diff options
author | Russell King <rmk+kernel@arm.linux.org.uk> | 2010-10-04 17:23:26 -0400 |
---|---|---|
committer | Russell King <rmk+kernel@arm.linux.org.uk> | 2010-10-04 17:23:30 -0400 |
commit | a9fda02bfc91a281cd812ae15dabe6bfb9574f90 (patch) | |
tree | d7be703f341870f15f87a59a63976f650078b4d6 /arch/arm/Kconfig | |
parent | aa3090005d27f3c7fba915ccea36b97b669fa3ab (diff) | |
parent | ec706dab290c486837d4a825870ab052bf200279 (diff) |
Merge branch 'for_rmk' of git://git.linaro.org/kernel/linux-linaro-next into devel-stable
Diffstat (limited to 'arch/arm/Kconfig')
-rw-r--r-- | arch/arm/Kconfig | 41 |
1 files changed, 40 insertions, 1 deletions
diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig index 8d395352f1c9..ca5aa5aa39e0 100644 --- a/arch/arm/Kconfig +++ b/arch/arm/Kconfig | |||
@@ -271,7 +271,6 @@ config ARCH_AT91 | |||
271 | bool "Atmel AT91" | 271 | bool "Atmel AT91" |
272 | select ARCH_REQUIRE_GPIOLIB | 272 | select ARCH_REQUIRE_GPIOLIB |
273 | select HAVE_CLK | 273 | select HAVE_CLK |
274 | select ARCH_USES_GETTIMEOFFSET | ||
275 | help | 274 | help |
276 | This enables support for systems based on the Atmel AT91RM9200, | 275 | This enables support for systems based on the Atmel AT91RM9200, |
277 | AT91SAM9 and AT91CAP9 processors. | 276 | AT91SAM9 and AT91CAP9 processors. |
@@ -1062,6 +1061,32 @@ config ARM_ERRATA_460075 | |||
1062 | ACTLR register. Note that setting specific bits in the ACTLR register | 1061 | ACTLR register. Note that setting specific bits in the ACTLR register |
1063 | may not be available in non-secure mode. | 1062 | may not be available in non-secure mode. |
1064 | 1063 | ||
1064 | config ARM_ERRATA_742230 | ||
1065 | bool "ARM errata: DMB operation may be faulty" | ||
1066 | depends on CPU_V7 && SMP | ||
1067 | help | ||
1068 | This option enables the workaround for the 742230 Cortex-A9 | ||
1069 | (r1p0..r2p2) erratum. Under rare circumstances, a DMB instruction | ||
1070 | between two write operations may not ensure the correct visibility | ||
1071 | ordering of the two writes. This workaround sets a specific bit in | ||
1072 | the diagnostic register of the Cortex-A9 which causes the DMB | ||
1073 | instruction to behave as a DSB, ensuring the correct behaviour of | ||
1074 | the two writes. | ||
1075 | |||
1076 | config ARM_ERRATA_742231 | ||
1077 | bool "ARM errata: Incorrect hazard handling in the SCU may lead to data corruption" | ||
1078 | depends on CPU_V7 && SMP | ||
1079 | help | ||
1080 | This option enables the workaround for the 742231 Cortex-A9 | ||
1081 | (r2p0..r2p2) erratum. Under certain conditions, specific to the | ||
1082 | Cortex-A9 MPCore micro-architecture, two CPUs working in SMP mode, | ||
1083 | accessing some data located in the same cache line, may get corrupted | ||
1084 | data due to bad handling of the address hazard when the line gets | ||
1085 | replaced from one of the CPUs at the same time as another CPU is | ||
1086 | accessing it. This workaround sets specific bits in the diagnostic | ||
1087 | register of the Cortex-A9 which reduces the linefill issuing | ||
1088 | capabilities of the processor. | ||
1089 | |||
1065 | config PL310_ERRATA_588369 | 1090 | config PL310_ERRATA_588369 |
1066 | bool "Clean & Invalidate maintenance operations do not invalidate clean lines" | 1091 | bool "Clean & Invalidate maintenance operations do not invalidate clean lines" |
1067 | depends on CACHE_L2X0 && ARCH_OMAP4 | 1092 | depends on CACHE_L2X0 && ARCH_OMAP4 |
@@ -1449,6 +1474,20 @@ config UACCESS_WITH_MEMCPY | |||
1449 | However, if the CPU data cache is using a write-allocate mode, | 1474 | However, if the CPU data cache is using a write-allocate mode, |
1450 | this option is unlikely to provide any performance gain. | 1475 | this option is unlikely to provide any performance gain. |
1451 | 1476 | ||
1477 | config SECCOMP | ||
1478 | bool | ||
1479 | prompt "Enable seccomp to safely compute untrusted bytecode" | ||
1480 | ---help--- | ||
1481 | This kernel feature is useful for number crunching applications | ||
1482 | that may need to compute untrusted bytecode during their | ||
1483 | execution. By using pipes or other transports made available to | ||
1484 | the process as file descriptors supporting the read/write | ||
1485 | syscalls, it's possible to isolate those applications in | ||
1486 | their own address space using seccomp. Once seccomp is | ||
1487 | enabled via prctl(PR_SET_SECCOMP), it cannot be disabled | ||
1488 | and the task is only allowed to execute a few safe syscalls | ||
1489 | defined by each seccomp mode. | ||
1490 | |||
1452 | config CC_STACKPROTECTOR | 1491 | config CC_STACKPROTECTOR |
1453 | bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)" | 1492 | bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)" |
1454 | help | 1493 | help |