From patchwork Mon Jun 19 14:57:50 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric DeVolder X-Patchwork-Id: 110052 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp3065068vqr; Mon, 19 Jun 2023 08:02:38 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7geTaCgB1x1WcK8LRiawOsd7lcvyuJXaMWqjAavolhx42CnPr7VnTc85FM4KMUq+m5PI8m X-Received: by 2002:a17:903:124d:b0:1aa:cf25:41d0 with SMTP id u13-20020a170903124d00b001aacf2541d0mr8666736plh.33.1687186957614; Mon, 19 Jun 2023 08:02:37 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1687186957; cv=pass; d=google.com; s=arc-20160816; b=vQZjstNKl4ZrkHoWTQknJ1l0LjVIf7d99UzBz/Vd6u7IYTf/XcO/YHEllR/Ne7L0P6 58wRY08ykml69YAaYOng11OjNN+I5k+Et3cZuYkoWNboZ37kiYED/ce8Z3OKgQeEtfnj /Ji39tYL/56fYW34pDHpWQOSeH7KpZ3NeFyyXahDJMsHXY7ukPwgHuNmWMMdLiAN0ZhW 3wz4AqqAcOQlUd6lZ+kPsqva52X3pcXIdXA29IcOO3O3NgQwJIe/n9M2Dr6UMQNQPNs3 QJzYoCbk/k/KVnYZZ4qUmhCzE2Ko3hk6brXVGs4RCWvL27hsGPsYS2QsCaxy97yZZtNn Valg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=yp7EQnytjUrxBmev2JWyYbQq943kCS+gdirGnmzZh/ctSNYxCYSR7ELVsNyLUkW8EB wG+m6+bJd4UesBOGCn0zF+mjKwbigazuOBnrcGlklSdcjweStNfUBpk9BwJpFLFSP3Yp iFq/DESXGD4XVRBR/DruUPZ/Yc8VZ6VYzTCXYN2VOsHOUGjS4nMWfb8sneFZlpSy+MLb PjlZo+Daf7kqcL0a5M5p3ZXwj18TlRJy8MpY6Eb87xxTIl/uWh/9aJiYPgsAoWOtPLgX IlSoKMGi4buYLMx94MuaOmRcuY9S3EpWSGPDgFumVH68/mRbZMm1cPU39/MEjqCtaSXK zD9Q== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b="Ie/kr42Z"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=ZMRGYmq4; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l8-20020a170902f68800b001b526e9bb43si8375459plg.249.2023.06.19.08.02.22; Mon, 19 Jun 2023 08:02:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b="Ie/kr42Z"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=ZMRGYmq4; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232323AbjFSO71 (ORCPT + 99 others); Mon, 19 Jun 2023 10:59:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49956 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232278AbjFSO7N (ORCPT ); Mon, 19 Jun 2023 10:59:13 -0400 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F04810CE; Mon, 19 Jun 2023 07:58:54 -0700 (PDT) Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 35J9nTMX029345; Mon, 19 Jun 2023 14:58:33 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2023-03-30; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=Ie/kr42Zfj3pe47GKxAjri/uC59bCzESuI5u41NVPQ5t7V7VeRprmLipErk0DJlk292z ExuXLWEVV+SRSdlDn+xczREPQRAMutYd48/zedEykZhw/wRGPNbhPiuuHThaZhTjL9j2 nSFBJg9unTU/Uj/MQnohBt3grldq6Q1O5EYV1whjecpSVwDGOml02kVxToNKpRxt/JwL LzrlyoiXBfnP4GW1eH4KgOCBs3ikpjYwyyO6eMxaV1sN1d2HnZbRQzKgu4NNHagLdfED 5tZw16mKtZiPcktTGUodtfBfttW/hynZnFJV15mgHeBZl4uOjC4M93uFJNjIOygeSh/E kQ== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3r95cttv20-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jun 2023 14:58:32 +0000 Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 35JD9mdB005929; Mon, 19 Jun 2023 14:58:31 GMT Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2047.outbound.protection.outlook.com [104.47.74.47]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3r93939jdk-3 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jun 2023 14:58:31 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KNC/G9SLi9IkzdrUq9w93elJjMY1L1CI6A7NIFpEdmm/VTqwspnQaa4nuWH3S5AHvimAxY/UEfQZUC6nVv8KouDI1aLY3eMW2pXF5Lu/GlRB78srOOZ2PqqfCQRIjeF+HnC1L2XEaXR/j0yMvxasM7mNkhYfv77SUOMldD2QqauRGXDJYDFWAg9vGAF1M8b97NL4vD2Dw0VxG3BV/BfkZ2v9ssuj/pXK53RhI5POJeEGr0EvpGoqKWT2SQFGQ5Sktq0DGayYeU0wP/lt6pXoQ08Nc95+BtcEASyQ6FZWd39B7iN9rRCGfTD1EGrpBG6T9p+2UlPr65IIWDwThP63/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=TVs0Tfoj3X0r9MUiuIA9FbNmp4VznA/CetBHeWa4L229WJwLIhH3UXfFO6+w+wrw21Ga7DGl7VrFQjpZNbmZn34zXNZ0CF383fulHfFYiPY5ttKjPnV8Xlu/LXnFXk7eBlNj90NlW+ws3P59JFcDjiXc3XRev5fY/Q95ilFtPgQLexwegpEfuJAXl4TRAJLZo7NlTIUik2lAPNhceAhj71Sk6De8KkyI4VqaQ4rJf0x1/3o3TdogAAbqWZzW1vY3+/+X79gUS58lvxPRt3IhWEO0hbDsH1vAnwJbUHoQpSgRPzuFlIOVb6KohJHOTaSFp4VmyqsTW7hLLWJXRfjDww== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=ZMRGYmq4pvCmkj4cLtbYf6TYYYQKzZ9h4Az515G7cpFpI1icouv9GSYUZdfiXuC9MEnrPoDxOFos4Eo6xhkdy2JA7jghFAqktFHXVF5iZCyr5+wng1nYkSd82tK6Kwu+KGJ9lOVr6BOvQj2kG0s/2o4DPJ0bxja4EbEWL2PBxTc= Received: from CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) by SA1PR10MB6543.namprd10.prod.outlook.com (2603:10b6:806:2bc::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.36; Mon, 19 Jun 2023 14:58:19 +0000 Received: from CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048]) by CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048%5]) with mapi id 15.20.6500.036; Mon, 19 Jun 2023 14:58:16 +0000 From: Eric DeVolder To: linux@armlinux.org.uk, catalin.marinas@arm.com, will@kernel.org, chenhuacai@kernel.org, geert@linux-m68k.org, tsbogend@alpha.franken.de, James.Bottomley@HansenPartnership.com, deller@gmx.de, ysato@users.sourceforge.jp, dalias@libc.org, glaubitz@physik.fu-berlin.de, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org Cc: kernel@xen0n.name, mpe@ellerman.id.au, npiggin@gmail.com, christophe.leroy@csgroup.eu, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, borntraeger@linux.ibm.com, svens@linux.ibm.com, hpa@zytor.com, keescook@chromium.org, paulmck@kernel.org, peterz@infradead.org, frederic@kernel.org, akpm@linux-foundation.org, ardb@kernel.org, samitolvanen@google.com, juerg.haefliger@canonical.com, arnd@arndb.de, rmk+kernel@armlinux.org.uk, linus.walleij@linaro.org, sebastian.reichel@collabora.com, rppt@kernel.org, kirill.shutemov@linux.intel.com, anshuman.khandual@arm.com, ziy@nvidia.com, masahiroy@kernel.org, ndesaulniers@google.com, mhiramat@kernel.org, ojeda@kernel.org, thunder.leizhen@huawei.com, xin3.li@intel.com, tj@kernel.org, gregkh@linuxfoundation.org, tsi@tuyoix.net, bhe@redhat.com, hbathini@linux.ibm.com, sourabhjain@linux.ibm.com, eric.devolder@oracle.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Subject: [PATCH v2 02/13] x86/kexec: refactor for kernel/Kconfig.kexec Date: Mon, 19 Jun 2023 10:57:50 -0400 Message-Id: <20230619145801.1064716-3-eric.devolder@oracle.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20230619145801.1064716-1-eric.devolder@oracle.com> References: <20230619145801.1064716-1-eric.devolder@oracle.com> X-ClientProxiedBy: DM6PR06CA0084.namprd06.prod.outlook.com (2603:10b6:5:336::17) To CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1PR10MB4531:EE_|SA1PR10MB6543:EE_ X-MS-Office365-Filtering-Correlation-Id: 090ce134-e2a8-45b7-cd0e-08db70d59cbe X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR10MB4531.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(39860400002)(396003)(346002)(366004)(136003)(376002)(451199021)(7416002)(7366002)(66946007)(7406005)(8936002)(8676002)(66556008)(66476007)(107886003)(1076003)(26005)(186003)(6506007)(6512007)(36756003)(83380400001)(41300700001)(38100700002)(5660300002)(4326008)(316002)(2616005)(921005)(6666004)(6486002)(478600001)(2906002)(86362001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 2 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: nhtI56KAU0oEb1bfiTXM3DfL8jws5q530SXR2OPP6LY6qu5W5BFAYEKg2efh+sq/usRYS+e1Rxd5mc2ZNcXumeeokJsTYEtUcFonbuUTsqZv7Mu/Z4xjj8CwpIx1qdEH5/LIUTWMw8hvQw//kMQS0W5NWNqclmSN5N8Uxc5H9O6ZghGrVh/o80zFMm42xqthn6vKShVfFXyzyfFRp/cZilG7I3R0H0Qfl7FQ1G0+5EOrJdSvHcHFSoLlsNqixBB/TMFfVfN6yj/jqtNvQGMWkjU8qo3y96C5Dumqo5Y1Mw2ErjwsflcVaGQU6ZMZ2s1PKlDZun6roCknDIQ4POfAy/0ifpWd73sWHTK99oBRwax06gDfPppofGpK0EmUpBdB7L1C9HsRJY9ddnEJ8U4fqK4GHfNuiu2V03R2C0M/rIaacuDC8iJ4Y/cRlEQtB4z57ACNZ6GbSV6i9ASqY00rgjFO9WkwuplhNPdBDjKTGdN57yCfB0nQOFE59sX2iIYQw8Kw1TuROQNBDq7ekzgEk0sed/FPlPu32tSsLr7K1DpA5ngA6QQ4pd4067VZAB9m7Y8jYmaXDDBiSxxsXrEYWchghQiEOLa4MIxwmpr5udvdCcVt71Eutu4t5YM62008JIbbdHFXaf0yHYMPDCm4Tw7AWwWg1vpryy0MQZfZyxhcgwormTpJ9de6mz73TXNDolUW8xc+V1F/nMQ6KQc/Gein2SXhoig9JMiE2EXmVmtiqTpW05bHePH8BAVm3TWMsxed+OQ6RwEUS16cVgHir+0aK145LAtRgtWqSj+J9iot9Ipk4pFiu6/iDCuF+AjnoyoUK8R4MerfarwFSx8QG9/w5jL/RJoBlGfkAP61pcrVrc5g1MbW6DEqIlYISHkQP+iLckp9rbrW8i5tFLAPPdJxINKgS7Tg+t2Xa0GnvIo4psomtfZXE928nZxx1L2NMIgqdJdLNuLOcB0EtdnyM9Od4BEzAttk0K7RlEaK0QQyFWWvjb+KHWDNa8wCRgMl9F/09SgExGZztlaaJPVqQh1Fgob3g6TW/uGiOihVUxO/1+T4yqXGwTpQS0xqofAg+m9wUDPo4FQsAfkpnHrhZbasOXyir7+lbtfhNP6P2B+Yx5uk8Hf3qrCua2MECQy0Q3NgTmb2/ngVQKP9mCL3qWo4guPyO4k7DApodHiqnM0nj0duETKmjy5rfKqNf4jdyZG8LxGXF7d2UpmVJqvaIEYzUTWTZjPtz7hzYzmSVb1U8NCR7IPV861rIxpPFGAbauCssmvVrykDQtZ8BFo8msANY4wHqLZZLtyUM1bq17RzYxG5uarKXT2UPKPg5Wln3RCymXR1T8MaftRvoiI0DKzQf2qGFSjTxHTj95PgRHzlzoQ34dbj/yoaloRVyqmC+1p7gL2ZsA0dPTMwMe+5PHuXjXkHPYoMOXQFG/ieh6M+cFWr1ibH8LFk2XqNTF7mDNddHxIzHkGcAdgYSzoKjhwRyu7LiRH/ZXf6UzjBTCmJcMbNd44+ESWNRoS5+ZeKYSpi/ARle2F5iJaKW788XBagpOCGanjQxkKY0zrWDFv/kxeGN/V0/hT7eGsWsF+xRCXohqhEr1teVNzxoMd0tV/LedoqNX8b42TpKtiQEGC/PdQ3oOr6pRY9kHw6fMgyI50fZCkLk+NGb+sFQIP1A2JgA5hplNwxGNw5mNqoGGKxahzwMol6vcoVr0HYsydF8dq+WCroGuwdqPsbHEjbiIrJ9EXONhHIWXcOVcj2HTx5/mMDynUF20HFICW4wJRr26ZIequA X-MS-Exchange-AntiSpam-ExternalHop-MessageData-1: I2fGMIYx6pP8T7+NrGTbKfj50fN3p6n3Nwf1firFGZ32BxKsynH+dAUO57LJoOQI8eXbX+GWzMyy+sDXq47wdSJ2ItvWgh7i4jHD2LRfn7SYivJkoQNq0WQEG44r7b2UtJ8pO0OSDWQ38uAwSGksgPB4085xPo6VRFbut7OWoxGDeVkAIMSecVbqqCfq5fnBw9CpMxQUV6kb+dPE/vqpBqTeahDX05Fg6+BZIqpqe312hIkFsUuCzNsMLD2vpESBF8x9c1CC9Tqsu6/mrYr0aoNB5REPJi4TcClPc/z9ipYSSIVgM7QS8j61uiUlwav5gf1T6FzYaE4Sn78rdc9DG61Ec3eMX/3wH/Op55OzWoOitR+Jc5Mf2tPsyYM/w2qVa/DXlz0HySSYojQ4fTHzYsNOXYGsYtx3DyJxmSbBMBlY+SkFPgF/Po6UkZ7bOunQwzjDtPs02IGgcA== X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 090ce134-e2a8-45b7-cd0e-08db70d59cbe X-MS-Exchange-CrossTenant-AuthSource: CO1PR10MB4531.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Jun 2023 14:58:16.4560 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: dCsgTyOqbnj4Xj8vUn+3KPM4Aw6UwlOH/ic7KZICF7Afr9DV0JAmxsfPdS/s9xhHyuGf6rZGy4k7L50V40TAohZrbiSOwEH9PbTfyABYNWE= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR10MB6543 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-06-19_11,2023-06-16_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 adultscore=0 spamscore=0 bulkscore=0 malwarescore=0 phishscore=0 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2305260000 definitions=main-2306190137 X-Proofpoint-GUID: 8lEqwjPk3mns1e8sRyRZrpd1s-nTwbQ1 X-Proofpoint-ORIG-GUID: 8lEqwjPk3mns1e8sRyRZrpd1s-nTwbQ1 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1769143751190918788?= X-GMAIL-MSGID: =?utf-8?q?1769143751190918788?= The kexec and crash kernel options are provided in the common kernel/Kconfig.kexec. Utilize the common options and provide the ARCH_SUPPORTS_ and ARCH_SELECTS_ entries to recreate the equivalent set of KEXEC and CRASH options. Signed-off-by: Eric DeVolder --- arch/x86/Kconfig | 89 +++++++----------------------------------------- 1 file changed, 13 insertions(+), 76 deletions(-) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 53bab123a8ee..1afc6ca2986b 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -2043,88 +2043,25 @@ config EFI_RUNTIME_MAP source "kernel/Kconfig.hz" -config KEXEC - bool "kexec system call" - select KEXEC_CORE - help - kexec is a system call that implements the ability to shutdown your - current kernel, and to start another kernel. It is like a reboot - but it is independent of the system firmware. And like a reboot - you can start any kernel with it, not just Linux. - - The name comes from the similarity to the exec system call. - - It is an ongoing process to be certain the hardware in a machine - is properly shutdown, so do not be surprised if this code does not - initially work for you. As of this writing the exact hardware - interface is strongly in flux, so no good recommendation can be - made. - -config KEXEC_FILE - bool "kexec file based system call" - select KEXEC_CORE - select HAVE_IMA_KEXEC if IMA - depends on X86_64 - depends on CRYPTO=y - depends on CRYPTO_SHA256=y - help - This is new version of kexec system call. This system call is - file based and takes file descriptors as system call argument - for kernel and initramfs as opposed to list of segments as - accepted by previous system call. +config ARCH_SUPPORTS_KEXEC + def_bool y -config ARCH_HAS_KEXEC_PURGATORY - def_bool KEXEC_FILE +config ARCH_SUPPORTS_KEXEC_FILE + def_bool X86_64 && CRYPTO && CRYPTO_SHA256 -config KEXEC_SIG - bool "Verify kernel signature during kexec_file_load() syscall" +config ARCH_SELECTS_KEXEC_FILE + def_bool y depends on KEXEC_FILE - help - - This option makes the kexec_file_load() syscall check for a valid - signature of the kernel image. The image can still be loaded without - a valid signature unless you also enable KEXEC_SIG_FORCE, though if - there's a signature that we can check, then it must be valid. - - In addition to this option, you need to enable signature - verification for the corresponding kernel image type being - loaded in order for this to work. - -config KEXEC_SIG_FORCE - bool "Require a valid signature in kexec_file_load() syscall" - depends on KEXEC_SIG - help - This option makes kernel signature verification mandatory for - the kexec_file_load() syscall. + select HAVE_IMA_KEXEC if IMA -config KEXEC_BZIMAGE_VERIFY_SIG - bool "Enable bzImage signature verification support" - depends on KEXEC_SIG - depends on SIGNED_PE_FILE_VERIFICATION - select SYSTEM_TRUSTED_KEYRING - help - Enable bzImage signature verification support. +config ARCH_HAS_KEXEC_PURGATORY + def_bool KEXEC_FILE -config CRASH_DUMP - bool "kernel crash dumps" - depends on X86_64 || (X86_32 && HIGHMEM) - help - Generate crash dump after being started by kexec. - This should be normally only set in special crash dump kernels - which are loaded in the main kernel with kexec-tools into - a specially reserved region and then later executed after - a crash by kdump/kexec. The crash dump kernel must be compiled - to a memory address not used by the main kernel or BIOS using - PHYSICAL_START, or it must be built as a relocatable image - (CONFIG_RELOCATABLE=y). - For more details see Documentation/admin-guide/kdump/kdump.rst +config ARCH_SUPPORTS_KEXEC_JUMP + def_bool y -config KEXEC_JUMP - bool "kexec jump" - depends on KEXEC && HIBERNATION - help - Jump between original kernel and kexeced kernel and invoke - code in physical address mode via KEXEC +config ARCH_SUPPORTS_CRASH_DUMP + def_bool X86_64 || (X86_32 && HIGHMEM) config PHYSICAL_START hex "Physical address where the kernel is loaded" if (EXPERT || CRASH_DUMP)