From patchwork Wed Jul 5 14:20:03 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric DeVolder X-Patchwork-Id: 13302324 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 061AEEB64DA for ; Wed, 5 Jul 2023 15:24:41 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232372AbjGEPYk (ORCPT ); Wed, 5 Jul 2023 11:24:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51224 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232032AbjGEPYj (ORCPT ); Wed, 5 Jul 2023 11:24:39 -0400 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1D8C6171C; Wed, 5 Jul 2023 08:24:38 -0700 (PDT) Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 365EDxdC014216; Wed, 5 Jul 2023 14:21:08 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2023-03-30; bh=/pfD7uBPmbtcD9dRNPZWZ4kR+jZnmb8tCIFetA2p17E=; b=TkZG978QJEHzAo1xUpwyRbro8S0G/1e2WfhLS/Xp7AXS3RCX+nskSyVj3cEOV87ahT0Q 8fDczRJCuGYqWYkAZ9xdW0QcejgjpU7X1nV1eoPgJiCOJTsYO/5N5ZcZxl9DrhkmiKHq rk4LkhhlKjesmj5nspXjSBbM684M0U8i8K9Q55rEXgnluZuvv2NzMXuPMYL6ynAV0rtR j2LsZ/xnOUBsiUo3NFOfSWPSS46EpEWmJOAoGKoBzn/4EptGWxbpQz15r8GwJZPvTs/v /+j0LHKJ7sbBueAUlTLpCRfw99tXr0Yw98d+tkqh6kZ2RDEtOrUTa5zIViaxAX7AzWT9 ww== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3rjajdejus-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 05 Jul 2023 14:21:08 +0000 Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 365DMsPD007181; Wed, 5 Jul 2023 14:21:07 GMT Received: from nam12-dm6-obe.outbound.protection.outlook.com (mail-dm6nam12lp2171.outbound.protection.outlook.com [104.47.59.171]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3rjakbnwpn-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 05 Jul 2023 14:21:07 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=E/fBr3/z9r24RdfH/xOvTRni+rhdHq4sh9H+0i52S6hfoMoH04peleQWWx7Cu22wGFOPe7z+deKheNjVqktm2V9/CskaUL/SYOKTNVqKPsCIk/B/rhsKskUVDUOI3OFOAtj060ixpND2mI0MQohHCSFCYuk9IKmHPuSY1de8zkcXWwfHT/s5hYD3obGzEM6mfvBZMUbALlUUdkBcwl906Z7B20iiw5CdEwihW1Aa7k4KLbQ6Ice1Qtls/gujfAcCTsALP6aTkPjOsKxp2bGsU1nSLhAuLZU8rDUHSWZ8vyTTkCvYm4+7DF4/6iydlcrU9/6v5QFp6boS66+gVoKFag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/pfD7uBPmbtcD9dRNPZWZ4kR+jZnmb8tCIFetA2p17E=; b=QjQIFwBIDvEfoTMavK6zZZ/zunk3mcCgc1zDuhhPG7IL/rF9Gqm/OJbUiaSLajxFm1ylMUgMHAs+VsOHywge3rvxdfBIjedA4Ep4Vw6pvR++VxUM/qqteg51vHrSs1lTgjGmr0GA4oKHUgjUqCkkG+e2E5Y388h/BKGAyzXI+ft4GMR5bE3E1rjbbaCnbVx8cJUc2M0g4ez0wdMHAhJxT557oxLsGnrt04Qxv4NZqP6Vc+BP2ObaUvz1XItSEic3V7O7l9wCR7Kd4wa56ofV2RttA69F3Cr08kPlc2ef6i3FZYS7kiUSGp6qDthYVi0kG+hbrAvllbUgaAIu7JVsxQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/pfD7uBPmbtcD9dRNPZWZ4kR+jZnmb8tCIFetA2p17E=; b=f1hf0ir4kRHUW2FpLp7fEm04DPOH7Fl4Bp9BkwnRrumzlmxF0Mh4YNDjSxVredBTaGG2hSRuI9fYxpQbnB1eNp8lsjID33OqgDbnFWaNg5K45eWVArT2zUQw7NN0twRd8xV5awulJeVnqSrm/x83UVFLFz5E1URZ6htUkStEWp8= Received: from CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) by SA2PR10MB4732.namprd10.prod.outlook.com (2603:10b6:806:fa::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.17; Wed, 5 Jul 2023 14:21:04 +0000 Received: from CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048]) by CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048%5]) with mapi id 15.20.6565.016; Wed, 5 Jul 2023 14:21:02 +0000 From: Eric DeVolder To: linux@armlinux.org.uk, catalin.marinas@arm.com, will@kernel.org, chenhuacai@kernel.org, geert@linux-m68k.org, tsbogend@alpha.franken.de, James.Bottomley@HansenPartnership.com, deller@gmx.de, ysato@users.sourceforge.jp, dalias@libc.org, glaubitz@physik.fu-berlin.de, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org Cc: kernel@xen0n.name, mpe@ellerman.id.au, npiggin@gmail.com, christophe.leroy@csgroup.eu, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, borntraeger@linux.ibm.com, svens@linux.ibm.com, hpa@zytor.com, keescook@chromium.org, paulmck@kernel.org, peterz@infradead.org, frederic@kernel.org, akpm@linux-foundation.org, ardb@kernel.org, samitolvanen@google.com, juerg.haefliger@canonical.com, arnd@arndb.de, rmk+kernel@armlinux.org.uk, linus.walleij@linaro.org, sebastian.reichel@collabora.com, rppt@kernel.org, kirill.shutemov@linux.intel.com, anshuman.khandual@arm.com, ziy@nvidia.com, masahiroy@kernel.org, ndesaulniers@google.com, mhiramat@kernel.org, ojeda@kernel.org, thunder.leizhen@huawei.com, xin3.li@intel.com, tj@kernel.org, gregkh@linuxfoundation.org, tsi@tuyoix.net, bhe@redhat.com, hbathini@linux.ibm.com, sourabhjain@linux.ibm.com, eric.devolder@oracle.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Subject: [PATCH v4 12/13] s390/kexec: refactor for kernel/Kconfig.kexec Date: Wed, 5 Jul 2023 10:20:03 -0400 Message-Id: <20230705142004.3605799-13-eric.devolder@oracle.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20230705142004.3605799-1-eric.devolder@oracle.com> References: <20230705142004.3605799-1-eric.devolder@oracle.com> X-ClientProxiedBy: SJ2PR07CA0008.namprd07.prod.outlook.com (2603:10b6:a03:505::8) To CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1PR10MB4531:EE_|SA2PR10MB4732:EE_ X-MS-Office365-Filtering-Correlation-Id: c3bdafbf-8b76-4acd-6d67-08db7d630fba X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR10MB4531.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(136003)(366004)(376002)(39860400002)(396003)(346002)(451199021)(8936002)(8676002)(2906002)(2616005)(5660300002)(6506007)(7416002)(7406005)(26005)(1076003)(7366002)(186003)(66946007)(41300700001)(107886003)(921005)(6486002)(4326008)(66556008)(66476007)(36756003)(316002)(83380400001)(478600001)(6512007)(38100700002)(86362001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 2 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-1: iyR4IuLrdKvG1kt58lqBhUll5Pfy6PaJ7yD+/zCaTl42pVVbH6bLe1HfjkyQqQb9BssxIqOCnXtzJ7CMrVBUYixdZHUFa+FghCEN2bGr8JxSFxdwUafy+uGIiNRNgoAyr0YNmmo2CSnyswyrbV2HvNdZFpr3moHnnPba3U0r2/CsbtkdXznbVRzReGoOuEZ8IPlaRPrArXTf27JhTmAjY02PB0fxtq9mOc2oldZza/ML0RaU92wV1iNMrmlYALQSsAg3QKYkoLs1I563gfpHxFgtWQY7/qFO+bHNfIitio4PVkgL0ySX4j4pHwNkQq1nanWH7kFS+xX2ffq65L1Wmi9CuTTVXOe8OgibUkLOmDbaB9DGTlV9N/sEvhCSUK30GdSA1j8LRYjbdqqBf0cE8xpkHcwJFhxg9HI6EbqdmsCZ5fF6U9zc33B5Q+D3e2VfUM/ExZGNyGjs/w== X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: c3bdafbf-8b76-4acd-6d67-08db7d630fba X-MS-Exchange-CrossTenant-AuthSource: CO1PR10MB4531.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Jul 2023 14:21:02.4660 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: c4LBtSjvbmpZpUxx2srJnS3VhtTp8+vtWZYBDnX0hRv3qBE0TJdIdnaEQ21xJNk7CboSb0u/aaxXXCTPkO1Y8ZNAKM+k3oGFD9sSpWdrfXU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR10MB4732 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-07-05_06,2023-07-05_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxlogscore=999 suspectscore=0 bulkscore=0 spamscore=0 mlxscore=0 adultscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2305260000 definitions=main-2307050129 X-Proofpoint-ORIG-GUID: XAFDxy3AW61eSIf4A343eXvhyhyjLfoR X-Proofpoint-GUID: XAFDxy3AW61eSIf4A343eXvhyhyjLfoR Precedence: bulk List-ID: X-Mailing-List: linux-mips@vger.kernel.org The kexec and crash kernel options are provided in the common kernel/Kconfig.kexec. Utilize the common options and provide the ARCH_SUPPORTS_ and ARCH_SELECTS_ entries to recreate the equivalent set of KEXEC and CRASH options. NOTE: The original Kconfig has a KEXEC_SIG which depends on MODULE_SIG_FORMAT. However, attempts to keep the MODULE_SIG_FORMAT dependency (using the strategy outlined in this series, and other techniques) results in 'error: recursive dependency detected' on CRYPTO. Per Alexander Gordeev : "the MODULE_SIG_FORMAT dependency was introduced with [git commit below] and in fact was not necessary, since s390 did/does not use mod_check_sig() anyway. commit c8424e776b09 ("MODSIGN: Export module signature definitions") MODULE_SIG_FORMAT is needed to select SYSTEM_DATA_VERIFICATION. But SYSTEM_DATA_VERIFICATION is also selected by FS_VERITY*, so dropping MODULE_SIG_FORMAT does not hurt." Therefore, the solution is to drop the MODULE_SIG_FORMAT dependency from KEXEC_SIG. Still results in equivalent .config files for s390. Signed-off-by: Eric DeVolder Acked-by: Alexander Gordeev Reported-by: Nathan Chancellor Reported-by: Linux Kernel Functional Testing Signed-off-by: Alexander Gordeev --- arch/s390/Kconfig | 65 ++++++++++++++--------------------------------- 1 file changed, 19 insertions(+), 46 deletions(-) diff --git a/arch/s390/Kconfig b/arch/s390/Kconfig index 5b39918b7042..5d4fbbfdd1cd 100644 --- a/arch/s390/Kconfig +++ b/arch/s390/Kconfig @@ -244,6 +244,25 @@ config PGTABLE_LEVELS source "kernel/livepatch/Kconfig" +config ARCH_DEFAULT_KEXEC + def_bool y + +config ARCH_SUPPORTS_KEXEC + def_bool y + +config ARCH_SUPPORTS_KEXEC_FILE + def_bool CRYPTO && CRYPTO_SHA256 && CRYPTO_SHA256_S390 + +config ARCH_HAS_KEXEC_PURGATORY + def_bool KEXEC_FILE + +config ARCH_SUPPORTS_CRASH_DUMP + def_bool y + help + Refer to for more details on this. + This option also enables s390 zfcpdump. + See also + menu "Processor type and features" config HAVE_MARCH_Z10_FEATURES @@ -482,36 +501,6 @@ config SCHED_TOPOLOGY source "kernel/Kconfig.hz" -config KEXEC - def_bool y - select KEXEC_CORE - -config KEXEC_FILE - bool "kexec file based system call" - select KEXEC_CORE - depends on CRYPTO - depends on CRYPTO_SHA256 - depends on CRYPTO_SHA256_S390 - help - Enable the kexec file based system call. In contrast to the normal - kexec system call this system call takes file descriptors for the - kernel and initramfs as arguments. - -config ARCH_HAS_KEXEC_PURGATORY - def_bool y - depends on KEXEC_FILE - -config KEXEC_SIG - bool "Verify kernel signature during kexec_file_load() syscall" - depends on KEXEC_FILE && MODULE_SIG_FORMAT - help - This option makes kernel signature verification mandatory for - the kexec_file_load() syscall. - - In addition to that option, you need to enable signature - verification for the corresponding kernel image type being - loaded in order for this to work. - config KERNEL_NOBP def_bool n prompt "Enable modified branch prediction for the kernel by default" @@ -733,22 +722,6 @@ config VFIO_AP endmenu -menu "Dump support" - -config CRASH_DUMP - bool "kernel crash dumps" - select KEXEC - help - Generate crash dump after being started by kexec. - Crash dump kernels are loaded in the main kernel with kexec-tools - into a specially reserved region and then later executed after - a crash by kdump/kexec. - Refer to for more details on this. - This option also enables s390 zfcpdump. - See also - -endmenu - config CCW def_bool y