blob: 9c456acc379e78caa9e45d4f1335802a05663a0f [file] [log] [blame]
Thomas Gleixnerec8f24b2019-05-19 13:07:45 +01001# SPDX-License-Identifier: GPL-2.0-only
Linus Torvalds1da177e2005-04-16 15:20:36 -07002#
3# Network configuration
4#
5
Robert P. J. Day031cf192008-07-30 03:14:01 -07006menuconfig NET
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 bool "Networking support"
Geert Uytterhoevene9cc8bd2009-03-04 14:53:30 +08008 select NLATTR
Andy Shevchenko4cd57732013-06-04 19:46:26 +03009 select GENERIC_NET_UTILS
Alexei Starovoitovf89b7752014-10-23 18:41:08 -070010 select BPF
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +090011 help
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 Unless you really know what you are doing, you should say Y here.
13 The reason is that some programs need kernel networking support even
14 when running on a stand-alone machine that isn't connected to any
Sam Ravnborgd5950b42005-07-11 21:03:49 -070015 other computer.
Stephen Hemmingere446a272018-07-24 12:29:18 -070016
Sam Ravnborgd5950b42005-07-11 21:03:49 -070017 If you are upgrading from an older kernel, you
Linus Torvalds1da177e2005-04-16 15:20:36 -070018 should consider updating your networking tools too because changes
19 in the kernel and the tools often go hand in hand. The tools are
20 contained in the package net-tools, the location and version number
21 of which are given in <file:Documentation/Changes>.
22
23 For a general introduction to Linux networking, it is highly
24 recommended to read the NET-HOWTO, available from
25 <http://www.tldp.org/docs.html#howto>.
26
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070027if NET
28
Johannes Berg1dacc762009-07-01 11:26:02 +000029config WANT_COMPAT_NETLINK_MESSAGES
30 bool
31 help
32 This option can be selected by other options that need compat
33 netlink messages.
34
35config COMPAT_NETLINK_MESSAGES
36 def_bool y
37 depends on COMPAT
David S. Miller40b53d82010-07-26 13:13:49 -070038 depends on WEXT_CORE || WANT_COMPAT_NETLINK_MESSAGES
Johannes Berg1dacc762009-07-01 11:26:02 +000039 help
40 This option makes it possible to send different netlink messages
41 to tasks depending on whether the task is a compat task or not. To
42 achieve this, you need to set skb_shinfo(skb)->frag_list to the
43 compat skb before sending the skb, the netlink code will sort out
44 which message to actually pass to the task.
45
46 Newly written code should NEVER need this option but do
47 compat-independent messages instead!
48
Pablo Neira1cf519002015-05-13 18:19:37 +020049config NET_INGRESS
50 bool
51
Daniel Borkmann1f211a12016-01-07 22:29:47 +010052config NET_EGRESS
53 bool
54
Pablo Neira Ayuso2c646052020-03-25 13:47:18 +010055config NET_REDIRECT
56 bool
57
Florian Westphaldf5042f2018-12-18 17:15:16 +010058config SKB_EXTENSIONS
59 bool
60
Linus Torvalds1da177e2005-04-16 15:20:36 -070061menu "Networking options"
Linus Torvalds1da177e2005-04-16 15:20:36 -070062
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070063source "net/packet/Kconfig"
64source "net/unix/Kconfig"
Dave Watson3c4d7552017-06-14 11:37:39 -070065source "net/tls/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070066source "net/xfrm/Kconfig"
Martin Schwidefsky2356f4c2007-02-08 13:37:42 -080067source "net/iucv/Kconfig"
Ursula Braunac713872017-01-09 16:55:13 +010068source "net/smc/Kconfig"
Björn Töpel68e8b842018-05-02 13:01:22 +020069source "net/xdp/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -070070
71config INET
72 bool "TCP/IP networking"
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +090073 help
Linus Torvalds1da177e2005-04-16 15:20:36 -070074 These are the protocols used on the Internet and on most local
75 Ethernets. It is highly recommended to say Y here (this will enlarge
YOSHIFUJI Hideakicf80efc2008-02-12 17:35:16 +090076 your kernel by about 400 KB), since some programs (e.g. the X window
Linus Torvalds1da177e2005-04-16 15:20:36 -070077 system) use TCP/IP even if your machine is not connected to any
78 other computer. You will get the so-called loopback device which
79 allows you to ping yourself (great fun, that!).
80
81 For an excellent introduction to Linux networking, please read the
82 Linux Networking HOWTO, available from
83 <http://www.tldp.org/docs.html#howto>.
84
85 If you say Y here and also to "/proc file system support" and
86 "Sysctl support" below, you can change various aspects of the
87 behavior of the TCP/IP code by writing to the (virtual) files in
88 /proc/sys/net/ipv4/*; the options are explained in the file
Mauro Carvalho Chehab1cec2ca2020-04-28 00:01:49 +020089 <file:Documentation/networking/ip-sysctl.rst>.
Linus Torvalds1da177e2005-04-16 15:20:36 -070090
91 Short answer: say Y.
92
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070093if INET
Linus Torvalds1da177e2005-04-16 15:20:36 -070094source "net/ipv4/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -070095source "net/ipv6/Kconfig"
Paul Moore38c94372006-11-05 16:44:06 -080096source "net/netlabel/Kconfig"
Mat Martineauf870fa02020-01-21 16:56:15 -080097source "net/mptcp/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -070098
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070099endif # if INET
100
James Morris984bc162006-06-09 00:29:17 -0700101config NETWORK_SECMARK
102 bool "Security Marking"
103 help
104 This enables security marking of network packets, similar
105 to nfmark, but designated for security purposes.
106 If you are unsure how to answer this question, answer N.
107
Daniel Borkmann408eccc2014-04-01 16:20:23 +0200108config NET_PTP_CLASSIFY
109 def_bool n
110
Richard Cochranc1f19b52010-07-17 08:49:36 +0000111config NETWORK_PHY_TIMESTAMPING
112 bool "Timestamping in PHY devices"
Daniel Borkmann408eccc2014-04-01 16:20:23 +0200113 select NET_PTP_CLASSIFY
Richard Cochranc1f19b52010-07-17 08:49:36 +0000114 help
Richard Cochran767ff482019-12-25 18:16:16 -0800115 This allows timestamping of network packets by PHYs (or
116 other MII bus snooping devices) with hardware timestamping
117 capabilities. This option adds some overhead in the transmit
118 and receive paths.
Richard Cochranc1f19b52010-07-17 08:49:36 +0000119
120 If you are unsure how to answer this question, answer N.
121
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122menuconfig NETFILTER
Pablo Neira Ayusoef91fd52006-11-29 02:35:43 +0100123 bool "Network packet filtering framework (Netfilter)"
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900124 help
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125 Netfilter is a framework for filtering and mangling network packets
126 that pass through your Linux box.
127
128 The most common use of packet filtering is to run your Linux box as
129 a firewall protecting a local network from the Internet. The type of
130 firewall provided by this kernel support is called a "packet
131 filter", which means that it can reject individual network packets
132 based on type, source, destination etc. The other kind of firewall,
133 a "proxy-based" one, is more secure but more intrusive and more
134 bothersome to set up; it inspects the network traffic much more
135 closely, modifies it and has knowledge about the higher level
136 protocols, which a packet filter lacks. Moreover, proxy-based
137 firewalls often require changes to the programs running on the local
138 clients. Proxy-based firewalls don't need support by the kernel, but
139 they are often combined with a packet filter, which only works if
140 you say Y here.
141
142 You should also say Y here if you intend to use your Linux box as
143 the gateway to the Internet for a local network of machines without
144 globally valid IP addresses. This is called "masquerading": if one
145 of the computers on your local network wants to send something to
146 the outside, your box can "masquerade" as that computer, i.e. it
147 forwards the traffic to the intended outside destination, but
148 modifies the packets to make it look like they came from the
149 firewall box itself. It works both ways: if the outside host
150 replies, the Linux box will silently forward the traffic to the
151 correct local computer. This way, the computers on your local net
152 are completely invisible to the outside world, even though they can
153 reach the outside and can receive replies. It is even possible to
154 run globally visible servers from within a masqueraded local network
155 using a mechanism called portforwarding. Masquerading is also often
156 called NAT (Network Address Translation).
157
158 Another use of Netfilter is in transparent proxying: if a machine on
159 the local network tries to connect to an outside host, your Linux
160 box can transparently forward the traffic to a local server,
161 typically a caching proxy server.
162
163 Yet another use of Netfilter is building a bridging firewall. Using
164 a bridge with Network packet filtering enabled makes iptables "see"
165 the bridged traffic. For filtering on the lower network and Ethernet
166 protocols over the bridge, use ebtables (under bridge netfilter
167 configuration).
168
169 Various modules exist for netfilter which replace the previous
170 masquerading (ipmasqadm), packet filtering (ipchains), transparent
171 proxying, and portforwarding mechanisms. Please see
172 <file:Documentation/Changes> under "iptables" for the location of
173 these packages.
174
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175if NETFILTER
176
Patrick McHardy33b8e772007-12-17 22:47:05 -0800177config NETFILTER_ADVANCED
178 bool "Advanced netfilter configuration"
179 depends on NETFILTER
180 default y
181 help
182 If you say Y here you can select between all the netfilter modules.
Matt LaPlante692105b2009-01-26 11:12:25 +0100183 If you say N the more unusual ones will not be shown and the
Patrick McHardy33b8e772007-12-17 22:47:05 -0800184 basic ones needed by most people will default to 'M'.
185
186 If unsure, say Y.
187
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188config BRIDGE_NETFILTER
Pablo Neira Ayuso34666d42014-09-18 11:29:03 +0200189 tristate "Bridged IP/ARP packets filtering"
Florian Westphal57f58772014-09-30 10:59:18 +0200190 depends on BRIDGE
Pablo Neira Ayuso34666d42014-09-18 11:29:03 +0200191 depends on NETFILTER && INET
Patrick McHardy33b8e772007-12-17 22:47:05 -0800192 depends on NETFILTER_ADVANCED
Florian Westphal2a951832017-12-07 16:28:26 +0100193 select NETFILTER_FAMILY_BRIDGE
Florian Westphalde8bda12018-12-18 17:15:17 +0100194 select SKB_EXTENSIONS
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900195 help
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196 Enabling this option will let arptables resp. iptables see bridged
197 ARP resp. IP traffic. If you want a bridging firewall, you probably
198 want this option enabled.
199 Enabling or disabling this option doesn't enable or disable
200 ebtables.
201
202 If unsure, say N.
203
Harald Welte9eb0eec2005-09-17 00:41:21 -0700204source "net/netfilter/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700205source "net/ipv4/netfilter/Kconfig"
206source "net/ipv6/netfilter/Kconfig"
207source "net/decnet/netfilter/Kconfig"
208source "net/bridge/netfilter/Kconfig"
209
210endif
211
Alexei Starovoitovd2ba09c2018-05-21 19:22:30 -0700212source "net/bpfilter/Kconfig"
213
Arnaldo Carvalho de Melo7c657872005-08-09 20:14:34 -0700214source "net/dccp/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215source "net/sctp/Kconfig"
Andy Groverfe17f842009-02-24 15:30:39 +0000216source "net/rds/Kconfig"
Per Liden1e63e682006-01-16 16:39:13 +0100217source "net/tipc/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700218source "net/atm/Kconfig"
James Chapmanfd558d12010-04-02 06:18:33 +0000219source "net/l2tp/Kconfig"
Patrick McHardya19800d2008-07-05 21:25:39 -0700220source "net/802/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700221source "net/bridge/Kconfig"
Lennert Buytenhek91da11f2008-10-07 13:44:02 +0000222source "net/dsa/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700223source "net/8021q/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700224source "net/decnet/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700225source "net/llc/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700226source "drivers/net/appletalk/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700227source "net/x25/Kconfig"
228source "net/lapb/Kconfig"
remi.denis-courmont@nokia50751382009-01-23 03:00:25 +0000229source "net/phonet/Kconfig"
Alexander Aring2c6bed72014-07-11 10:24:18 +0200230source "net/6lowpan/Kconfig"
Sergey Lapin9ec76712009-06-08 12:18:48 +0000231source "net/ieee802154/Kconfig"
alex.bluesman.smirnov@gmail.com1010f542012-05-15 20:50:20 +0000232source "net/mac802154/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700233source "net/sched/Kconfig"
Alexander Duyck2f90b862008-11-20 20:52:10 -0800234source "net/dcb/Kconfig"
Wang Lei1a4240f2010-08-04 15:16:33 +0100235source "net/dns_resolver/Kconfig"
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000236source "net/batman-adv/Kconfig"
Jesse Grossccb13522011-10-25 19:26:31 -0700237source "net/openvswitch/Kconfig"
Andy Kingd021c342013-02-06 14:23:56 +0000238source "net/vmw_vsock/Kconfig"
Andrey Vagineaaa3132013-03-21 20:33:48 +0400239source "net/netlink/Kconfig"
Simon Horman0d89d202013-05-23 21:02:52 +0000240source "net/mpls/Kconfig"
Jiri Bencc411ed82017-08-28 21:43:24 +0200241source "net/nsh/Kconfig"
Arvid Brodinf4214362013-10-30 21:10:47 +0100242source "net/hsr/Kconfig"
Jiri Pirko007f7902014-11-28 14:34:17 +0100243source "net/switchdev/Kconfig"
David Ahern1b69c6d2015-09-29 20:07:11 -0700244source "net/l3mdev/Kconfig"
Courtney Cavinbdabad32016-05-06 07:09:08 -0700245source "net/qrtr/Kconfig"
Gavin Shan2d283bd2016-07-19 11:54:16 +1000246source "net/ncsi/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700247
Eric Dumazet919067c2021-03-19 10:39:33 -0700248config PCPU_DEV_REFCNT
249 bool "Use percpu variables to maintain network device refcount"
250 depends on SMP
251 default y
252 help
253 network device refcount are using per cpu variables if this option is set.
254 This can be forced to N to detect underflows (with a performance drop).
255
Eric Dumazetdf334542010-03-24 19:13:54 +0000256config RPS
Christoph Jaeger6341e622014-12-20 15:41:11 -0500257 bool
Yuanhan Liu044c8d42013-11-21 14:32:01 -0800258 depends on SMP && SYSFS
Eric Dumazetdf334542010-03-24 19:13:54 +0000259 default y
260
Ben Hutchingsc4454772011-01-19 11:03:53 +0000261config RFS_ACCEL
Christoph Jaeger6341e622014-12-20 15:41:11 -0500262 bool
Martin Schwidefsky0244ad02013-08-30 09:39:53 +0200263 depends on RPS
Ben Hutchingsc4454772011-01-19 11:03:53 +0000264 select CPU_RMAP
265 default y
266
Tariq Toukan4e1beec2021-02-11 13:35:51 +0200267config SOCK_RX_QUEUE_MAPPING
268 bool
269
Tom Herbertbf264142010-11-26 08:36:09 +0000270config XPS
Christoph Jaeger6341e622014-12-20 15:41:11 -0500271 bool
Yuanhan Liu044c8d42013-11-21 14:32:01 -0800272 depends on SMP
Tariq Toukan4e1beec2021-02-11 13:35:51 +0200273 select SOCK_RX_QUEUE_MAPPING
Tom Herbertbf264142010-11-26 08:36:09 +0000274 default y
275
Gregory CLEMENT8cb2d8b2016-03-14 09:39:04 +0100276config HWBM
Krzysztof Kozlowski43da1412019-11-21 21:28:35 +0800277 bool
Gregory CLEMENT8cb2d8b2016-03-14 09:39:04 +0100278
Daniel Borkmann86f85152013-12-29 17:27:11 +0100279config CGROUP_NET_PRIO
Tejun Heoaf636332014-02-08 10:36:58 -0500280 bool "Network priority cgroup"
Neil Horman5bc14212011-11-22 05:10:51 +0000281 depends on CGROUPS
Tejun Heo2a56a1f2015-12-07 17:38:52 -0500282 select SOCK_CGROUP_DATA
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900283 help
Neil Horman5bc14212011-11-22 05:10:51 +0000284 Cgroup subsystem for use in assigning processes to network priorities on
Daniel Borkmann86f85152013-12-29 17:27:11 +0100285 a per-interface basis.
Neil Horman5bc14212011-11-22 05:10:51 +0000286
Daniel Borkmannfe1217c2013-12-29 18:27:10 +0100287config CGROUP_NET_CLASSID
Christoph Jaeger6341e622014-12-20 15:41:11 -0500288 bool "Network classid cgroup"
Daniel Borkmannfe1217c2013-12-29 18:27:10 +0100289 depends on CGROUPS
Tejun Heo2a56a1f2015-12-07 17:38:52 -0500290 select SOCK_CGROUP_DATA
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900291 help
Daniel Borkmannfe1217c2013-12-29 18:27:10 +0100292 Cgroup subsystem for use as general purpose socket classid marker that is
293 being used in cls_cgroup and for netfilter matching.
294
Cong Wange0d10952013-08-01 11:10:25 +0800295config NET_RX_BUSY_POLL
Christoph Jaeger6341e622014-12-20 15:41:11 -0500296 bool
Eliezer Tamir89bf1b52013-06-14 16:33:46 +0300297 default y
Eliezer Tamir06021292013-06-10 11:39:50 +0300298
Tom Herbert114cf582011-11-28 16:33:09 +0000299config BQL
Christoph Jaeger6341e622014-12-20 15:41:11 -0500300 bool
Tom Herbert114cf582011-11-28 16:33:09 +0000301 depends on SYSFS
302 select DQL
303 default y
304
Eric Dumazet0a148422011-04-20 09:27:32 +0000305config BPF_JIT
306 bool "enable BPF Just In Time compiler"
Daniel Borkmann60777762016-05-13 19:08:28 +0200307 depends on HAVE_CBPF_JIT || HAVE_EBPF_JIT
Eric Dumazetb6202f92011-04-29 10:20:53 -0700308 depends on MODULES
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900309 help
Eric Dumazet0a148422011-04-20 09:27:32 +0000310 Berkeley Packet Filter filtering capabilities are normally handled
311 by an interpreter. This option allows kernel to generate a native
312 code when filter is loaded in memory. This should speedup
Daniel Borkmann4f3446b2016-05-13 19:08:32 +0200313 packet sniffing (libpcap/tcpdump).
314
315 Note, admin should enable this feature changing:
316 /proc/sys/net/core/bpf_jit_enable
Daniel Borkmann74451e662017-02-16 22:24:50 +0100317 /proc/sys/net/core/bpf_jit_harden (optional)
318 /proc/sys/net/core/bpf_jit_kallsyms (optional)
Eric Dumazet0a148422011-04-20 09:27:32 +0000319
John Fastabend08848242017-08-28 07:12:21 -0700320config BPF_STREAM_PARSER
321 bool "enable BPF STREAM_PARSER"
Daniel Borkmann604326b2018-10-13 02:45:58 +0200322 depends on INET
John Fastabend08848242017-08-28 07:12:21 -0700323 depends on BPF_SYSCALL
Daniel Borkmann604326b2018-10-13 02:45:58 +0200324 depends on CGROUP_BPF
John Fastabend08848242017-08-28 07:12:21 -0700325 select STREAM_PARSER
Daniel Borkmann604326b2018-10-13 02:45:58 +0200326 select NET_SOCK_MSG
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900327 help
Cong Wang88759602021-02-23 10:49:26 -0800328 Enabling this allows a TCP stream parser to be used with
Krzysztof Kozlowski43da1412019-11-21 21:28:35 +0800329 BPF_MAP_TYPE_SOCKMAP.
John Fastabend08848242017-08-28 07:12:21 -0700330
Willem de Bruijn99bbc702013-05-20 04:02:32 +0000331config NET_FLOW_LIMIT
Christoph Jaeger6341e622014-12-20 15:41:11 -0500332 bool
Willem de Bruijn99bbc702013-05-20 04:02:32 +0000333 depends on RPS
334 default y
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900335 help
Willem de Bruijn99bbc702013-05-20 04:02:32 +0000336 The network stack has to drop packets when a receive processing CPU's
337 backlog reaches netdev_max_backlog. If a few out of many active flows
338 generate the vast majority of load, drop their traffic earlier to
339 maintain capacity for the other flows. This feature provides servers
340 with many clients some protection against DoS by a single (spoofed)
341 flow that greatly exceeds average workload.
342
Linus Torvalds1da177e2005-04-16 15:20:36 -0700343menu "Network testing"
344
345config NET_PKTGEN
346 tristate "Packet Generator (USE WITH CAUTION)"
Thomas Grafffd756b2013-07-29 13:44:15 +0200347 depends on INET && PROC_FS
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900348 help
Linus Torvalds1da177e2005-04-16 15:20:36 -0700349 This module will inject preconfigured packets, at a configurable
350 rate, out of a given interface. It is used for network interface
351 stress testing and performance analysis. If you don't understand
352 what was just said, you don't need it: say N.
353
354 Documentation on how to use the packet generator can be found
Mauro Carvalho Chehabc1e4535f2020-04-30 18:04:13 +0200355 at <file:Documentation/networking/pktgen.rst>.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700356
357 To compile this code as a module, choose M here: the
358 module will be called pktgen.
359
Neil Horman273ae442009-03-11 09:53:16 +0000360config NET_DROP_MONITOR
Neil Hormancad456d2012-05-17 10:04:00 +0000361 tristate "Network packet drop alerting service"
Kees Cook911f8632012-10-02 11:19:40 -0700362 depends on INET && TRACEPOINTS
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900363 help
Krzysztof Kozlowski43da1412019-11-21 21:28:35 +0800364 This feature provides an alerting service to userspace in the
365 event that packets are discarded in the network stack. Alerts
366 are broadcast via netlink socket to any listening user space
367 process. If you don't need network drop alerts, or if you are ok
368 just checking the various proc files and other utilities for
369 drop statistics, say N here.
Neil Horman273ae442009-03-11 09:53:16 +0000370
Linus Torvalds1da177e2005-04-16 15:20:36 -0700371endmenu
372
373endmenu
374
Linus Torvalds1da177e2005-04-16 15:20:36 -0700375source "net/ax25/Kconfig"
Oliver Hartkopp0d665482007-11-16 15:52:17 -0800376source "net/can/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700377source "net/bluetooth/Kconfig"
David Howells17926a72007-04-26 15:48:28 -0700378source "net/rxrpc/Kconfig"
Tom Herbertab7ac4e2016-03-07 14:11:06 -0800379source "net/kcm/Kconfig"
Tom Herbert43a0c672016-08-15 14:51:01 -0700380source "net/strparser/Kconfig"
Adrian Bunkd86b5e02006-01-21 00:46:55 +0100381
Thomas Graf14c0b972006-08-04 03:38:38 -0700382config FIB_RULES
383 bool
384
Robert P. J. Day54420602008-07-24 12:20:09 -0400385menuconfig WIRELESS
386 bool "Wireless"
Martin Schwidefskyf54bfc02007-05-10 15:46:01 +0200387 depends on !S390
Robert P. J. Day54420602008-07-24 12:20:09 -0400388 default y
389
390if WIRELESS
Johannes Berg2a5e1c02007-04-23 12:19:12 -0700391
392source "net/wireless/Kconfig"
Jiri Bencf0706e82007-05-05 11:45:53 -0700393source "net/mac80211/Kconfig"
Johannes Berg2a5e1c02007-04-23 12:19:12 -0700394
Robert P. J. Day54420602008-07-24 12:20:09 -0400395endif # WIRELESS
Johannes Berg2a5e1c02007-04-23 12:19:12 -0700396
Ivo van Doorncf4328c2007-05-07 00:34:20 -0700397source "net/rfkill/Kconfig"
Latchesar Ionkovbd238fb2007-07-10 17:57:28 -0500398source "net/9p/Kconfig"
Sjur Braendeland3908c692010-03-30 13:56:28 +0000399source "net/caif/Kconfig"
Yehuda Sadeh3d14c5d2010-04-06 15:14:15 -0700400source "net/ceph/Kconfig"
Lauro Ramos Venancio3e256b82011-07-01 19:31:33 -0300401source "net/nfc/Kconfig"
Yotam Gigi6ae0a622017-01-23 11:07:08 +0100402source "net/psample/Kconfig"
Yotam Gigi1ce84602017-02-01 15:30:02 +0200403source "net/ife/Kconfig"
Sjur Braendeland3908c692010-03-30 13:56:28 +0000404
Roopa Prabhu499a2422015-07-21 10:43:46 +0200405config LWTUNNEL
406 bool "Network light weight tunnels"
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900407 help
Roopa Prabhu499a2422015-07-21 10:43:46 +0200408 This feature provides an infrastructure to support light weight
409 tunnels like mpls. There is no netdevice associated with a light
410 weight tunnel endpoint. Tunnel encapsulation parameters are stored
411 with light weight tunnel state associated with fib routes.
Ivo van Doorncf4328c2007-05-07 00:34:20 -0700412
Thomas Graf3a0af8f2016-11-30 17:10:10 +0100413config LWTUNNEL_BPF
414 bool "Execute BPF program as route nexthop action"
Peter Oskolkovb251f9f2019-02-15 09:51:35 -0800415 depends on LWTUNNEL && INET
Thomas Graf3a0af8f2016-11-30 17:10:10 +0100416 default y if LWTUNNEL=y
Masahiro Yamadaa7f7f622020-06-14 01:50:22 +0900417 help
Thomas Graf3a0af8f2016-11-30 17:10:10 +0100418 Allows to run BPF programs as a nexthop action following a route
419 lookup for incoming and outgoing packets.
420
Paolo Abeni911362c2016-02-12 15:43:53 +0100421config DST_CACHE
Dave Jones9b246842016-03-21 18:37:22 -0400422 bool
Paolo Abeni911362c2016-02-12 15:43:53 +0100423 default n
424
Eric Dumazet97e219b2017-02-07 15:37:15 -0800425config GRO_CELLS
426 bool
427 default n
428
Ilya Lesokhinebf4e802018-04-30 10:16:12 +0300429config SOCK_VALIDATE_XMIT
430 bool
431
Daniel Borkmann604326b2018-10-13 02:45:58 +0200432config NET_SOCK_MSG
433 bool
434 default n
435 help
436 The NET_SOCK_MSG provides a framework for plain sockets (e.g. TCP) or
437 ULPs (upper layer modules, e.g. TLS) to process L7 application data
438 with the help of BPF programs.
439
Jiri Pirkobfcd3a42016-02-26 17:32:23 +0100440config NET_DEVLINK
Jiri Pirkof6b19b32019-03-24 11:14:38 +0100441 bool
442 default n
Jiri Pirkobfcd3a42016-02-26 17:32:23 +0100443
Jesper Dangaard Brouerff7d6b22018-04-17 16:46:17 +0200444config PAGE_POOL
Krzysztof Kozlowski43da1412019-11-21 21:28:35 +0800445 bool
Jesper Dangaard Brouerff7d6b22018-04-17 16:46:17 +0200446
Sridhar Samudrala30c8bd52018-05-24 09:55:13 -0700447config FAILOVER
448 tristate "Generic failover module"
449 help
450 The failover module provides a generic interface for paravirtual
451 drivers to register a netdev and a set of ops with a failover
452 instance. The ops are used as event handlers that get called to
453 handle netdev register/unregister/link change/name change events
454 on slave pci ethernet devices with the same mac address as the
455 failover netdev. This enables paravirtual drivers to use a
456 VF as an accelerated low latency datapath. It also allows live
457 migration of VMs with direct attached VFs by failing over to the
458 paravirtual datapath when the VF is unplugged.
459
Michal Kubecek2b4a8992019-12-27 15:55:18 +0100460config ETHTOOL_NETLINK
461 bool "Netlink interface for ethtool"
462 default y
463 help
464 An alternative userspace interface for ethtool based on generic
465 netlink. It provides better extensibility and some new features,
466 e.g. notification messages.
467
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700468endif # if NET
Sam Ravnborge47b65b2012-05-21 20:45:37 +0200469
Daniel Borkmann60777762016-05-13 19:08:28 +0200470# Used by archs to tell that they support BPF JIT compiler plus which flavour.
471# Only one of the two can be selected for a specific arch since eBPF JIT supersedes
472# the cBPF JIT.
473
474# Classic BPF JIT (cBPF)
475config HAVE_CBPF_JIT
476 bool
477
478# Extended BPF JIT (eBPF)
479config HAVE_EBPF_JIT
Sam Ravnborge47b65b2012-05-21 20:45:37 +0200480 bool