Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

[MIPS] Kconfig: Move some entries to appropriate menu

Currently KEXEC is in "Machine selection", SECCOMP, PM, APM are in
"Executable file formats" menu. Move KEXEC and SECCOMP to "Kernel
type" and PM, APM to new "Power management options" menu. Also
replace "config PM" with kernel/power/Kconfig.

Signed-off-by: Atsushi Nemoto <anemo@mba.ocn.ne.jp>
Signed-off-by: Ralf Baechle <ralf@linux-mips.org>

authored by

Atsushi Nemoto and committed by
Ralf Baechle
ea6e942b 9a0ad9e9

+34 -34
+34 -34
arch/mips/Kconfig
··· 790 790 791 791 endchoice 792 792 793 - config KEXEC 794 - bool "Kexec system call (EXPERIMENTAL)" 795 - depends on EXPERIMENTAL 796 - help 797 - kexec is a system call that implements the ability to shutdown your 798 - current kernel, and to start another kernel. It is like a reboot 799 - but it is indepedent of the system firmware. And like a reboot 800 - you can start any kernel with it, not just Linux. 801 - 802 - The name comes from the similiarity to the exec system call. 803 - 804 - It is an ongoing process to be certain the hardware in a machine 805 - is properly shutdown, so do not be surprised if this code does not 806 - initially work for you. It may help to enable device hotplugging 807 - support. As of this writing the exact hardware interface is 808 - strongly in flux, so no good recommendation can be made. 809 - 810 793 source "arch/mips/ddb5xxx/Kconfig" 811 794 source "arch/mips/gt64120/ev64120/Kconfig" 812 795 source "arch/mips/jazz/Kconfig" ··· 1842 1859 This will result in additional memory usage, so it is not 1843 1860 recommended for normal users. 1844 1861 1862 + config KEXEC 1863 + bool "Kexec system call (EXPERIMENTAL)" 1864 + depends on EXPERIMENTAL 1865 + help 1866 + kexec is a system call that implements the ability to shutdown your 1867 + current kernel, and to start another kernel. It is like a reboot 1868 + but it is indepedent of the system firmware. And like a reboot 1869 + you can start any kernel with it, not just Linux. 1870 + 1871 + The name comes from the similiarity to the exec system call. 1872 + 1873 + It is an ongoing process to be certain the hardware in a machine 1874 + is properly shutdown, so do not be surprised if this code does not 1875 + initially work for you. It may help to enable device hotplugging 1876 + support. As of this writing the exact hardware interface is 1877 + strongly in flux, so no good recommendation can be made. 1878 + 1879 + config SECCOMP 1880 + bool "Enable seccomp to safely compute untrusted bytecode" 1881 + depends on PROC_FS && BROKEN 1882 + default y 1883 + help 1884 + This kernel feature is useful for number crunching applications 1885 + that may need to compute untrusted bytecode during their 1886 + execution. By using pipes or other transports made available to 1887 + the process as file descriptors supporting the read/write 1888 + syscalls, it's possible to isolate those applications in 1889 + their own address space using seccomp. Once seccomp is 1890 + enabled via /proc/<pid>/seccomp, it cannot be disabled 1891 + and the task is only allowed to execute a few safe syscalls 1892 + defined by each seccomp mode. 1893 + 1894 + If unsure, say Y. Only embedded should say N here. 1895 + 1845 1896 endmenu 1846 1897 1847 1898 config RWSEM_GENERIC_SPINLOCK ··· 2041 2024 config BINFMT_ELF32 2042 2025 bool 2043 2026 default y if MIPS32_O32 || MIPS32_N32 2044 - 2045 - config SECCOMP 2046 - bool "Enable seccomp to safely compute untrusted bytecode" 2047 - depends on PROC_FS && BROKEN 2048 - default y 2049 - help 2050 - This kernel feature is useful for number crunching applications 2051 - that may need to compute untrusted bytecode during their 2052 - execution. By using pipes or other transports made available to 2053 - the process as file descriptors supporting the read/write 2054 - syscalls, it's possible to isolate those applications in 2055 - their own address space using seccomp. Once seccomp is 2056 - enabled via /proc/<pid>/seccomp, it cannot be disabled 2057 - and the task is only allowed to execute a few safe syscalls 2058 - defined by each seccomp mode. 2059 - 2060 - If unsure, say Y. Only embedded should say N here. 2061 2027 2062 2028 config PM 2063 2029 bool "Power Management support (EXPERIMENTAL)"