 This option is only useful on systems that have UEFI firmware.
944 However, even with this option, the resultant kernel should
945 continue to boot on existing non-UEFI platforms.
946
8c2c3df3
CM
947endmenu
948
949menu "Userspace binary formats"
950
951source "fs/Kconfig.binfmt"
952
953config COMPAT
954 bool "Kernel support for 32-bit EL0"
755e70b7 955 depends on ARM64_4K_PAGES || EXPERT
8c2c3df3 956 select COMPAT_BINFMT_ELF
af1839eb 957 select HAVE_UID16
84b9e9b4 958 select OLD_SIGSUSPEND3
51682036 959 select COMPAT_OLD_SIGACTION
8c2c3df3
CM
960 help
961 This option enables support for a 32-bit EL0 running under a 64-bit
962 kernel at EL1. AArch32-specific components such as system calls,
963 the user helper functions, VFP support and the ptrace interface are
964 handled appropriately by the kernel.
965
44eaacf1
SP
966 If you use a page size other than 4KB (i.e, 16KB or 64KB), please be aware
967 that you will only be able to execute AArch32 binaries that were compiled
968 with page size aligned segments.
a8fcd8b1 969
8c2c3df3
CM
970 If you want to execute 32-bit userspace applications, say Y.
971
972config SYSVIPC_COMPAT
973 def_bool y
974 depends on COMPAT && SYSVIPC
975
976endmenu
977
166936ba
LP
978menu "Power management options"
979
980source "kernel/power/Kconfig"
981
982config ARCH_SUSPEND_POSSIBLE
983 def_bool y
984
166936ba
LP
985endmenu
986
1307220d
LP
987menu "CPU Power Management"
988
989source "drivers/cpuidle/Kconfig"
990
52e7e816
RH
991source "drivers/cpufreq/Kconfig"
992
993endmenu
994
8c2c3df3
CM
995source "net/Kconfig"
996
997source "drivers/Kconfig"
998
f84d0275
MS
999source "drivers/firmware/Kconfig"
1000
b6a02173
GG
1001source "drivers/acpi/Kconfig"
1002
8c2c3df3
CM
1003source "fs/Kconfig"
1004
c3eb5b14
MZ
1005source "arch/arm64/kvm/Kconfig"
1006
8c2c3df3
CM
1007source "arch/arm64/Kconfig.debug"
1008
1009source "security/Kconfig"
1010
1011source "crypto/Kconfig"
2c98833a
AB
1012if CRYPTO
1013source "arch/arm64/crypto/Kconfig"
1014endif
8c2c3df3
CM
1015
1016source "lib/Kconfig"