Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp6493069rwd; Mon, 19 Jun 2023 08:03:43 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6oOtL1slt7Ti0t1JA3pKsFMBrFlitGVmi9x7WpGfVbbijHajKJroVEpRV8I64T7qviod2+ X-Received: by 2002:a17:902:c24d:b0:1b0:6c3e:363 with SMTP id 13-20020a170902c24d00b001b06c3e0363mr7212068plg.0.1687187023382; Mon, 19 Jun 2023 08:03:43 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1687187023; cv=pass; d=google.com; s=arc-20160816; b=sUyUNR8Is1/LX23dgdBGvZe7ESMYp6tbWA2mV6L/Q9YGqOsebzKvepmpSGk9Kw3b2b fpGPvjeyLY4/LhxrM6LQ13suS584VuYwID9+PGyuLPZl6eKAygK5VTPUtepcRNzjyiY+ uJ3TYN1a/AntobV+Do5bkwAO2V4U7uwS+5M2pVdUF5owQPe6HBhu7QSam0cQowfpwY7V lxUW8fZciuX0qlaY5y0V7Jf+jN2BTQvhRK0bcqMEqAMfau2iG1ufcBMBwzf8nOvUgCIk 4eFMLqrYhxSeekp7My6ddHO8ze8eX8vXUPTKFpGSo0TJXYLw/wPhUt8H4V1GAGSrzFAq F1kA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :message-id:date:subject:cc:to:from:dkim-signature:dkim-signature; bh=wHxDjYJ0YIk1e+WjwWC+P/LImvG+7dnzjJj2cPTvSeg=; b=ae8MjJxvcQG/Wut5B6ZixBoEctNNjaupsLHK9Dh+/Zbmn3Ec0AaBO+dr52+FjZXuSo kfjwSgTSxLcRZYuZc1VyM1SxEoz3jRLkFuHHXsba8AXucsmBv3a43jFMq/1wCHUgS+92 4UCY75i+MktXcXufsoI4rVCKDT9WnAxW1auPopC4VwgjXCJChg783cRTw2XiKzLNQctf ZB605D+XFfDDT+/qnuagwiKKKdYrlXfRVDtqPGcGAl8FskjKfkXmJMOcO87XaN4fTMCM FvSahb87xowwE6bQSJbofGFtrRO8/gOyjRBPPh2LBPHYBNvXfEa7v+vVxMCGWOs38LDj d/2Q== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b=iIo4fzB8; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b="nw/ua+z/"; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y1-20020a17090322c100b001aadd1e0384si21980146plg.192.2023.06.19.08.03.07; Mon, 19 Jun 2023 08:03:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b=iIo4fzB8; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b="nw/ua+z/"; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232287AbjFSO7a (ORCPT + 99 others); Mon, 19 Jun 2023 10:59:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49978 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231974AbjFSO7O (ORCPT ); Mon, 19 Jun 2023 10:59:14 -0400 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4D03D10D5; Mon, 19 Jun 2023 07:58:59 -0700 (PDT) Received: from pps.filterd (m0246631.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 35J9nEhT006316; Mon, 19 Jun 2023 14:58:29 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : content-transfer-encoding : content-type : mime-version; s=corp-2023-03-30; bh=wHxDjYJ0YIk1e+WjwWC+P/LImvG+7dnzjJj2cPTvSeg=; b=iIo4fzB8XfVHYsLA4aa73Ub3tAXZwaqf/Sf3cTRuwH9uXBxXxyVSYJpCn1ixHSWUP0Pk MeKtgCcdrg94OX78NOKRRyFTufFcIFI0VJC7zb9LZWNE/HN+XFp+o8R49dHACQLV+GlW BhZ7F5O0hPjEWurYxqlY741sr4RqNwkGQI2dG5AB9OuAdHmrZV94htiga/5A2o3+dumX fibRiMJnAUYlW5EruAgEvd7D/5VALzHAGyNofkZ4LBlBUyvtqMGWJth04CmLxrhZVx+e H6S0fBNnHNUTD7hpjrpalDSZ5nGEn/i8KTK4Ra4WViq8u7bG+tBiYNhgFStClIbch4p/ Qw== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3r93m3jx5h-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jun 2023 14:58:28 +0000 Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 35JD9md7005929; Mon, 19 Jun 2023 14:58:28 GMT Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2047.outbound.protection.outlook.com [104.47.74.47]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3r93939jdk-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jun 2023 14:58:27 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=S/09OjjA+EdqLiHZuX2tTYRokD8rK93f+Shg4/wp+dC99FyzBRRIHVERVoaIBiOjyy9nm3Y4AehmZ5F/bDvZ38bO4e2ryjSqYFp2Bxjo5blRM2mgWfLkJsR5LqLAqPu5ky2UNZB/B/7T9xN0fmnpJAxRRZ8Tdf7+H2hGUDHpM39a7vHe8QpSdiMXD0ZThsZrfCxgDjCNI1MubnDVQkX+LAETlQ2bcilWF+rJsziiViAB4JKozWm+2qGnHq4vbZz/GmMFKXwDmK6C//DMyiAUm4odTJovWIEU3aRvpGeUWA476QVscrj38hdl195AVcf02LUUseq02xGUECtftEQqwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=wHxDjYJ0YIk1e+WjwWC+P/LImvG+7dnzjJj2cPTvSeg=; b=I9xlpgMdbF/aeg/2b8NMwvp4mVB/0Hq75BFEoZzNbDsJC1AYNxrlaKsBBxJMLrK4M5NboWgBSpWt3FJ80FnD9IX+cDy2R+HYtUzgDww58C+2RAJAOxtvpjlEHkwwaN2N+GtlWRt0C2Q/kIYoUQNPZeDNrVB9z0lwcwx05owgOjFshvt8JISBH28jIL98+F8fvJTbgDI1TOnjAmLoXbVRtzvILNvF3sKqKmcSLEb5TySP0x8WntF2fAF7WRKex8C+0NCDix5NWXX8iN4Qvq6++ZZnatRge3Jd+nqHOrDY45NfZPXT7KDdq83/i2WlxEGuH+TrN5Wpmd3jOhr5rI9BCg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wHxDjYJ0YIk1e+WjwWC+P/LImvG+7dnzjJj2cPTvSeg=; b=nw/ua+z/Lar6vHiCYi2sHtZhHfOKqFCeW/CL/Ut/xL/cp355AA6ACxlYFZymCp7wkzDkBtePfbuKAxJ5OclHhR0fe6ZEYs/tWuo85Vv21Nrqrmp67Id8mEktKbBp1fkMzLWc+wYyZCI9/T8i333m8SrnSsK3LDZsifo+0fyXu9g= Received: from CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) by SA1PR10MB6543.namprd10.prod.outlook.com (2603:10b6:806:2bc::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.36; Mon, 19 Jun 2023 14:58:14 +0000 Received: from CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048]) by CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048%5]) with mapi id 15.20.6500.036; Mon, 19 Jun 2023 14:58:10 +0000 From: Eric DeVolder To: linux@armlinux.org.uk, catalin.marinas@arm.com, will@kernel.org, chenhuacai@kernel.org, geert@linux-m68k.org, tsbogend@alpha.franken.de, James.Bottomley@HansenPartnership.com, deller@gmx.de, ysato@users.sourceforge.jp, dalias@libc.org, glaubitz@physik.fu-berlin.de, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org Cc: kernel@xen0n.name, mpe@ellerman.id.au, npiggin@gmail.com, christophe.leroy@csgroup.eu, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, borntraeger@linux.ibm.com, svens@linux.ibm.com, hpa@zytor.com, keescook@chromium.org, paulmck@kernel.org, peterz@infradead.org, frederic@kernel.org, akpm@linux-foundation.org, ardb@kernel.org, samitolvanen@google.com, juerg.haefliger@canonical.com, arnd@arndb.de, rmk+kernel@armlinux.org.uk, linus.walleij@linaro.org, sebastian.reichel@collabora.com, rppt@kernel.org, kirill.shutemov@linux.intel.com, anshuman.khandual@arm.com, ziy@nvidia.com, masahiroy@kernel.org, ndesaulniers@google.com, mhiramat@kernel.org, ojeda@kernel.org, thunder.leizhen@huawei.com, xin3.li@intel.com, tj@kernel.org, gregkh@linuxfoundation.org, tsi@tuyoix.net, bhe@redhat.com, hbathini@linux.ibm.com, sourabhjain@linux.ibm.com, eric.devolder@oracle.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Subject: [PATCH v2 00/13] refactor Kconfig to consolidate KEXEC and CRASH options Date: Mon, 19 Jun 2023 10:57:48 -0400 Message-Id: <20230619145801.1064716-1-eric.devolder@oracle.com> X-Mailer: git-send-email 2.31.1 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: DM6PR08CA0015.namprd08.prod.outlook.com (2603:10b6:5:80::28) To CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1PR10MB4531:EE_|SA1PR10MB6543:EE_ X-MS-Office365-Filtering-Correlation-Id: a5d1f57d-a570-41bc-2137-08db70d5995b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR10MB4531.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(39860400002)(396003)(346002)(366004)(136003)(376002)(451199021)(7416002)(7366002)(66946007)(7406005)(8936002)(8676002)(66556008)(66476007)(107886003)(1076003)(26005)(186003)(6506007)(6512007)(36756003)(83380400001)(41300700001)(38100700002)(5660300002)(4326008)(316002)(966005)(30864003)(2616005)(921005)(6666004)(6486002)(478600001)(2906002)(86362001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?Xs7vg8F9LidqIrXYvGxwqZ8AbV3ZOsPnxpZWp0rS/xhelfUCXl5+ROzpSf4i?= =?us-ascii?Q?m4KL39PkXSW+XokrbQLlY6Dc+7ckJ8+2rziosD+ukkWR6a4/KZjbkWw/QQsO?= =?us-ascii?Q?U9M3d2WQiBohR9L1AIz2eLpKKO88KvDCDrGHjsuGRp5C0H7TB69Y9pmv/uIS?= =?us-ascii?Q?K6HyTmDrFEO3w6Uaq7pdkYOOgIxZUYN0IR+IjFfwuM/BPtkD1GLBy9ddeaLo?= =?us-ascii?Q?3s1ihqX1ax8xCgZw6hXtzf/xbPsWEOosw8yVzQBGZ77vkbfcaBo3nXEZY/HX?= =?us-ascii?Q?QnnXPeygw+cNInFx5frDHO2579/7SYwu/61UO7+l702C/g8h8fA6Qw2ynoTJ?= =?us-ascii?Q?GsSCkYz3cUMOexoRMO3AAFMYcA2KewoToCenlpZxXRUTeSfTL0UxNnaDUhjI?= =?us-ascii?Q?64s9zzJcp27SQjOl5pAHvdKqWMx3z8hykOXv00m4SCWeJa7CdESaHyz9Sk3e?= =?us-ascii?Q?y4vM7bmDMFUiB5wj+jhtnqztmxIj7McFSGaJDvBY/afV+WTfhpVV2WU8omnP?= =?us-ascii?Q?Se7ky73WSw5m+yuzbJM0jxynqCl7lpPtVTbdC5Y7Q1wo5d2aJhExx58UZV79?= =?us-ascii?Q?XC1xNxOED7zbtqIcwxZ7uc7TXlhYZgJ1dJl5CmEDaE+ldVjKjLWca4GlJMk8?= =?us-ascii?Q?RTrvhSHmmNY/8wmLC6IrUQMIZgzAUJ0Mfg/WV0WZzMyDU0El2WDWArUR3PzC?= =?us-ascii?Q?jSKhzUbCFQq1Fa89xBC21zJpANcHXiDq5POGttO3gvdRQVyRb4EDMrhmtiEK?= =?us-ascii?Q?vHxh2P+vlPp6ECLPTmpvm4TY7/RXgSqq4LPXyt+PCca5kA+hDTW/7iAV2uwT?= =?us-ascii?Q?sLVcKuf473MxSikrYEISJ0CvzPjxAgkkzRBwGkd74LQCYVdjAUCffjNGBxd3?= =?us-ascii?Q?lGiNmLQumLu64fbSJI2b9hAYghZBnkDq4Rzmi6h6s0ZB2n6Wm0w6Jvz7bk63?= =?us-ascii?Q?3K0AJeX/yxUTWAo67ZcyijU4dYr/DbL70mYd9ZSGAHaXCcR1dpx0IwKkzOT6?= =?us-ascii?Q?ZvCAlPbcjKbhITe+QkOhaSo49acTCE2u1HYfuHOuLzlZIgHEBaQwSou5us7R?= =?us-ascii?Q?s78qYgsUtnFgRcMFaMZF9pQnMkOaP5hBc0umpo0TYSH+N2IL3koI2uQ5aJgU?= =?us-ascii?Q?rDh2+44mmRxrrlW1LhCBaH+s1S1lDHTY3BnAtwgAn2YrjxI9srFfO8jkVZ8x?= =?us-ascii?Q?S++UEf2ISjVtHdKMSOIq+pS+fpYuOC5sRGqLC77EttG3M1r93IaPNzimxIkp?= =?us-ascii?Q?rV8HVEZrRSxHn7zT6ClnneWRPtRLUf8rJUrBJhxX+4P+QDdjYNQsi9Iudpx6?= =?us-ascii?Q?cFdqyEm7p5pQCyBoNoi/6WazkbaNkXjKHOa1p4mSsQSAGfRrwBzPUcwz/q2/?= =?us-ascii?Q?a2Lv2peBE4WRyxfmfdldxzet5Xq/3uBh+fJoqjDwZ+FK/iYboHtS725zn2S4?= =?us-ascii?Q?ae22hvnZcNrveBXvRLmIvuul+veHCpsiwLrrcEwF7BJe3ENmhkXob4giRywX?= =?us-ascii?Q?S6EPdNUvjn/bnYtOBZZ0XeZrWX+PpqRmILbIKj5h/ttBpfHWpVxNE/gil8ax?= =?us-ascii?Q?5p/tzI4Y3zb5szSEPYHH5cwKCJATkLfSvRORQgbymNllebeZG7AxDT1gi3Vg?= =?us-ascii?Q?ew=3D=3D?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 2 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: =?us-ascii?Q?P62Yws1a1xEj+rss4EMzPbvRoV39VhRBV4gn/br24s1blhF4blp0GZjLwsPU?= =?us-ascii?Q?QELHJmxNEU7XRwyMjEM9cbuwlWM57LAUfdpY/65riJZ3o7omnG1IL28+W/2U?= =?us-ascii?Q?nnYtOTPb+4ltV7u5M9B8BRfP9EFv7Hb1eVG9WOfY1V8KDg8s2OnBljNExpDe?= =?us-ascii?Q?FFnXmVk8HB3jIDJm90sj42vd2QRLk7/8pWfD3hHWHlGmLEUF7Vg2PE3Pynud?= =?us-ascii?Q?4KjxfnEVXc1uGTmXOspO9OMXS7EsQDFhjJuNqEp8+4CwWPxxPqk1UTbH+bCR?= =?us-ascii?Q?ZT8FAuwuMyEVHKSHboZ5UnRP7GOR6ZwHWOGiEbe3g9LBl1MD/UdAfffuloNG?= =?us-ascii?Q?zwXxUzxqqNZCexn38Tggx3kOzFADe7s9hTKhE9Sfo/unTzxz/FeSg7YKjC+H?= =?us-ascii?Q?5h0Vao0lzGXFpJgF7tFIIACAwKH6VUu1UIsRChGTE1j9dHb4w2kgUKo9nEve?= =?us-ascii?Q?FrGRgBri3cQyL0fNzIXGnQwFjTaGQ7cuUfR6B+ZPcLzlx+1HaXhZvIn6WNMd?= =?us-ascii?Q?s4laKzJXMvId2rDFzrwzqfupGeJ7+0uvtv/FTA9AuKYRtvQuD1HhirlFtciJ?= =?us-ascii?Q?L8P/x7kmU/UY3MFl7iVbwuKCIvKNn7Pxd5D0XvOgn5uSfVRtliBZ2y0asc4l?= =?us-ascii?Q?On3heB1aF2IeGupmrrTz2o8ZRaAn3jAQXmo7Gvf+JuA5prS8oTOmhPnbVmm6?= =?us-ascii?Q?NGLr941Xu40nXyaaEJVqep3xz/LHbSbZp675X351ZwQyCKgClp/ojqFRPUxB?= =?us-ascii?Q?g7XTXfOM/WSXpDv0xb+o1fCJ0FPXq0utmQWTnwqvIRNCuXEmqdSO++u0CoB3?= =?us-ascii?Q?ymT94NB6IyjZjJun0ArOteDX4sWx5V7ei2TSNV6XbyjDg7Ln+Gg85iiF0L/p?= =?us-ascii?Q?exCCUTGX9pgIOkeCjiGWJqukeu9wzx5YgkVFEoz1W10oXJ1vpqLDk39HIAN6?= =?us-ascii?Q?tST2CqcjpFfoF+YWslGGr5XvMSr1Oi0DeZPXAkBs1dLscf0iv/nK6aJ6NHgF?= =?us-ascii?Q?3XJhod539y02Lc3Y4FDOvvvjIufUs8kJo2k+PzNyuqI4/mH8s7RC0rzJO8u9?= =?us-ascii?Q?20ykQRl0QO2QqdDLn3dkcu++cqTmvV1QRdfabF9GcTDWkOZJlhzaH21AWS+q?= =?us-ascii?Q?GXl/YDqC76nb8U5U1J51UNXH/RE+53KrhSC8MwEfQJqd0cK4Z6pWatYqpH7U?= =?us-ascii?Q?EedauUaMphn/aCor+TBD7NhNMCE2gYpuKQKCP61zyLljrAVGk3Q/czsEknXg?= =?us-ascii?Q?qLk7KIrPRKsOXwTM3a7OwBS3X42s2Xz4w7r3f0X5IS5ugZSsUMvNu+vOtj2+?= =?us-ascii?Q?eq8eWk4pErb7eSXRkVpp+ym9JEOQpD6xTdBTsDIsz39VXfgg9iibSsHs1ILK?= =?us-ascii?Q?FDWRkifAI5wb+xrSu9vGnW+JV36cU0iBqWBHfOAsacBc0rFLhqf6zVdkGJOh?= =?us-ascii?Q?Xs+yeR6WSURyGjIjt8YsP8OeGTLqsbFEGB6Ct2KH1QZCqwYbeg26QvJ7IxwW?= =?us-ascii?Q?swbowpdKjGGu+fGafIcM0rM8Xw/b5svLuJj4sAWLb2Qr22hyjvlgqUp/ISYt?= =?us-ascii?Q?MTtHDg5HJezMDdgvwbwpGMbWzeHHeVcI1pVFfIPADQ53hX2S9r0EClN4Nh0T?= =?us-ascii?Q?HMvVtsXFkor+7Ynnp143wZQ5Ng1NOFtekRbseG8L5pes8y1s+csDf/4zy0To?= =?us-ascii?Q?caAM3o79/bmttMdkl7+58WLs+tCwtW+E4wMa6LztObP6XueTubhNRagJkAY7?= =?us-ascii?Q?FAch64BZY9RVopwbOC+QPFLiT3TiM8YBY92eQXqwSxnPF5D6vchu/KhaVS8J?= X-MS-Exchange-AntiSpam-ExternalHop-MessageData-1: yTI+nBDz5YBlTH1qMnCvBwYOgcgjTaZlxArXvqi+M/BdO5xodR3gXafaJBkM4DUw6YIQgFgmVT9zjnGQfRtgVF+HqWenlzMp/JVmDJXupTW72sS1Qt/CzPCnJ+mLJq6aJ3P0lqZcK+8/1Xu4wi08E+AcAXJQJjhclQtexwP5qvZIXjTQJHpoIKyt1uk6ei5u4BJW9w2cvxOJ5UUOfvPdFUCGftMjc6o+Pk4CpiTrse7nhJHq7QLOzpVywqWXD41tN7UlfXlbVQeGHLDxaCmE4QleyigRIacbwIEGN4QBJBzqoAmwPrXmncwLDIBj1r6UmE6FQbeyWsZoJWEvdqj9DUz+Y6q6bjVtsYZQMbuOK5jaEHVK5sKo0d+YDtv1A7qpVOA1iVLx9JxRLkeEnWgDNzdJBnkNejFLjpWHyDVbPj6o1u8MuVAOJfT0zSYk65Y6sB7VR0FIdFl4SQ== X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: a5d1f57d-a570-41bc-2137-08db70d5995b X-MS-Exchange-CrossTenant-AuthSource: CO1PR10MB4531.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Jun 2023 14:58:10.8277 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: LTSvmu/zETGtLc6nogPO+k444pOEXim7R22X4fxuVGwgO25MA50/+91+2adSZOJMLWLBVA5Z9SkI4RoLnYY3XdEM/4XRkYQ1XybE9j/muCQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR10MB6543 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-06-19_11,2023-06-16_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=930 adultscore=0 spamscore=0 bulkscore=0 malwarescore=0 phishscore=0 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2305260000 definitions=main-2306190137 X-Proofpoint-GUID: roUeQd1fx0g_f4aAXYyQgqfxXdveWt4K X-Proofpoint-ORIG-GUID: roUeQd1fx0g_f4aAXYyQgqfxXdveWt4K X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The Kconfig is refactored to consolidate KEXEC and CRASH options from various arch//Kconfig files into new file kernel/Kconfig.kexec. The Kconfig.kexec is now a submenu titled "Kexec and crash features" located under "General Setup". The following options are impacted: - KEXEC - KEXEC_FILE - KEXEC_SIG - KEXEC_SIG_FORCE - KEXEC_BZIMAGE_VERIFY_SIG - KEXEC_JUMP - CRASH_DUMP Over time, these options have been copied between Kconfig files and are very similar to one another, but with slight differences. The following architectures are impacted by the refactor (because of use of one or more KEXEC/CRASH options): - arm - arm64 - ia64 - loongarch - m68k - mips - parisc - powerpc - riscv - s390 - sh - x86 More information: In the patch series "crash: Kernel handling of CPU and memory hot un/plug" https://lore.kernel.org/lkml/20230503224145.7405-1-eric.devolder@oracle.com/ the new kernel feature introduces the config option CRASH_HOTPLUG. In reviewing, Thomas Gleixner requested that the new config option not be placed in x86 Kconfig. Rather the option needs a generic/common home. To Thomas' point, the KEXEC and CRASH options have largely been duplicated in the various arch//Kconfig files, with minor differences. This kind of proliferation is to be avoid/stopped. https://lore.kernel.org/lkml/875y91yv63.ffs@tglx/ To that end, I have refactored the arch Kconfigs so as to consolidate the various KEXEC and CRASH options. Generally speaking, this work has the following themes: - KEXEC and CRASH options are moved into new file kernel/Kconfig.kexec - These items from arch/Kconfig: CRASH_CORE KEXEC_CORE KEXEC_ELF HAVE_IMA_KEXEC - These items from arch/x86/Kconfig form the common options: KEXEC KEXEC_FILE KEXEC_SIG KEXEC_SIG_FORCE KEXEC_BZIMAGE_VERIFY_SIG KEXEC_JUMP CRASH_DUMP - The crash hotplug series appends CRASH_HOTPLUG to Kconfig.kexec NOTE: PHYSICAL_START could be argued to be included in this series. - The Kconfig.kexec is now a submenu titled "Kexec and crash features" - The Kconfig.kexec is now listed in "General Setup" submenu from init/Kconfig - To control the main common options, new options ARCH_SUPPORTS_KEXEC, ARCH_SUPPORTS_KEXEC_FILE and ARCH_SUPPORTS_CRASH_DUMP are introduced. NOTE: The existing ARCH_HAS_KEXEC_PURGATORY remains unchanged. - To account for the slight differences, new options ARCH_SELECTS_KEXEC, ARCH_SELECTS_KEXEC_FILE and ARCH_SELECTS_CRASH_DUMP are used to elicit the same side effects as the original arch//Kconfig files for KEXEC and CRASH options. An example, 'make menuconfig' illustrating the submenu: > General setup > Kexec and crash features [*] Enable kexec system call [*] Enable kexec file based system call [*] Verify kernel signature during kexec_file_load() syscall [ ] Require a valid signature in kexec_file_load() syscall [ ] Enable bzImage signature verification support [*] kexec jump [*] kernel crash dumps [*] Update the crash elfcorehdr on system configuration changes The three main options are KEXEC, KEXEC_FILE and CRASH_DUMP. In the process of consolidating these options, I encountered slight differences in the coding of these options in several of the architectures. As a result, I settled on the following solution: - Each of three main options has a 'depends on ARCH_SUPPORTS_