Commit | Line | Data |
---|---|---|
ec8f24b7 | 1 | # SPDX-License-Identifier: GPL-2.0-only |
1da177e4 LT |
2 | # |
3 | # Network configuration | |
4 | # | |
5 | ||
031cf19e | 6 | menuconfig NET |
1da177e4 | 7 | bool "Networking support" |
e9cc8bdd | 8 | select NLATTR |
4cd5773a | 9 | select GENERIC_NET_UTILS |
f89b7755 | 10 | select BPF |
a7f7f624 | 11 | help |
1da177e4 LT |
12 | Unless you really know what you are doing, you should say Y here. |
13 | The reason is that some programs need kernel networking support even | |
14 | when running on a stand-alone machine that isn't connected to any | |
d5950b43 | 15 | other computer. |
e446a276 | 16 | |
d5950b43 | 17 | If you are upgrading from an older kernel, you |
1da177e4 LT |
18 | should consider updating your networking tools too because changes |
19 | in the kernel and the tools often go hand in hand. The tools are | |
20 | contained in the package net-tools, the location and version number | |
21 | of which are given in <file:Documentation/Changes>. | |
22 | ||
23 | For a general introduction to Linux networking, it is highly | |
24 | recommended to read the NET-HOWTO, available from | |
25 | <http://www.tldp.org/docs.html#howto>. | |
26 | ||
6a2e9b73 | 27 | if NET |
1da177e4 | 28 | |
1dacc76d JB |
29 | config WANT_COMPAT_NETLINK_MESSAGES |
30 | bool | |
31 | help | |
32 | This option can be selected by other options that need compat | |
33 | netlink messages. | |
34 | ||
35 | config COMPAT_NETLINK_MESSAGES | |
36 | def_bool y | |
37 | depends on COMPAT | |
40b53d8a | 38 | depends on WEXT_CORE || WANT_COMPAT_NETLINK_MESSAGES |
1dacc76d JB |
39 | help |
40 | This option makes it possible to send different netlink messages | |
41 | to tasks depending on whether the task is a compat task or not. To | |
42 | achieve this, you need to set skb_shinfo(skb)->frag_list to the | |
43 | compat skb before sending the skb, the netlink code will sort out | |
44 | which message to actually pass to the task. | |
45 | ||
46 | Newly written code should NEVER need this option but do | |
47 | compat-independent messages instead! | |
48 | ||
1cf51900 PN |
49 | config NET_INGRESS |
50 | bool | |
51 | ||
1f211a1b DB |
52 | config NET_EGRESS |
53 | bool | |
54 | ||
e420bed0 DB |
55 | config NET_XGRESS |
56 | select NET_INGRESS | |
57 | select NET_EGRESS | |
58 | bool | |
59 | ||
2c64605b PNA |
60 | config NET_REDIRECT |
61 | bool | |
62 | ||
9f06f87f JK |
63 | config SKB_DECRYPTED |
64 | bool | |
65 | ||
df5042f4 FW |
66 | config SKB_EXTENSIONS |
67 | bool | |
68 | ||
170aafe3 MA |
69 | config NET_DEVMEM |
70 | def_bool y | |
71 | depends on DMA_SHARED_BUFFER | |
72 | depends on GENERIC_ALLOCATOR | |
26d74602 | 73 | depends on PAGE_POOL |
170aafe3 | 74 | |
6a2e9b73 | 75 | menu "Networking options" |
1da177e4 | 76 | |
6a2e9b73 SR |
77 | source "net/packet/Kconfig" |
78 | source "net/unix/Kconfig" | |
3c4d7559 | 79 | source "net/tls/Kconfig" |
6a2e9b73 | 80 | source "net/xfrm/Kconfig" |
2356f4cb | 81 | source "net/iucv/Kconfig" |
ac713874 | 82 | source "net/smc/Kconfig" |
68e8b849 | 83 | source "net/xdp/Kconfig" |
1da177e4 | 84 | |
3b3009ea CL |
85 | config NET_HANDSHAKE |
86 | bool | |
87 | depends on SUNRPC || NVME_TARGET_TCP || NVME_TCP | |
88 | default y | |
89 | ||
88232ec1 CL |
90 | config NET_HANDSHAKE_KUNIT_TEST |
91 | tristate "KUnit tests for the handshake upcall mechanism" if !KUNIT_ALL_TESTS | |
92 | default KUNIT_ALL_TESTS | |
93 | depends on KUNIT | |
94 | help | |
95 | This builds the KUnit tests for the handshake upcall mechanism. | |
96 | ||
97 | KUnit tests run during boot and output the results to the debug | |
98 | log in TAP format (https://testanything.org/). Only useful for | |
99 | kernel devs running KUnit test harness and are not for inclusion | |
100 | into a production build. | |
101 | ||
102 | For more information on KUnit and unit tests in general, refer | |
103 | to the KUnit documentation in Documentation/dev-tools/kunit/. | |
104 | ||
1da177e4 LT |
105 | config INET |
106 | bool "TCP/IP networking" | |
a7f7f624 | 107 | help |
1da177e4 LT |
108 | These are the protocols used on the Internet and on most local |
109 | Ethernets. It is highly recommended to say Y here (this will enlarge | |
cf80efc2 | 110 | your kernel by about 400 KB), since some programs (e.g. the X window |
1da177e4 LT |
111 | system) use TCP/IP even if your machine is not connected to any |
112 | other computer. You will get the so-called loopback device which | |
113 | allows you to ping yourself (great fun, that!). | |
114 | ||
115 | For an excellent introduction to Linux networking, please read the | |
116 | Linux Networking HOWTO, available from | |
117 | <http://www.tldp.org/docs.html#howto>. | |
118 | ||
119 | If you say Y here and also to "/proc file system support" and | |
120 | "Sysctl support" below, you can change various aspects of the | |
121 | behavior of the TCP/IP code by writing to the (virtual) files in | |
122 | /proc/sys/net/ipv4/*; the options are explained in the file | |
1cec2cac | 123 | <file:Documentation/networking/ip-sysctl.rst>. |
1da177e4 LT |
124 | |
125 | Short answer: say Y. | |
126 | ||
6a2e9b73 | 127 | if INET |
1da177e4 | 128 | source "net/ipv4/Kconfig" |
1da177e4 | 129 | source "net/ipv6/Kconfig" |
38c94377 | 130 | source "net/netlabel/Kconfig" |
f870fa0b | 131 | source "net/mptcp/Kconfig" |
1da177e4 | 132 | |
6a2e9b73 SR |
133 | endif # if INET |
134 | ||
984bc16c JM |
135 | config NETWORK_SECMARK |
136 | bool "Security Marking" | |
137 | help | |
138 | This enables security marking of network packets, similar | |
139 | to nfmark, but designated for security purposes. | |
140 | If you are unsure how to answer this question, answer N. | |
141 | ||
408eccce DB |
142 | config NET_PTP_CLASSIFY |
143 | def_bool n | |
144 | ||
c1f19b51 RC |
145 | config NETWORK_PHY_TIMESTAMPING |
146 | bool "Timestamping in PHY devices" | |
408eccce | 147 | select NET_PTP_CLASSIFY |
c1f19b51 | 148 | help |
767ff483 RC |
149 | This allows timestamping of network packets by PHYs (or |
150 | other MII bus snooping devices) with hardware timestamping | |
151 | capabilities. This option adds some overhead in the transmit | |
152 | and receive paths. | |
c1f19b51 RC |
153 | |
154 | If you are unsure how to answer this question, answer N. | |
155 | ||
1da177e4 | 156 | menuconfig NETFILTER |
ef91fd52 | 157 | bool "Network packet filtering framework (Netfilter)" |
a7f7f624 | 158 | help |
1da177e4 LT |
159 | Netfilter is a framework for filtering and mangling network packets |
160 | that pass through your Linux box. | |
161 | ||
162 | The most common use of packet filtering is to run your Linux box as | |
163 | a firewall protecting a local network from the Internet. The type of | |
164 | firewall provided by this kernel support is called a "packet | |
165 | filter", which means that it can reject individual network packets | |
166 | based on type, source, destination etc. The other kind of firewall, | |
167 | a "proxy-based" one, is more secure but more intrusive and more | |
168 | bothersome to set up; it inspects the network traffic much more | |
169 | closely, modifies it and has knowledge about the higher level | |
170 | protocols, which a packet filter lacks. Moreover, proxy-based | |
171 | firewalls often require changes to the programs running on the local | |
172 | clients. Proxy-based firewalls don't need support by the kernel, but | |
173 | they are often combined with a packet filter, which only works if | |
174 | you say Y here. | |
175 | ||
176 | You should also say Y here if you intend to use your Linux box as | |
177 | the gateway to the Internet for a local network of machines without | |
178 | globally valid IP addresses. This is called "masquerading": if one | |
179 | of the computers on your local network wants to send something to | |
180 | the outside, your box can "masquerade" as that computer, i.e. it | |
181 | forwards the traffic to the intended outside destination, but | |
182 | modifies the packets to make it look like they came from the | |
183 | firewall box itself. It works both ways: if the outside host | |
184 | replies, the Linux box will silently forward the traffic to the | |
185 | correct local computer. This way, the computers on your local net | |
186 | are completely invisible to the outside world, even though they can | |
187 | reach the outside and can receive replies. It is even possible to | |
188 | run globally visible servers from within a masqueraded local network | |
189 | using a mechanism called portforwarding. Masquerading is also often | |
190 | called NAT (Network Address Translation). | |
191 | ||
192 | Another use of Netfilter is in transparent proxying: if a machine on | |
193 | the local network tries to connect to an outside host, your Linux | |
194 | box can transparently forward the traffic to a local server, | |
195 | typically a caching proxy server. | |
196 | ||
197 | Yet another use of Netfilter is building a bridging firewall. Using | |
198 | a bridge with Network packet filtering enabled makes iptables "see" | |
199 | the bridged traffic. For filtering on the lower network and Ethernet | |
200 | protocols over the bridge, use ebtables (under bridge netfilter | |
201 | configuration). | |
202 | ||
203 | Various modules exist for netfilter which replace the previous | |
204 | masquerading (ipmasqadm), packet filtering (ipchains), transparent | |
205 | proxying, and portforwarding mechanisms. Please see | |
206 | <file:Documentation/Changes> under "iptables" for the location of | |
207 | these packages. | |
208 | ||
1da177e4 LT |
209 | if NETFILTER |
210 | ||
33b8e776 PM |
211 | config NETFILTER_ADVANCED |
212 | bool "Advanced netfilter configuration" | |
213 | depends on NETFILTER | |
214 | default y | |
215 | help | |
216 | If you say Y here you can select between all the netfilter modules. | |
692105b8 | 217 | If you say N the more unusual ones will not be shown and the |
33b8e776 PM |
218 | basic ones needed by most people will default to 'M'. |
219 | ||
220 | If unsure, say Y. | |
221 | ||
1da177e4 | 222 | config BRIDGE_NETFILTER |
34666d46 | 223 | tristate "Bridged IP/ARP packets filtering" |
57f5877c | 224 | depends on BRIDGE |
34666d46 | 225 | depends on NETFILTER && INET |
33b8e776 | 226 | depends on NETFILTER_ADVANCED |
2a95183a | 227 | select NETFILTER_FAMILY_BRIDGE |
de8bda1d | 228 | select SKB_EXTENSIONS |
a7f7f624 | 229 | help |
1da177e4 LT |
230 | Enabling this option will let arptables resp. iptables see bridged |
231 | ARP resp. IP traffic. If you want a bridging firewall, you probably | |
232 | want this option enabled. | |
233 | Enabling or disabling this option doesn't enable or disable | |
234 | ebtables. | |
235 | ||
236 | If unsure, say N. | |
237 | ||
9eb0eec7 | 238 | source "net/netfilter/Kconfig" |
1da177e4 LT |
239 | source "net/ipv4/netfilter/Kconfig" |
240 | source "net/ipv6/netfilter/Kconfig" | |
1da177e4 LT |
241 | source "net/bridge/netfilter/Kconfig" |
242 | ||
243 | endif | |
244 | ||
7c657876 | 245 | source "net/dccp/Kconfig" |
1da177e4 | 246 | source "net/sctp/Kconfig" |
fe17f84f | 247 | source "net/rds/Kconfig" |
1e63e681 | 248 | source "net/tipc/Kconfig" |
6a2e9b73 | 249 | source "net/atm/Kconfig" |
fd558d18 | 250 | source "net/l2tp/Kconfig" |
a19800d7 | 251 | source "net/802/Kconfig" |
6a2e9b73 | 252 | source "net/bridge/Kconfig" |
91da11f8 | 253 | source "net/dsa/Kconfig" |
6a2e9b73 | 254 | source "net/8021q/Kconfig" |
1da177e4 | 255 | source "net/llc/Kconfig" |
1dab4713 | 256 | source "net/appletalk/Kconfig" |
6a2e9b73 SR |
257 | source "net/x25/Kconfig" |
258 | source "net/lapb/Kconfig" | |
5075138d | 259 | source "net/phonet/Kconfig" |
2c6bed7c | 260 | source "net/6lowpan/Kconfig" |
9ec76716 | 261 | source "net/ieee802154/Kconfig" |
1010f540 | 262 | source "net/mac802154/Kconfig" |
1da177e4 | 263 | source "net/sched/Kconfig" |
2f90b865 | 264 | source "net/dcb/Kconfig" |
1a4240f4 | 265 | source "net/dns_resolver/Kconfig" |
c6c8fea2 | 266 | source "net/batman-adv/Kconfig" |
ccb1352e | 267 | source "net/openvswitch/Kconfig" |
d021c344 | 268 | source "net/vmw_vsock/Kconfig" |
eaaa3139 | 269 | source "net/netlink/Kconfig" |
0d89d203 | 270 | source "net/mpls/Kconfig" |
c411ed85 | 271 | source "net/nsh/Kconfig" |
f421436a | 272 | source "net/hsr/Kconfig" |
007f790c | 273 | source "net/switchdev/Kconfig" |
1b69c6d0 | 274 | source "net/l3mdev/Kconfig" |
bdabad3e | 275 | source "net/qrtr/Kconfig" |
2d283bdd | 276 | source "net/ncsi/Kconfig" |
1da177e4 | 277 | |
919067cc ED |
278 | config PCPU_DEV_REFCNT |
279 | bool "Use percpu variables to maintain network device refcount" | |
280 | depends on SMP | |
281 | default y | |
282 | help | |
283 | network device refcount are using per cpu variables if this option is set. | |
284 | This can be forced to N to detect underflows (with a performance drop). | |
285 | ||
3948b059 ED |
286 | config MAX_SKB_FRAGS |
287 | int "Maximum number of fragments per skb_shared_info" | |
288 | range 17 45 | |
289 | default 17 | |
290 | help | |
291 | Having more fragments per skb_shared_info can help GRO efficiency. | |
292 | This helps BIG TCP workloads, but might expose bugs in some | |
293 | legacy drivers. | |
294 | This also increases memory overhead of small packets, | |
295 | and in drivers using build_skb(). | |
296 | If unsure, say 17. | |
297 | ||
df334545 | 298 | config RPS |
9b6a30fe | 299 | bool "Receive packet steering" |
044c8d4b | 300 | depends on SMP && SYSFS |
df334545 | 301 | default y |
9b6a30fe JX |
302 | help |
303 | Software receive side packet steering (RPS) distributes the | |
304 | load of received packet processing across multiple CPUs. | |
df334545 | 305 | |
c445477d | 306 | config RFS_ACCEL |
9b6a30fe | 307 | bool "Hardware acceleration of RFS" |
0244ad00 | 308 | depends on RPS |
c445477d BH |
309 | select CPU_RMAP |
310 | default y | |
9b6a30fe JX |
311 | help |
312 | Allowing drivers for multiqueue hardware with flow filter tables to | |
313 | accelerate RFS. | |
c445477d | 314 | |
4e1beecc TT |
315 | config SOCK_RX_QUEUE_MAPPING |
316 | bool | |
317 | ||
bf264145 | 318 | config XPS |
6341e62b | 319 | bool |
044c8d4b | 320 | depends on SMP |
4e1beecc | 321 | select SOCK_RX_QUEUE_MAPPING |
bf264145 TH |
322 | default y |
323 | ||
8cb2d8bf | 324 | config HWBM |
43da1411 | 325 | bool |
8cb2d8bf | 326 | |
86f8515f | 327 | config CGROUP_NET_PRIO |
af636337 | 328 | bool "Network priority cgroup" |
5bc1421e | 329 | depends on CGROUPS |
2a56a1fe | 330 | select SOCK_CGROUP_DATA |
a7f7f624 | 331 | help |
5bc1421e | 332 | Cgroup subsystem for use in assigning processes to network priorities on |
86f8515f | 333 | a per-interface basis. |
5bc1421e | 334 | |
fe1217c4 | 335 | config CGROUP_NET_CLASSID |
6341e62b | 336 | bool "Network classid cgroup" |
fe1217c4 | 337 | depends on CGROUPS |
2a56a1fe | 338 | select SOCK_CGROUP_DATA |
a7f7f624 | 339 | help |
fe1217c4 DB |
340 | Cgroup subsystem for use as general purpose socket classid marker that is |
341 | being used in cls_cgroup and for netfilter matching. | |
342 | ||
e0d1095a | 343 | config NET_RX_BUSY_POLL |
6341e62b | 344 | bool |
c857946a | 345 | default y if !PREEMPT_RT || (PREEMPT_RT && !NETCONSOLE) |
06021292 | 346 | |
114cf580 | 347 | config BQL |
6341e62b | 348 | bool |
ea7f3cfa | 349 | prompt "Enable Byte Queue Limits" |
114cf580 TH |
350 | depends on SYSFS |
351 | select DQL | |
352 | default y | |
353 | ||
08848246 JF |
354 | config BPF_STREAM_PARSER |
355 | bool "enable BPF STREAM_PARSER" | |
604326b4 | 356 | depends on INET |
08848246 | 357 | depends on BPF_SYSCALL |
604326b4 | 358 | depends on CGROUP_BPF |
08848246 | 359 | select STREAM_PARSER |
604326b4 | 360 | select NET_SOCK_MSG |
a7f7f624 | 361 | help |
88759609 | 362 | Enabling this allows a TCP stream parser to be used with |
43da1411 | 363 | BPF_MAP_TYPE_SOCKMAP. |
08848246 | 364 | |
99bbc707 | 365 | config NET_FLOW_LIMIT |
9b6a30fe | 366 | bool "Net flow limit" |
99bbc707 WB |
367 | depends on RPS |
368 | default y | |
a7f7f624 | 369 | help |
99bbc707 WB |
370 | The network stack has to drop packets when a receive processing CPU's |
371 | backlog reaches netdev_max_backlog. If a few out of many active flows | |
372 | generate the vast majority of load, drop their traffic earlier to | |
373 | maintain capacity for the other flows. This feature provides servers | |
374 | with many clients some protection against DoS by a single (spoofed) | |
375 | flow that greatly exceeds average workload. | |
376 | ||
1da177e4 LT |
377 | menu "Network testing" |
378 | ||
379 | config NET_PKTGEN | |
380 | tristate "Packet Generator (USE WITH CAUTION)" | |
ffd756b3 | 381 | depends on INET && PROC_FS |
a7f7f624 | 382 | help |
1da177e4 LT |
383 | This module will inject preconfigured packets, at a configurable |
384 | rate, out of a given interface. It is used for network interface | |
385 | stress testing and performance analysis. If you don't understand | |
386 | what was just said, you don't need it: say N. | |
387 | ||
388 | Documentation on how to use the packet generator can be found | |
c1e4535f | 389 | at <file:Documentation/networking/pktgen.rst>. |
1da177e4 LT |
390 | |
391 | To compile this code as a module, choose M here: the | |
392 | module will be called pktgen. | |
393 | ||
273ae44b | 394 | config NET_DROP_MONITOR |
cad456d5 | 395 | tristate "Network packet drop alerting service" |
911f8635 | 396 | depends on INET && TRACEPOINTS |
a7f7f624 | 397 | help |
43da1411 KK |
398 | This feature provides an alerting service to userspace in the |
399 | event that packets are discarded in the network stack. Alerts | |
400 | are broadcast via netlink socket to any listening user space | |
401 | process. If you don't need network drop alerts, or if you are ok | |
402 | just checking the various proc files and other utilities for | |
403 | drop statistics, say N here. | |
273ae44b | 404 | |
1da177e4 LT |
405 | endmenu |
406 | ||
407 | endmenu | |
408 | ||
1da177e4 | 409 | source "net/ax25/Kconfig" |
0d66548a | 410 | source "net/can/Kconfig" |
1da177e4 | 411 | source "net/bluetooth/Kconfig" |
17926a79 | 412 | source "net/rxrpc/Kconfig" |
ab7ac4eb | 413 | source "net/kcm/Kconfig" |
43a0c675 | 414 | source "net/strparser/Kconfig" |
bc49d816 | 415 | source "net/mctp/Kconfig" |
d86b5e0e | 416 | |
14c0b97d TG |
417 | config FIB_RULES |
418 | bool | |
419 | ||
5442060c RD |
420 | menuconfig WIRELESS |
421 | bool "Wireless" | |
f54bfc0e | 422 | depends on !S390 |
5442060c RD |
423 | default y |
424 | ||
425 | if WIRELESS | |
2a5e1c0e JB |
426 | |
427 | source "net/wireless/Kconfig" | |
f0706e82 | 428 | source "net/mac80211/Kconfig" |
2a5e1c0e | 429 | |
5442060c | 430 | endif # WIRELESS |
2a5e1c0e | 431 | |
cf4328cd | 432 | source "net/rfkill/Kconfig" |
bd238fb4 | 433 | source "net/9p/Kconfig" |
3908c690 | 434 | source "net/caif/Kconfig" |
3d14c5d2 | 435 | source "net/ceph/Kconfig" |
3e256b8f | 436 | source "net/nfc/Kconfig" |
6ae0a628 | 437 | source "net/psample/Kconfig" |
1ce84604 | 438 | source "net/ife/Kconfig" |
3908c690 | 439 | |
499a2425 RP |
440 | config LWTUNNEL |
441 | bool "Network light weight tunnels" | |
a7f7f624 | 442 | help |
499a2425 RP |
443 | This feature provides an infrastructure to support light weight |
444 | tunnels like mpls. There is no netdevice associated with a light | |
445 | weight tunnel endpoint. Tunnel encapsulation parameters are stored | |
446 | with light weight tunnel state associated with fib routes. | |
cf4328cd | 447 | |
3a0af8fd TG |
448 | config LWTUNNEL_BPF |
449 | bool "Execute BPF program as route nexthop action" | |
b251f9f6 | 450 | depends on LWTUNNEL && INET |
3a0af8fd | 451 | default y if LWTUNNEL=y |
a7f7f624 | 452 | help |
3a0af8fd TG |
453 | Allows to run BPF programs as a nexthop action following a route |
454 | lookup for incoming and outgoing packets. | |
455 | ||
911362c7 | 456 | config DST_CACHE |
9b246841 | 457 | bool |
911362c7 PA |
458 | default n |
459 | ||
97e219b7 ED |
460 | config GRO_CELLS |
461 | bool | |
462 | default n | |
463 | ||
ebf4e808 IL |
464 | config SOCK_VALIDATE_XMIT |
465 | bool | |
768cf841 OR |
466 | |
467 | config NET_IEEE8021Q_HELPERS | |
468 | bool | |
ebf4e808 | 469 | |
3e1e58d6 OR |
470 | config NET_SELFTESTS |
471 | def_tristate PHYLIB | |
4a52dd8f | 472 | depends on PHYLIB && INET |
3e1e58d6 | 473 | |
604326b4 DB |
474 | config NET_SOCK_MSG |
475 | bool | |
476 | default n | |
477 | help | |
478 | The NET_SOCK_MSG provides a framework for plain sockets (e.g. TCP) or | |
479 | ULPs (upper layer modules, e.g. TLS) to process L7 application data | |
480 | with the help of BPF programs. | |
481 | ||
bfcd3a46 | 482 | config NET_DEVLINK |
f6b19b35 JP |
483 | bool |
484 | default n | |
bfcd3a46 | 485 | |
ff7d6b27 | 486 | config PAGE_POOL |
43da1411 | 487 | bool |
ff7d6b27 | 488 | |
8610037e JD |
489 | config PAGE_POOL_STATS |
490 | default n | |
491 | bool "Page pool stats" | |
492 | depends on PAGE_POOL | |
493 | help | |
494 | Enable page pool statistics to track page allocation and recycling | |
495 | in page pools. This option incurs additional CPU cost in allocation | |
496 | and recycle paths and additional memory cost to store the statistics. | |
497 | These statistics are only available if this option is enabled and if | |
498 | the driver using the page pool supports exporting this data. | |
499 | ||
500 | If unsure, say N. | |
501 | ||
30c8bd5a SS |
502 | config FAILOVER |
503 | tristate "Generic failover module" | |
504 | help | |
505 | The failover module provides a generic interface for paravirtual | |
506 | drivers to register a netdev and a set of ops with a failover | |
507 | instance. The ops are used as event handlers that get called to | |
508 | handle netdev register/unregister/link change/name change events | |
509 | on slave pci ethernet devices with the same mac address as the | |
510 | failover netdev. This enables paravirtual drivers to use a | |
511 | VF as an accelerated low latency datapath. It also allows live | |
512 | migration of VMs with direct attached VFs by failing over to the | |
513 | paravirtual datapath when the VF is unplugged. | |
514 | ||
2b4a8990 MK |
515 | config ETHTOOL_NETLINK |
516 | bool "Netlink interface for ethtool" | |
f750dfe8 | 517 | select DIMLIB |
2b4a8990 MK |
518 | default y |
519 | help | |
520 | An alternative userspace interface for ethtool based on generic | |
521 | netlink. It provides better extensibility and some new features, | |
522 | e.g. notification messages. | |
523 | ||
2c193f2c JK |
524 | config NETDEV_ADDR_LIST_TEST |
525 | tristate "Unit tests for device address list" | |
526 | default KUNIT_ALL_TESTS | |
527 | depends on KUNIT | |
528 | ||
b3098d32 WB |
529 | config NET_TEST |
530 | tristate "KUnit tests for networking" if !KUNIT_ALL_TESTS | |
531 | depends on KUNIT | |
532 | default KUNIT_ALL_TESTS | |
533 | help | |
534 | KUnit tests covering core networking infra, such as sk_buff. | |
535 | ||
536 | If unsure, say N. | |
537 | ||
6a2e9b73 | 538 | endif # if NET |