aboutsummaryrefslogtreecommitdiffstats
path: root/arch/arm/Kconfig
diff options
context:
space:
mode:
authorRussell King <rmk+kernel@arm.linux.org.uk>2010-10-04 17:23:26 -0400
committerRussell King <rmk+kernel@arm.linux.org.uk>2010-10-04 17:23:30 -0400
commita9fda02bfc91a281cd812ae15dabe6bfb9574f90 (patch)
treed7be703f341870f15f87a59a63976f650078b4d6 /arch/arm/Kconfig
parentaa3090005d27f3c7fba915ccea36b97b669fa3ab (diff)
parentec706dab290c486837d4a825870ab052bf200279 (diff)
Merge branch 'for_rmk' of git://git.linaro.org/kernel/linux-linaro-next into devel-stable
Diffstat (limited to 'arch/arm/Kconfig')
-rw-r--r--arch/arm/Kconfig41
1 files changed, 40 insertions, 1 deletions
diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig
index 8d395352f1c9..ca5aa5aa39e0 100644
--- a/arch/arm/Kconfig
+++ b/arch/arm/Kconfig
@@ -271,7 +271,6 @@ config ARCH_AT91
271 bool "Atmel AT91" 271 bool "Atmel AT91"
272 select ARCH_REQUIRE_GPIOLIB 272 select ARCH_REQUIRE_GPIOLIB
273 select HAVE_CLK 273 select HAVE_CLK
274 select ARCH_USES_GETTIMEOFFSET
275 help 274 help
276 This enables support for systems based on the Atmel AT91RM9200, 275 This enables support for systems based on the Atmel AT91RM9200,
277 AT91SAM9 and AT91CAP9 processors. 276 AT91SAM9 and AT91CAP9 processors.
@@ -1062,6 +1061,32 @@ config ARM_ERRATA_460075
1062 ACTLR register. Note that setting specific bits in the ACTLR register 1061 ACTLR register. Note that setting specific bits in the ACTLR register
1063 may not be available in non-secure mode. 1062 may not be available in non-secure mode.
1064 1063
1064config ARM_ERRATA_742230
1065 bool "ARM errata: DMB operation may be faulty"
1066 depends on CPU_V7 && SMP
1067 help
1068 This option enables the workaround for the 742230 Cortex-A9
1069 (r1p0..r2p2) erratum. Under rare circumstances, a DMB instruction
1070 between two write operations may not ensure the correct visibility
1071 ordering of the two writes. This workaround sets a specific bit in
1072 the diagnostic register of the Cortex-A9 which causes the DMB
1073 instruction to behave as a DSB, ensuring the correct behaviour of
1074 the two writes.
1075
1076config ARM_ERRATA_742231
1077 bool "ARM errata: Incorrect hazard handling in the SCU may lead to data corruption"
1078 depends on CPU_V7 && SMP
1079 help
1080 This option enables the workaround for the 742231 Cortex-A9
1081 (r2p0..r2p2) erratum. Under certain conditions, specific to the
1082 Cortex-A9 MPCore micro-architecture, two CPUs working in SMP mode,
1083 accessing some data located in the same cache line, may get corrupted
1084 data due to bad handling of the address hazard when the line gets
1085 replaced from one of the CPUs at the same time as another CPU is
1086 accessing it. This workaround sets specific bits in the diagnostic
1087 register of the Cortex-A9 which reduces the linefill issuing
1088 capabilities of the processor.
1089
1065config PL310_ERRATA_588369 1090config PL310_ERRATA_588369
1066 bool "Clean & Invalidate maintenance operations do not invalidate clean lines" 1091 bool "Clean & Invalidate maintenance operations do not invalidate clean lines"
1067 depends on CACHE_L2X0 && ARCH_OMAP4 1092 depends on CACHE_L2X0 && ARCH_OMAP4
@@ -1449,6 +1474,20 @@ config UACCESS_WITH_MEMCPY
1449 However, if the CPU data cache is using a write-allocate mode, 1474 However, if the CPU data cache is using a write-allocate mode,
1450 this option is unlikely to provide any performance gain. 1475 this option is unlikely to provide any performance gain.
1451 1476
1477config SECCOMP
1478 bool
1479 prompt "Enable seccomp to safely compute untrusted bytecode"
1480 ---help---
1481 This kernel feature is useful for number crunching applications
1482 that may need to compute untrusted bytecode during their
1483 execution. By using pipes or other transports made available to
1484 the process as file descriptors supporting the read/write
1485 syscalls, it's possible to isolate those applications in
1486 their own address space using seccomp. Once seccomp is
1487 enabled via prctl(PR_SET_SECCOMP), it cannot be disabled
1488 and the task is only allowed to execute a few safe syscalls
1489 defined by each seccomp mode.
1490
1452config CC_STACKPROTECTOR 1491config CC_STACKPROTECTOR
1453 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)" 1492 bool "Enable -fstack-protector buffer overflow detection (EXPERIMENTAL)"
1454 help 1493 help