Message ID | 20230706222027.189117-12-eric.devolder@oracle.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:9f45:0:b0:3ea:f831:8777 with SMTP id v5csp2868860vqx; Thu, 6 Jul 2023 15:23:11 -0700 (PDT) X-Google-Smtp-Source: APBJJlHJyZ0eWAAt/mXYaJkE9dGn5IiysNuK1bkYA5jlNuiNxCkzSXaEgzx5zmuWRqNVNsLqZ87t X-Received: by 2002:a05:6a00:1acb:b0:64f:aea5:7b49 with SMTP id f11-20020a056a001acb00b0064faea57b49mr3009656pfv.17.1688682191568; Thu, 06 Jul 2023 15:23:11 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1688682191; cv=pass; d=google.com; s=arc-20160816; b=VCdvMRi0hAChYuR5AhwlLVCwIaQKiaZpERPrz/iC/EsVk3ob2IbPq6emELrtxIm3cD gpwRaw7/B9rbzqwSTVXV/dsx7UNI1EuMYPwlqY7WYSZISmqffU1YsN1MkEGlXx7bEWXs iK5lgfTICCapKAeTlqAQGtPP1xx2wEqHHs5nCEyjHOoAP4pUipZTEbG70tZ5R0TxWrvv OLWxjFxCeXuptEwSAKH+vY5XpEGbVUxnOh31AUe+ChLXGnv0Z1jKlRU0q/PIj+KlkWfw sWgbIfBfboNM1+t9rvZbk3Q0XqIoVgl4qLsR6thv2/dzdXcNtvto+RhGPfjp0nTKnTdH BgAw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=b+PKwj0HONu7bLQpXmtLDG4GCIkHBRq4GGrkhD06IPk=; fh=OnvCYc85Zc9mFJ9Px86Oam387o4YKs25CUyg+2gB+44=; b=zT70X62du++lvL+67lQVurewzsJ14nQAcTnAL+npq9EUvAuAD5nxmieRBEw57kA3yA /zcZ4kxdlGXzLarJOcS9jXnHPljuq5dyPflsvpU2aKtQ765dRbAb1w8MaWjhTBpLFJhA WlxjpGmathrASyrNw8ScIAzuXE4hkxU36vHFWg6MBhEc4MI3CEzfx3u9h1jfe/p3tJRT uQd6aGy2XqGpFWG8HjY2OKsGGld3MW+aRJScLPvw1ZadoQN90n7KjwqEgdPLR3VCsLla gy1rnECcDYvNQfvnYwdcR7vOxZdDYd6/RSzFKBfrJfRRDAak981LZvchwXCPK0rzI5+8 zdrg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b=KtTH9Liz; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=FAJjEvdR; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ch11-20020a056a00288b00b00653b5ab16c3si2199832pfb.265.2023.07.06.15.22.53; Thu, 06 Jul 2023 15:23:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b=KtTH9Liz; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=FAJjEvdR; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232213AbjGFWWN (ORCPT <rfc822;hadasmailinglist@gmail.com> + 99 others); Thu, 6 Jul 2023 18:22:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44252 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232282AbjGFWVl (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 6 Jul 2023 18:21:41 -0400 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 692CA1FF1; Thu, 6 Jul 2023 15:21:35 -0700 (PDT) Received: from pps.filterd (m0246627.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 366LMUFu031988; Thu, 6 Jul 2023 22:21:17 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2023-03-30; bh=b+PKwj0HONu7bLQpXmtLDG4GCIkHBRq4GGrkhD06IPk=; b=KtTH9LiztQyrAodvu5YqlYmCgffu1RbSbwFpaqO7i80uB5EZBrmydrFu9H+2xHp4QcRK HXsMKOWih0t4rkjb98UID5Om5QgeNCc68+QW0EaCxpIIEGCuNTyIed1DoFgZlrpg/kmf VQCqvyqWUDx7Qs4p1GVCFFmgvA5LXubZHnIXFlHCWJZzW/G64slvFcFAK9nsNMM+7QHz tDqkhTlcR6pj8j+1YtW1jp9aNMJZ721wTpMxUMS92UVOetJSIeBktN1lSmOGoXAHJrxu NYSmHPmJM4nEAMSybyFfzopjmDHCXyZEYfqdnm5/ZoVMkH7QYDhCffNEQXNgAzDj0Z04 iw== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3rp3vy88yp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 06 Jul 2023 22:21:16 +0000 Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 366KOxXQ007182; Thu, 6 Jul 2023 22:21:15 GMT Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1nam02lp2040.outbound.protection.outlook.com [104.47.57.40]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3rjakdmtu9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 06 Jul 2023 22:21:15 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KIcUHCQY7O08hjVkGupV7MazX8q7eS+kvzA8eAwEux2uVtEVTls42BQZMOmjWA4EojeVPkrrA4CNvTTQxGxqyzhV3YcDn+MEYl/5taQrHoxrM7YmgUjtQL7gnsDCyR1f0ngAkAam9dc7IyCzacnXrlhA2sezb6JZCnK2hqoNdCgBk7LBt5OyHqEumRAwQz7FV9WcTqgevo8WdPhv0KvNgjbyvAzW9x6Z0Q5B0xMPoUKla+jqBpmqvVH5rPIykzl3WCsotXMhOEoiFEULiZ+fAGIo/0VaCkZ/gnpWoLeclfSv9Bd9oJ5Iuv5dhh4Ufa2XUlcETWKmQe9Uf5QDVda/MA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=b+PKwj0HONu7bLQpXmtLDG4GCIkHBRq4GGrkhD06IPk=; b=hDnjyvS290tT0ZI9QqhJSY541IB2fVV5L3I3x05/ARVZBxCC3OYk3+3THIC6s33bmUvSLAzVrvdLynoGRxa7HVbquNdF8ysHgY4g/WK8ycie6Ok6d/9ogKAgInVzWnZ3o6ED+U4uR51QEcfdB+qoDOBGZKG7LvzM/6EWxeTSy+3l2Tj/3aRiYfsQFCyyJ9MWM0UvoYxWYUnixaFM4j+xlThFPd+zKyR8OYKSLt0hLAtyK2mR00d+PvY8+H3CS0Oti6H0aSmwWzZ04UTKOBpdyROMbScqXkqBKbKhVy/dnBB1N8xrLHoQ/Rn5h0nVmjFgwaETDCoQGrcUkMQjMr+x8Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=b+PKwj0HONu7bLQpXmtLDG4GCIkHBRq4GGrkhD06IPk=; b=FAJjEvdRbcBQkuiLV5H6JlKBCvVzJ2XsJyBcjEtyMZqqezRixzyQjrsC7AHU2LIdPhKimKu1muamfAL/6QSbKuaaXBljn4N+s3vwIK3C7Z3TVXNrpBFIqoP4awuCpAxH7ekWoi/dU6A/FNfoG5lIkqbxIaqaXtkI6r6DYsJc1Ow= Received: from CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) by CO1PR10MB4755.namprd10.prod.outlook.com (2603:10b6:303:9f::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.17; Thu, 6 Jul 2023 22:21:11 +0000 Received: from CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048]) by CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048%5]) with mapi id 15.20.6565.019; Thu, 6 Jul 2023 22:21:11 +0000 From: Eric DeVolder <eric.devolder@oracle.com> To: linux@armlinux.org.uk, catalin.marinas@arm.com, will@kernel.org, chenhuacai@kernel.org, geert@linux-m68k.org, tsbogend@alpha.franken.de, James.Bottomley@HansenPartnership.com, deller@gmx.de, ysato@users.sourceforge.jp, dalias@libc.org, glaubitz@physik.fu-berlin.de, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org Cc: kernel@xen0n.name, mpe@ellerman.id.au, npiggin@gmail.com, christophe.leroy@csgroup.eu, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, borntraeger@linux.ibm.com, svens@linux.ibm.com, hpa@zytor.com, keescook@chromium.org, paulmck@kernel.org, peterz@infradead.org, frederic@kernel.org, akpm@linux-foundation.org, ardb@kernel.org, samitolvanen@google.com, juerg.haefliger@canonical.com, arnd@arndb.de, rmk+kernel@armlinux.org.uk, linus.walleij@linaro.org, sebastian.reichel@collabora.com, rppt@kernel.org, kirill.shutemov@linux.intel.com, anshuman.khandual@arm.com, ziy@nvidia.com, masahiroy@kernel.org, ndesaulniers@google.com, mhiramat@kernel.org, ojeda@kernel.org, thunder.leizhen@huawei.com, xin3.li@intel.com, tj@kernel.org, gregkh@linuxfoundation.org, tsi@tuyoix.net, bhe@redhat.com, hbathini@linux.ibm.com, sourabhjain@linux.ibm.com, eric.devolder@oracle.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Subject: [PATCH v5 11/13] riscv/kexec: refactor for kernel/Kconfig.kexec Date: Thu, 6 Jul 2023 18:20:25 -0400 Message-Id: <20230706222027.189117-12-eric.devolder@oracle.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20230706222027.189117-1-eric.devolder@oracle.com> References: <20230706222027.189117-1-eric.devolder@oracle.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: SN6PR2101CA0027.namprd21.prod.outlook.com (2603:10b6:805:106::37) To CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1PR10MB4531:EE_|CO1PR10MB4755:EE_ X-MS-Office365-Filtering-Correlation-Id: dbe9bf5f-b77b-4972-9c59-08db7e6f4dc4 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR10MB4531.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(376002)(346002)(136003)(396003)(366004)(39860400002)(451199021)(8676002)(8936002)(2906002)(2616005)(5660300002)(26005)(7416002)(6506007)(1076003)(7406005)(7366002)(186003)(107886003)(66556008)(41300700001)(921005)(66476007)(6486002)(4326008)(6666004)(316002)(66946007)(83380400001)(6512007)(478600001)(36756003)(38100700002)(86362001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 2 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-1: pPHSKH9dFQDU/X8LB8mLzMfOaMGWfSzWYIYPtwdul1s8OyWkQKTBeLJr3DZfkbDHjq+UEjjFdpvfiDL4wwkMIA8ELR8jhOIvdXf2oRIhBhs+StHYk+0hw1as3DePUS6kRpD6FKDEWpjZxwCkvX4JVHJGHX+K9BFcaDrvuJuGoxPZyE8a4Fsv8VyKOfDMr9j3brqigW5vVExZ2KboeUzAXl90Vt4EOVJA855llFDv9zDmzc3sPKSn+2/DoakBdTxZ8hq7VpiJdJFRT195P66TvfL1RcY9i8VbvmV1aJDMj4cCH2OwXxuE4kNJRaV0lAktYKcDOvlMDDCszzaR0MpFdGQLOdbeCsV7E2VdK7MTdJ5RmqnaGEFZOlSK6HikY0bvjox+legLOoq+OQrg/2UEqBjq80op0UXElL6pU0yJujBXtYp4rM9H/n6wtCIpaBXxM0p2lhuVFseJzQ== X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: dbe9bf5f-b77b-4972-9c59-08db7e6f4dc4 X-MS-Exchange-CrossTenant-AuthSource: CO1PR10MB4531.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Jul 2023 22:21:11.5507 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: /mWsjehcYZRqlbsRSa9CROG6FdmpSkqcO/ceXTSH33qBHHrNeRPu3Dd4tLE1ExqdtF88WxeW7cs/gF5pTXqM3O5tyAYdjxD9kQduZmkwqSE= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR10MB4755 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-07-06_15,2023-07-06_02,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxlogscore=999 suspectscore=0 bulkscore=0 spamscore=0 mlxscore=0 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2305260000 definitions=main-2307060195 X-Proofpoint-ORIG-GUID: nffbWl7bB1ahzQkAgKmrnzgRPaPAInmv X-Proofpoint-GUID: nffbWl7bB1ahzQkAgKmrnzgRPaPAInmv X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1770711617994835511?= X-GMAIL-MSGID: =?utf-8?q?1770711617994835511?= |
Series |
refactor Kconfig to consolidate KEXEC and CRASH options
|
|
Commit Message
Eric DeVolder
July 6, 2023, 10:20 p.m. UTC
The kexec and crash kernel options are provided in the common
kernel/Kconfig.kexec. Utilize the common options and provide
the ARCH_SUPPORTS_ and ARCH_SELECTS_ entries to recreate the
equivalent set of KEXEC and CRASH options.
Signed-off-by: Eric DeVolder <eric.devolder@oracle.com>
---
arch/riscv/Kconfig | 44 +++++++++++++-------------------------------
1 file changed, 13 insertions(+), 31 deletions(-)
Comments
On Thu, 06 Jul 2023 15:20:25 PDT (-0700), eric.devolder@oracle.com wrote: > The kexec and crash kernel options are provided in the common > kernel/Kconfig.kexec. Utilize the common options and provide > the ARCH_SUPPORTS_ and ARCH_SELECTS_ entries to recreate the > equivalent set of KEXEC and CRASH options. > > Signed-off-by: Eric DeVolder <eric.devolder@oracle.com> > --- > arch/riscv/Kconfig | 44 +++++++++++++------------------------------- > 1 file changed, 13 insertions(+), 31 deletions(-) > > diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig > index b49793cf34eb..8a3af850597a 100644 > --- a/arch/riscv/Kconfig > +++ b/arch/riscv/Kconfig > @@ -647,48 +647,30 @@ config RISCV_BOOT_SPINWAIT > > If unsure what to do here, say N. > > -config KEXEC > - bool "Kexec system call" > - depends on MMU > +config ARCH_SUPPORTS_KEXEC > + def_bool MMU > + > +config ARCH_SELECTS_KEXEC > + def_bool y > + depends on KEXEC > select HOTPLUG_CPU if SMP > - select KEXEC_CORE > - help > - kexec is a system call that implements the ability to shutdown your > - current kernel, and to start another kernel. It is like a reboot > - but it is independent of the system firmware. And like a reboot > - you can start any kernel with it, not just Linux. > > - The name comes from the similarity to the exec system call. > +config ARCH_SUPPORTS_KEXEC_FILE > + def_bool 64BIT && MMU > > -config KEXEC_FILE > - bool "kexec file based systmem call" > - depends on 64BIT && MMU > +config ARCH_SELECTS_KEXEC_FILE > + def_bool y > + depends on KEXEC_FILE > select HAVE_IMA_KEXEC if IMA > - select KEXEC_CORE > select KEXEC_ELF > - help > - This is new version of kexec system call. This system call is > - file based and takes file descriptors as system call argument > - for kernel and initramfs as opposed to list of segments as > - accepted by previous system call. > - > - If you don't know what to do here, say Y. > > config ARCH_HAS_KEXEC_PURGATORY > def_bool KEXEC_FILE > depends on CRYPTO=y > depends on CRYPTO_SHA256=y > > -config CRASH_DUMP > - bool "Build kdump crash kernel" > - help > - Generate crash dump after being started by kexec. This should > - be normally only set in special crash dump kernels which are > - loaded in the main kernel with kexec-tools into a specially > - reserved region and then later executed after a crash by > - kdump/kexec. > - > - For more details see Documentation/admin-guide/kdump/kdump.rst > +config ARCH_SUPPORTS_CRASH_DUMP > + def_bool y > > config COMPAT > bool "Kernel support for 32-bit U-mode" Acked-by: Palmer Dabbelt <palmer@rivosinc.com>
On 7/6/23 17:32, Palmer Dabbelt wrote: > On Thu, 06 Jul 2023 15:20:25 PDT (-0700), eric.devolder@oracle.com wrote: >> The kexec and crash kernel options are provided in the common >> kernel/Kconfig.kexec. Utilize the common options and provide >> the ARCH_SUPPORTS_ and ARCH_SELECTS_ entries to recreate the >> equivalent set of KEXEC and CRASH options. >> >> Signed-off-by: Eric DeVolder <eric.devolder@oracle.com> >> --- >> arch/riscv/Kconfig | 44 +++++++++++++------------------------------- >> 1 file changed, 13 insertions(+), 31 deletions(-) >> >> diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig >> index b49793cf34eb..8a3af850597a 100644 >> --- a/arch/riscv/Kconfig >> +++ b/arch/riscv/Kconfig >> @@ -647,48 +647,30 @@ config RISCV_BOOT_SPINWAIT >> >> If unsure what to do here, say N. >> >> -config KEXEC >> - bool "Kexec system call" >> - depends on MMU >> +config ARCH_SUPPORTS_KEXEC >> + def_bool MMU >> + >> +config ARCH_SELECTS_KEXEC >> + def_bool y >> + depends on KEXEC >> select HOTPLUG_CPU if SMP >> - select KEXEC_CORE >> - help >> - kexec is a system call that implements the ability to shutdown your >> - current kernel, and to start another kernel. It is like a reboot >> - but it is independent of the system firmware. And like a reboot >> - you can start any kernel with it, not just Linux. >> >> - The name comes from the similarity to the exec system call. >> +config ARCH_SUPPORTS_KEXEC_FILE >> + def_bool 64BIT && MMU >> >> -config KEXEC_FILE >> - bool "kexec file based systmem call" >> - depends on 64BIT && MMU >> +config ARCH_SELECTS_KEXEC_FILE >> + def_bool y >> + depends on KEXEC_FILE >> select HAVE_IMA_KEXEC if IMA >> - select KEXEC_CORE >> select KEXEC_ELF >> - help >> - This is new version of kexec system call. This system call is >> - file based and takes file descriptors as system call argument >> - for kernel and initramfs as opposed to list of segments as >> - accepted by previous system call. >> - >> - If you don't know what to do here, say Y. >> >> config ARCH_HAS_KEXEC_PURGATORY >> def_bool KEXEC_FILE >> depends on CRYPTO=y >> depends on CRYPTO_SHA256=y >> >> -config CRASH_DUMP >> - bool "Build kdump crash kernel" >> - help >> - Generate crash dump after being started by kexec. This should >> - be normally only set in special crash dump kernels which are >> - loaded in the main kernel with kexec-tools into a specially >> - reserved region and then later executed after a crash by >> - kdump/kexec. >> - >> - For more details see Documentation/admin-guide/kdump/kdump.rst >> +config ARCH_SUPPORTS_CRASH_DUMP >> + def_bool y >> >> config COMPAT >> bool "Kernel support for 32-bit U-mode" > > Acked-by: Palmer Dabbelt <palmer@rivosinc.com> Thank you Palmer! eric
diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig index b49793cf34eb..8a3af850597a 100644 --- a/arch/riscv/Kconfig +++ b/arch/riscv/Kconfig @@ -647,48 +647,30 @@ config RISCV_BOOT_SPINWAIT If unsure what to do here, say N. -config KEXEC - bool "Kexec system call" - depends on MMU +config ARCH_SUPPORTS_KEXEC + def_bool MMU + +config ARCH_SELECTS_KEXEC + def_bool y + depends on KEXEC select HOTPLUG_CPU if SMP - select KEXEC_CORE - help - kexec is a system call that implements the ability to shutdown your - current kernel, and to start another kernel. It is like a reboot - but it is independent of the system firmware. And like a reboot - you can start any kernel with it, not just Linux. - The name comes from the similarity to the exec system call. +config ARCH_SUPPORTS_KEXEC_FILE + def_bool 64BIT && MMU -config KEXEC_FILE - bool "kexec file based systmem call" - depends on 64BIT && MMU +config ARCH_SELECTS_KEXEC_FILE + def_bool y + depends on KEXEC_FILE select HAVE_IMA_KEXEC if IMA - select KEXEC_CORE select KEXEC_ELF - help - This is new version of kexec system call. This system call is - file based and takes file descriptors as system call argument - for kernel and initramfs as opposed to list of segments as - accepted by previous system call. - - If you don't know what to do here, say Y. config ARCH_HAS_KEXEC_PURGATORY def_bool KEXEC_FILE depends on CRYPTO=y depends on CRYPTO_SHA256=y -config CRASH_DUMP - bool "Build kdump crash kernel" - help - Generate crash dump after being started by kexec. This should - be normally only set in special crash dump kernels which are - loaded in the main kernel with kexec-tools into a specially - reserved region and then later executed after a crash by - kdump/kexec. - - For more details see Documentation/admin-guide/kdump/kdump.rst +config ARCH_SUPPORTS_CRASH_DUMP + def_bool y config COMPAT bool "Kernel support for 32-bit U-mode"