blob: 11f8c22af34d09f59755c8c87de137e1879e6845 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001#
2# Network configuration
3#
4
Robert P. J. Day031cf192008-07-30 03:14:01 -07005menuconfig NET
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 bool "Networking support"
Geert Uytterhoevene9cc8bd2009-03-04 14:53:30 +08007 select NLATTR
Andy Shevchenko4cd57732013-06-04 19:46:26 +03008 select GENERIC_NET_UTILS
Alexei Starovoitovf89b7752014-10-23 18:41:08 -07009 select BPF
Linus Torvalds1da177e2005-04-16 15:20:36 -070010 ---help---
11 Unless you really know what you are doing, you should say Y here.
12 The reason is that some programs need kernel networking support even
13 when running on a stand-alone machine that isn't connected to any
Sam Ravnborgd5950b42005-07-11 21:03:49 -070014 other computer.
15
16 If you are upgrading from an older kernel, you
Linus Torvalds1da177e2005-04-16 15:20:36 -070017 should consider updating your networking tools too because changes
18 in the kernel and the tools often go hand in hand. The tools are
19 contained in the package net-tools, the location and version number
20 of which are given in <file:Documentation/Changes>.
21
22 For a general introduction to Linux networking, it is highly
23 recommended to read the NET-HOWTO, available from
24 <http://www.tldp.org/docs.html#howto>.
25
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070026if NET
27
Johannes Berg1dacc762009-07-01 11:26:02 +000028config WANT_COMPAT_NETLINK_MESSAGES
29 bool
30 help
31 This option can be selected by other options that need compat
32 netlink messages.
33
34config COMPAT_NETLINK_MESSAGES
35 def_bool y
36 depends on COMPAT
David S. Miller40b53d82010-07-26 13:13:49 -070037 depends on WEXT_CORE || WANT_COMPAT_NETLINK_MESSAGES
Johannes Berg1dacc762009-07-01 11:26:02 +000038 help
39 This option makes it possible to send different netlink messages
40 to tasks depending on whether the task is a compat task or not. To
41 achieve this, you need to set skb_shinfo(skb)->frag_list to the
42 compat skb before sending the skb, the netlink code will sort out
43 which message to actually pass to the task.
44
45 Newly written code should NEVER need this option but do
46 compat-independent messages instead!
47
Pablo Neira1cf519002015-05-13 18:19:37 +020048config NET_INGRESS
49 bool
50
Linus Torvalds1da177e2005-04-16 15:20:36 -070051menu "Networking options"
Linus Torvalds1da177e2005-04-16 15:20:36 -070052
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070053source "net/packet/Kconfig"
54source "net/unix/Kconfig"
55source "net/xfrm/Kconfig"
Martin Schwidefsky2356f4c2007-02-08 13:37:42 -080056source "net/iucv/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -070057
58config INET
59 bool "TCP/IP networking"
David S. Miller798b2cb2012-09-04 14:20:14 -040060 select CRYPTO
61 select CRYPTO_AES
Linus Torvalds1da177e2005-04-16 15:20:36 -070062 ---help---
63 These are the protocols used on the Internet and on most local
64 Ethernets. It is highly recommended to say Y here (this will enlarge
YOSHIFUJI Hideakicf80efc2008-02-12 17:35:16 +090065 your kernel by about 400 KB), since some programs (e.g. the X window
Linus Torvalds1da177e2005-04-16 15:20:36 -070066 system) use TCP/IP even if your machine is not connected to any
67 other computer. You will get the so-called loopback device which
68 allows you to ping yourself (great fun, that!).
69
70 For an excellent introduction to Linux networking, please read the
71 Linux Networking HOWTO, available from
72 <http://www.tldp.org/docs.html#howto>.
73
74 If you say Y here and also to "/proc file system support" and
75 "Sysctl support" below, you can change various aspects of the
76 behavior of the TCP/IP code by writing to the (virtual) files in
77 /proc/sys/net/ipv4/*; the options are explained in the file
78 <file:Documentation/networking/ip-sysctl.txt>.
79
80 Short answer: say Y.
81
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070082if INET
Linus Torvalds1da177e2005-04-16 15:20:36 -070083source "net/ipv4/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -070084source "net/ipv6/Kconfig"
Paul Moore38c94372006-11-05 16:44:06 -080085source "net/netlabel/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -070086
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -070087endif # if INET
88
James Morris984bc162006-06-09 00:29:17 -070089config NETWORK_SECMARK
90 bool "Security Marking"
91 help
92 This enables security marking of network packets, similar
93 to nfmark, but designated for security purposes.
94 If you are unsure how to answer this question, answer N.
95
Daniel Borkmann408eccc2014-04-01 16:20:23 +020096config NET_PTP_CLASSIFY
97 def_bool n
98
Richard Cochranc1f19b52010-07-17 08:49:36 +000099config NETWORK_PHY_TIMESTAMPING
100 bool "Timestamping in PHY devices"
Daniel Borkmann408eccc2014-04-01 16:20:23 +0200101 select NET_PTP_CLASSIFY
Richard Cochranc1f19b52010-07-17 08:49:36 +0000102 help
103 This allows timestamping of network packets by PHYs with
104 hardware timestamping capabilities. This option adds some
105 overhead in the transmit and receive paths.
106
107 If you are unsure how to answer this question, answer N.
108
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109menuconfig NETFILTER
Pablo Neira Ayusoef91fd52006-11-29 02:35:43 +0100110 bool "Network packet filtering framework (Netfilter)"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111 ---help---
112 Netfilter is a framework for filtering and mangling network packets
113 that pass through your Linux box.
114
115 The most common use of packet filtering is to run your Linux box as
116 a firewall protecting a local network from the Internet. The type of
117 firewall provided by this kernel support is called a "packet
118 filter", which means that it can reject individual network packets
119 based on type, source, destination etc. The other kind of firewall,
120 a "proxy-based" one, is more secure but more intrusive and more
121 bothersome to set up; it inspects the network traffic much more
122 closely, modifies it and has knowledge about the higher level
123 protocols, which a packet filter lacks. Moreover, proxy-based
124 firewalls often require changes to the programs running on the local
125 clients. Proxy-based firewalls don't need support by the kernel, but
126 they are often combined with a packet filter, which only works if
127 you say Y here.
128
129 You should also say Y here if you intend to use your Linux box as
130 the gateway to the Internet for a local network of machines without
131 globally valid IP addresses. This is called "masquerading": if one
132 of the computers on your local network wants to send something to
133 the outside, your box can "masquerade" as that computer, i.e. it
134 forwards the traffic to the intended outside destination, but
135 modifies the packets to make it look like they came from the
136 firewall box itself. It works both ways: if the outside host
137 replies, the Linux box will silently forward the traffic to the
138 correct local computer. This way, the computers on your local net
139 are completely invisible to the outside world, even though they can
140 reach the outside and can receive replies. It is even possible to
141 run globally visible servers from within a masqueraded local network
142 using a mechanism called portforwarding. Masquerading is also often
143 called NAT (Network Address Translation).
144
145 Another use of Netfilter is in transparent proxying: if a machine on
146 the local network tries to connect to an outside host, your Linux
147 box can transparently forward the traffic to a local server,
148 typically a caching proxy server.
149
150 Yet another use of Netfilter is building a bridging firewall. Using
151 a bridge with Network packet filtering enabled makes iptables "see"
152 the bridged traffic. For filtering on the lower network and Ethernet
153 protocols over the bridge, use ebtables (under bridge netfilter
154 configuration).
155
156 Various modules exist for netfilter which replace the previous
157 masquerading (ipmasqadm), packet filtering (ipchains), transparent
158 proxying, and portforwarding mechanisms. Please see
159 <file:Documentation/Changes> under "iptables" for the location of
160 these packages.
161
Linus Torvalds1da177e2005-04-16 15:20:36 -0700162if NETFILTER
163
164config NETFILTER_DEBUG
165 bool "Network packet filtering debugging"
166 depends on NETFILTER
167 help
168 You can say Y here if you want to get additional messages useful in
169 debugging the netfilter code.
170
Patrick McHardy33b8e772007-12-17 22:47:05 -0800171config NETFILTER_ADVANCED
172 bool "Advanced netfilter configuration"
173 depends on NETFILTER
174 default y
175 help
176 If you say Y here you can select between all the netfilter modules.
Matt LaPlante692105b2009-01-26 11:12:25 +0100177 If you say N the more unusual ones will not be shown and the
Patrick McHardy33b8e772007-12-17 22:47:05 -0800178 basic ones needed by most people will default to 'M'.
179
180 If unsure, say Y.
181
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182config BRIDGE_NETFILTER
Pablo Neira Ayuso34666d42014-09-18 11:29:03 +0200183 tristate "Bridged IP/ARP packets filtering"
Florian Westphal57f58772014-09-30 10:59:18 +0200184 depends on BRIDGE
Pablo Neira Ayuso34666d42014-09-18 11:29:03 +0200185 depends on NETFILTER && INET
Patrick McHardy33b8e772007-12-17 22:47:05 -0800186 depends on NETFILTER_ADVANCED
Pablo Neira Ayuso34666d42014-09-18 11:29:03 +0200187 default m
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188 ---help---
189 Enabling this option will let arptables resp. iptables see bridged
190 ARP resp. IP traffic. If you want a bridging firewall, you probably
191 want this option enabled.
192 Enabling or disabling this option doesn't enable or disable
193 ebtables.
194
195 If unsure, say N.
196
Harald Welte9eb0eec2005-09-17 00:41:21 -0700197source "net/netfilter/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198source "net/ipv4/netfilter/Kconfig"
199source "net/ipv6/netfilter/Kconfig"
200source "net/decnet/netfilter/Kconfig"
201source "net/bridge/netfilter/Kconfig"
202
203endif
204
Arnaldo Carvalho de Melo7c657872005-08-09 20:14:34 -0700205source "net/dccp/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700206source "net/sctp/Kconfig"
Andy Groverfe17f842009-02-24 15:30:39 +0000207source "net/rds/Kconfig"
Per Liden1e63e682006-01-16 16:39:13 +0100208source "net/tipc/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700209source "net/atm/Kconfig"
James Chapmanfd558d12010-04-02 06:18:33 +0000210source "net/l2tp/Kconfig"
Patrick McHardya19800d2008-07-05 21:25:39 -0700211source "net/802/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700212source "net/bridge/Kconfig"
Lennert Buytenhek91da11f2008-10-07 13:44:02 +0000213source "net/dsa/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700214source "net/8021q/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215source "net/decnet/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700216source "net/llc/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217source "net/ipx/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218source "drivers/net/appletalk/Kconfig"
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700219source "net/x25/Kconfig"
220source "net/lapb/Kconfig"
remi.denis-courmont@nokia50751382009-01-23 03:00:25 +0000221source "net/phonet/Kconfig"
Alexander Aring2c6bed72014-07-11 10:24:18 +0200222source "net/6lowpan/Kconfig"
Sergey Lapin9ec76712009-06-08 12:18:48 +0000223source "net/ieee802154/Kconfig"
alex.bluesman.smirnov@gmail.com1010f542012-05-15 20:50:20 +0000224source "net/mac802154/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700225source "net/sched/Kconfig"
Alexander Duyck2f90b862008-11-20 20:52:10 -0800226source "net/dcb/Kconfig"
Wang Lei1a4240f2010-08-04 15:16:33 +0100227source "net/dns_resolver/Kconfig"
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000228source "net/batman-adv/Kconfig"
Jesse Grossccb13522011-10-25 19:26:31 -0700229source "net/openvswitch/Kconfig"
Andy Kingd021c342013-02-06 14:23:56 +0000230source "net/vmw_vsock/Kconfig"
Andrey Vagineaaa3132013-03-21 20:33:48 +0400231source "net/netlink/Kconfig"
Simon Horman0d89d202013-05-23 21:02:52 +0000232source "net/mpls/Kconfig"
Arvid Brodinf4214362013-10-30 21:10:47 +0100233source "net/hsr/Kconfig"
Jiri Pirko007f7902014-11-28 14:34:17 +0100234source "net/switchdev/Kconfig"
David Ahern1b69c6d2015-09-29 20:07:11 -0700235source "net/l3mdev/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236
Eric Dumazetdf334542010-03-24 19:13:54 +0000237config RPS
Christoph Jaeger6341e622014-12-20 15:41:11 -0500238 bool
Yuanhan Liu044c8d42013-11-21 14:32:01 -0800239 depends on SMP && SYSFS
Eric Dumazetdf334542010-03-24 19:13:54 +0000240 default y
241
Ben Hutchingsc4454772011-01-19 11:03:53 +0000242config RFS_ACCEL
Christoph Jaeger6341e622014-12-20 15:41:11 -0500243 bool
Martin Schwidefsky0244ad02013-08-30 09:39:53 +0200244 depends on RPS
Ben Hutchingsc4454772011-01-19 11:03:53 +0000245 select CPU_RMAP
246 default y
247
Tom Herbertbf264142010-11-26 08:36:09 +0000248config XPS
Christoph Jaeger6341e622014-12-20 15:41:11 -0500249 bool
Yuanhan Liu044c8d42013-11-21 14:32:01 -0800250 depends on SMP
Tom Herbertbf264142010-11-26 08:36:09 +0000251 default y
252
Tejun Heo2a56a1f2015-12-07 17:38:52 -0500253config SOCK_CGROUP_DATA
254 bool
255 default n
256
Daniel Borkmann86f85152013-12-29 17:27:11 +0100257config CGROUP_NET_PRIO
Tejun Heoaf636332014-02-08 10:36:58 -0500258 bool "Network priority cgroup"
Neil Horman5bc14212011-11-22 05:10:51 +0000259 depends on CGROUPS
Tejun Heo2a56a1f2015-12-07 17:38:52 -0500260 select SOCK_CGROUP_DATA
Neil Horman5bc14212011-11-22 05:10:51 +0000261 ---help---
262 Cgroup subsystem for use in assigning processes to network priorities on
Daniel Borkmann86f85152013-12-29 17:27:11 +0100263 a per-interface basis.
Neil Horman5bc14212011-11-22 05:10:51 +0000264
Daniel Borkmannfe1217c2013-12-29 18:27:10 +0100265config CGROUP_NET_CLASSID
Christoph Jaeger6341e622014-12-20 15:41:11 -0500266 bool "Network classid cgroup"
Daniel Borkmannfe1217c2013-12-29 18:27:10 +0100267 depends on CGROUPS
Tejun Heo2a56a1f2015-12-07 17:38:52 -0500268 select SOCK_CGROUP_DATA
Daniel Borkmannfe1217c2013-12-29 18:27:10 +0100269 ---help---
270 Cgroup subsystem for use as general purpose socket classid marker that is
271 being used in cls_cgroup and for netfilter matching.
272
Cong Wange0d10952013-08-01 11:10:25 +0800273config NET_RX_BUSY_POLL
Christoph Jaeger6341e622014-12-20 15:41:11 -0500274 bool
Eliezer Tamir89bf1b52013-06-14 16:33:46 +0300275 default y
Eliezer Tamir06021292013-06-10 11:39:50 +0300276
Tom Herbert114cf582011-11-28 16:33:09 +0000277config BQL
Christoph Jaeger6341e622014-12-20 15:41:11 -0500278 bool
Tom Herbert114cf582011-11-28 16:33:09 +0000279 depends on SYSFS
280 select DQL
281 default y
282
Eric Dumazet0a148422011-04-20 09:27:32 +0000283config BPF_JIT
284 bool "enable BPF Just In Time compiler"
285 depends on HAVE_BPF_JIT
Eric Dumazetb6202f92011-04-29 10:20:53 -0700286 depends on MODULES
Eric Dumazet0a148422011-04-20 09:27:32 +0000287 ---help---
288 Berkeley Packet Filter filtering capabilities are normally handled
289 by an interpreter. This option allows kernel to generate a native
290 code when filter is loaded in memory. This should speedup
291 packet sniffing (libpcap/tcpdump). Note : Admin should enable
292 this feature changing /proc/sys/net/core/bpf_jit_enable
293
Willem de Bruijn99bbc702013-05-20 04:02:32 +0000294config NET_FLOW_LIMIT
Christoph Jaeger6341e622014-12-20 15:41:11 -0500295 bool
Willem de Bruijn99bbc702013-05-20 04:02:32 +0000296 depends on RPS
297 default y
298 ---help---
299 The network stack has to drop packets when a receive processing CPU's
300 backlog reaches netdev_max_backlog. If a few out of many active flows
301 generate the vast majority of load, drop their traffic earlier to
302 maintain capacity for the other flows. This feature provides servers
303 with many clients some protection against DoS by a single (spoofed)
304 flow that greatly exceeds average workload.
305
Linus Torvalds1da177e2005-04-16 15:20:36 -0700306menu "Network testing"
307
308config NET_PKTGEN
309 tristate "Packet Generator (USE WITH CAUTION)"
Thomas Grafffd756b2013-07-29 13:44:15 +0200310 depends on INET && PROC_FS
Linus Torvalds1da177e2005-04-16 15:20:36 -0700311 ---help---
312 This module will inject preconfigured packets, at a configurable
313 rate, out of a given interface. It is used for network interface
314 stress testing and performance analysis. If you don't understand
315 what was just said, you don't need it: say N.
316
317 Documentation on how to use the packet generator can be found
318 at <file:Documentation/networking/pktgen.txt>.
319
320 To compile this code as a module, choose M here: the
321 module will be called pktgen.
322
Stephen Hemmingera42e9d62006-06-05 17:30:32 -0700323config NET_TCPPROBE
324 tristate "TCP connection probing"
Kees Cook911f8632012-10-02 11:19:40 -0700325 depends on INET && PROC_FS && KPROBES
Stephen Hemmingera42e9d62006-06-05 17:30:32 -0700326 ---help---
327 This module allows for capturing the changes to TCP connection
Dave Jones9dadaa192006-06-08 23:42:09 -0700328 state in response to incoming packets. It is used for debugging
Stephen Hemmingera42e9d62006-06-05 17:30:32 -0700329 TCP congestion avoidance modules. If you don't understand
330 what was just said, you don't need it: say N.
331
Grant Grundler82fe7c92006-09-25 23:47:14 -0700332 Documentation on how to use TCP connection probing can be found
Michael Wittenc996d8b2010-11-15 19:55:34 +0000333 at:
334
335 http://www.linuxfoundation.org/collaborate/workgroups/networking/tcpprobe
Stephen Hemmingera42e9d62006-06-05 17:30:32 -0700336
337 To compile this code as a module, choose M here: the
338 module will be called tcp_probe.
339
Neil Horman273ae442009-03-11 09:53:16 +0000340config NET_DROP_MONITOR
Neil Hormancad456d2012-05-17 10:04:00 +0000341 tristate "Network packet drop alerting service"
Kees Cook911f8632012-10-02 11:19:40 -0700342 depends on INET && TRACEPOINTS
Neil Horman273ae442009-03-11 09:53:16 +0000343 ---help---
344 This feature provides an alerting service to userspace in the
345 event that packets are discarded in the network stack. Alerts
346 are broadcast via netlink socket to any listening user space
347 process. If you don't need network drop alerts, or if you are ok
348 just checking the various proc files and other utilities for
349 drop statistics, say N here.
350
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351endmenu
352
353endmenu
354
Linus Torvalds1da177e2005-04-16 15:20:36 -0700355source "net/ax25/Kconfig"
Oliver Hartkopp0d665482007-11-16 15:52:17 -0800356source "net/can/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357source "net/irda/Kconfig"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358source "net/bluetooth/Kconfig"
David Howells17926a72007-04-26 15:48:28 -0700359source "net/rxrpc/Kconfig"
Adrian Bunkd86b5e02006-01-21 00:46:55 +0100360
Thomas Graf14c0b972006-08-04 03:38:38 -0700361config FIB_RULES
362 bool
363
Robert P. J. Day54420602008-07-24 12:20:09 -0400364menuconfig WIRELESS
365 bool "Wireless"
Martin Schwidefskyf54bfc02007-05-10 15:46:01 +0200366 depends on !S390
Robert P. J. Day54420602008-07-24 12:20:09 -0400367 default y
368
369if WIRELESS
Johannes Berg2a5e1c02007-04-23 12:19:12 -0700370
371source "net/wireless/Kconfig"
Jiri Bencf0706e82007-05-05 11:45:53 -0700372source "net/mac80211/Kconfig"
Johannes Berg2a5e1c02007-04-23 12:19:12 -0700373
Robert P. J. Day54420602008-07-24 12:20:09 -0400374endif # WIRELESS
Johannes Berg2a5e1c02007-04-23 12:19:12 -0700375
Inaky Perez-Gonzalezb0c83ae2008-12-23 16:18:24 -0800376source "net/wimax/Kconfig"
377
Ivo van Doorncf4328c2007-05-07 00:34:20 -0700378source "net/rfkill/Kconfig"
Latchesar Ionkovbd238fb2007-07-10 17:57:28 -0500379source "net/9p/Kconfig"
Sjur Braendeland3908c692010-03-30 13:56:28 +0000380source "net/caif/Kconfig"
Yehuda Sadeh3d14c5d2010-04-06 15:14:15 -0700381source "net/ceph/Kconfig"
Lauro Ramos Venancio3e256b82011-07-01 19:31:33 -0300382source "net/nfc/Kconfig"
Sjur Braendeland3908c692010-03-30 13:56:28 +0000383
Roopa Prabhu499a2422015-07-21 10:43:46 +0200384config LWTUNNEL
385 bool "Network light weight tunnels"
386 ---help---
387 This feature provides an infrastructure to support light weight
388 tunnels like mpls. There is no netdevice associated with a light
389 weight tunnel endpoint. Tunnel encapsulation parameters are stored
390 with light weight tunnel state associated with fib routes.
Ivo van Doorncf4328c2007-05-07 00:34:20 -0700391
Sam Ravnborg6a2e9b72005-07-11 21:13:56 -0700392endif # if NET
Sam Ravnborge47b65b2012-05-21 20:45:37 +0200393
394# Used by archs to tell that they support BPF_JIT
395config HAVE_BPF_JIT
396 bool