From patchwork Mon Mar 13 18:13:22 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dimitri John Ledkov X-Patchwork-Id: 1756453 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=WIL8xEvZ; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Pb4Xh1LYJz1yWt for ; Tue, 14 Mar 2023 05:13:40 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1pbmfq-0002WP-EP; Mon, 13 Mar 2023 18:13:30 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1pbmfo-0002W2-O7 for kernel-team@lists.ubuntu.com; Mon, 13 Mar 2023 18:13:28 +0000 Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 275333F144 for ; Mon, 13 Mar 2023 18:13:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1678731208; bh=NARN8R9AR2oiGjhd14cuX1jYmLwotRgyXq9lhbHI7+E=; h=From:To:Subject:Date:Message-Id:MIME-Version; b=WIL8xEvZ6VIR9rDZcH0iuI78pvXPZgntSw7zd+wrfGI59ILxglIPkqIp19xHRqwoM o/9VWE+sBQ1c1B6IdiSWxyvwLEL12i0A4ALiAWO7XwcW3ze361Mu35cD2UjQHmmVym zVC+oc1honpfOpCGhyc8/1NKv62jsChhINQXz/HEVl1O9QYzaF/RCl5v/89XlkNE3k Up4diAJSZdgmoARHdL/21HPsB9y/gFrf15wF8PFceEnQ62gmGs0kQeqNqXx4gzSHzT vdJ5fId+H+9Z5N1rqbQi+ucIlOidosagJFml7jnuEAgfxSxZkvUNS7ORWUnIceT/Pc bEkG098P6ybhA== Received: by mail-wm1-f72.google.com with SMTP id t1-20020a7bc3c1000000b003dfe223de49so8142725wmj.5 for ; Mon, 13 Mar 2023 11:13:28 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1678731206; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=NARN8R9AR2oiGjhd14cuX1jYmLwotRgyXq9lhbHI7+E=; b=FmrqD+4I4+ke05sdbHH5IYlY8Pby09bemDE1+lx7Kem5C7tIDc4c4PgDAb7+5TyZvU 3USzhxfBN6atahh1C3fR4HaxySV5hQ5MpiTCUe9XXFCaHqYwpFupZlveCgwa0q+45cd+ QhUCRJce9IncYhbumoNAYq2pNjSbv6zbvzLfZCKTHmqWMm0aJhF8z9tILpzP0tknml0q xfI0Y8rc631wXrQKt09BSAcXVgu/se7BBCgqF2S9HsW5fCabXogSxTlLEk+krlKXu3YP ZMtwpDQ5oeRqKa0JCM/VoTcOWngqdmpVKcLB5kMryj26q0kOu4mTSgFv7/KeZaN9nIMv wt9g== X-Gm-Message-State: AO0yUKWSBeaDqfp1UWw9I8yGlrPnB/1vE4rKs+aQIXSIWWFAHarFFePk SOIzrtqt//7cmjd8IhzPQWLzzt5moZgY9FZ1OYVioPaK2BX66SgHVF/WlWvhd7MNU6EE0tCWs6G UvnsJMpXspp8xfKR8dRYTinsY2DBvgwIFZG48xMzcIyzkNRENoCM2 X-Received: by 2002:a5d:4c46:0:b0:2c5:9ef9:9bab with SMTP id n6-20020a5d4c46000000b002c59ef99babmr23663015wrt.43.1678731206442; Mon, 13 Mar 2023 11:13:26 -0700 (PDT) X-Google-Smtp-Source: AK7set85dU2fJg+6WTbFtF8az8PjPjssg/DJ2KXd781CKLFY2keFR8pUNDRLmfcg7yhweccA6DHRRQ== X-Received: by 2002:a5d:4c46:0:b0:2c5:9ef9:9bab with SMTP id n6-20020a5d4c46000000b002c59ef99babmr23663005wrt.43.1678731206131; Mon, 13 Mar 2023 11:13:26 -0700 (PDT) Received: from localhost ([137.220.91.195]) by smtp.gmail.com with ESMTPSA id v8-20020a5d43c8000000b002cefcac0c62sm137669wrr.9.2023.03.13.11.13.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Mar 2023 11:13:25 -0700 (PDT) From: Dimitri John Ledkov To: kernel-team@lists.ubuntu.com Subject: [lunar:linux][PATCH] UBUNTU: [Config] Mark CONFIG_SCSI_VIRTIO built-in Date: Mon, 13 Mar 2023 18:13:22 +0000 Message-Id: <20230313181322.188844-1-dimitri.ledkov@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" This enables initrd-less boot on generic kernel, enabling any Ubuntu installation to be lifted from any hardware and converted into a VM which will, even with corrupted initrd and missing modules, be able to boot by default. This is an extremly useful property to have on all ubuntu kernels. Separately, this also removes the need for linux-kvm kernel flavour, as all the changes it has are now incorporated into generic flavour & cloud-images. Signed-off-by: Dimitri John Ledkov --- debian.master/config/annotations | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/debian.master/config/annotations b/debian.master/config/annotations index 03218fde35..02a08f4503 100644 --- a/debian.master/config/annotations +++ b/debian.master/config/annotations @@ -528,7 +528,7 @@ CONFIG_SCSI_IPR_DUMP note<'LP: #1343109'> CONFIG_SCSI_IPR_TRACE policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y'}> CONFIG_SCSI_IPR_TRACE note<'LP: #1343109'> -CONFIG_SCSI_VIRTIO policy<{'amd64': 'm', 'arm64': 'm', 'armhf': 'm', 'ppc64el': 'm', 'riscv64': 'm', 's390x': 'm'}> +CONFIG_SCSI_VIRTIO policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> CONFIG_SCSI_VIRTIO note<'tech preview of new feature'> CONFIG_SECURITY_SAFESETID policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}>