Message ID | 20230619145801.1064716-3-eric.devolder@oracle.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp3065068vqr; Mon, 19 Jun 2023 08:02:38 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7geTaCgB1x1WcK8LRiawOsd7lcvyuJXaMWqjAavolhx42CnPr7VnTc85FM4KMUq+m5PI8m X-Received: by 2002:a17:903:124d:b0:1aa:cf25:41d0 with SMTP id u13-20020a170903124d00b001aacf2541d0mr8666736plh.33.1687186957614; Mon, 19 Jun 2023 08:02:37 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1687186957; cv=pass; d=google.com; s=arc-20160816; b=vQZjstNKl4ZrkHoWTQknJ1l0LjVIf7d99UzBz/Vd6u7IYTf/XcO/YHEllR/Ne7L0P6 58wRY08ykml69YAaYOng11OjNN+I5k+Et3cZuYkoWNboZ37kiYED/ce8Z3OKgQeEtfnj /Ji39tYL/56fYW34pDHpWQOSeH7KpZ3NeFyyXahDJMsHXY7ukPwgHuNmWMMdLiAN0ZhW 3wz4AqqAcOQlUd6lZ+kPsqva52X3pcXIdXA29IcOO3O3NgQwJIe/n9M2Dr6UMQNQPNs3 QJzYoCbk/k/KVnYZZ4qUmhCzE2Ko3hk6brXVGs4RCWvL27hsGPsYS2QsCaxy97yZZtNn Valg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=yp7EQnytjUrxBmev2JWyYbQq943kCS+gdirGnmzZh/ctSNYxCYSR7ELVsNyLUkW8EB wG+m6+bJd4UesBOGCn0zF+mjKwbigazuOBnrcGlklSdcjweStNfUBpk9BwJpFLFSP3Yp iFq/DESXGD4XVRBR/DruUPZ/Yc8VZ6VYzTCXYN2VOsHOUGjS4nMWfb8sneFZlpSy+MLb PjlZo+Daf7kqcL0a5M5p3ZXwj18TlRJy8MpY6Eb87xxTIl/uWh/9aJiYPgsAoWOtPLgX IlSoKMGi4buYLMx94MuaOmRcuY9S3EpWSGPDgFumVH68/mRbZMm1cPU39/MEjqCtaSXK zD9Q== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b="Ie/kr42Z"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=ZMRGYmq4; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l8-20020a170902f68800b001b526e9bb43si8375459plg.249.2023.06.19.08.02.22; Mon, 19 Jun 2023 08:02:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b="Ie/kr42Z"; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=ZMRGYmq4; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232323AbjFSO71 (ORCPT <rfc822;duw91626@gmail.com> + 99 others); Mon, 19 Jun 2023 10:59:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49956 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232278AbjFSO7N (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 19 Jun 2023 10:59:13 -0400 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F04810CE; Mon, 19 Jun 2023 07:58:54 -0700 (PDT) Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 35J9nTMX029345; Mon, 19 Jun 2023 14:58:33 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2023-03-30; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=Ie/kr42Zfj3pe47GKxAjri/uC59bCzESuI5u41NVPQ5t7V7VeRprmLipErk0DJlk292z ExuXLWEVV+SRSdlDn+xczREPQRAMutYd48/zedEykZhw/wRGPNbhPiuuHThaZhTjL9j2 nSFBJg9unTU/Uj/MQnohBt3grldq6Q1O5EYV1whjecpSVwDGOml02kVxToNKpRxt/JwL LzrlyoiXBfnP4GW1eH4KgOCBs3ikpjYwyyO6eMxaV1sN1d2HnZbRQzKgu4NNHagLdfED 5tZw16mKtZiPcktTGUodtfBfttW/hynZnFJV15mgHeBZl4uOjC4M93uFJNjIOygeSh/E kQ== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3r95cttv20-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jun 2023 14:58:32 +0000 Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 35JD9mdB005929; Mon, 19 Jun 2023 14:58:31 GMT Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2047.outbound.protection.outlook.com [104.47.74.47]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3r93939jdk-3 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jun 2023 14:58:31 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KNC/G9SLi9IkzdrUq9w93elJjMY1L1CI6A7NIFpEdmm/VTqwspnQaa4nuWH3S5AHvimAxY/UEfQZUC6nVv8KouDI1aLY3eMW2pXF5Lu/GlRB78srOOZ2PqqfCQRIjeF+HnC1L2XEaXR/j0yMvxasM7mNkhYfv77SUOMldD2QqauRGXDJYDFWAg9vGAF1M8b97NL4vD2Dw0VxG3BV/BfkZ2v9ssuj/pXK53RhI5POJeEGr0EvpGoqKWT2SQFGQ5Sktq0DGayYeU0wP/lt6pXoQ08Nc95+BtcEASyQ6FZWd39B7iN9rRCGfTD1EGrpBG6T9p+2UlPr65IIWDwThP63/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=TVs0Tfoj3X0r9MUiuIA9FbNmp4VznA/CetBHeWa4L229WJwLIhH3UXfFO6+w+wrw21Ga7DGl7VrFQjpZNbmZn34zXNZ0CF383fulHfFYiPY5ttKjPnV8Xlu/LXnFXk7eBlNj90NlW+ws3P59JFcDjiXc3XRev5fY/Q95ilFtPgQLexwegpEfuJAXl4TRAJLZo7NlTIUik2lAPNhceAhj71Sk6De8KkyI4VqaQ4rJf0x1/3o3TdogAAbqWZzW1vY3+/+X79gUS58lvxPRt3IhWEO0hbDsH1vAnwJbUHoQpSgRPzuFlIOVb6KohJHOTaSFp4VmyqsTW7hLLWJXRfjDww== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=INO9jwnm7sy85thqLZ7evmCj4T//oZgOVoVhGsr8Lhw=; b=ZMRGYmq4pvCmkj4cLtbYf6TYYYQKzZ9h4Az515G7cpFpI1icouv9GSYUZdfiXuC9MEnrPoDxOFos4Eo6xhkdy2JA7jghFAqktFHXVF5iZCyr5+wng1nYkSd82tK6Kwu+KGJ9lOVr6BOvQj2kG0s/2o4DPJ0bxja4EbEWL2PBxTc= Received: from CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) by SA1PR10MB6543.namprd10.prod.outlook.com (2603:10b6:806:2bc::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.36; Mon, 19 Jun 2023 14:58:19 +0000 Received: from CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048]) by CO1PR10MB4531.namprd10.prod.outlook.com ([fe80::8b8f:b4b1:bb78:b048%5]) with mapi id 15.20.6500.036; Mon, 19 Jun 2023 14:58:16 +0000 From: Eric DeVolder <eric.devolder@oracle.com> To: linux@armlinux.org.uk, catalin.marinas@arm.com, will@kernel.org, chenhuacai@kernel.org, geert@linux-m68k.org, tsbogend@alpha.franken.de, James.Bottomley@HansenPartnership.com, deller@gmx.de, ysato@users.sourceforge.jp, dalias@libc.org, glaubitz@physik.fu-berlin.de, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org Cc: kernel@xen0n.name, mpe@ellerman.id.au, npiggin@gmail.com, christophe.leroy@csgroup.eu, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, borntraeger@linux.ibm.com, svens@linux.ibm.com, hpa@zytor.com, keescook@chromium.org, paulmck@kernel.org, peterz@infradead.org, frederic@kernel.org, akpm@linux-foundation.org, ardb@kernel.org, samitolvanen@google.com, juerg.haefliger@canonical.com, arnd@arndb.de, rmk+kernel@armlinux.org.uk, linus.walleij@linaro.org, sebastian.reichel@collabora.com, rppt@kernel.org, kirill.shutemov@linux.intel.com, anshuman.khandual@arm.com, ziy@nvidia.com, masahiroy@kernel.org, ndesaulniers@google.com, mhiramat@kernel.org, ojeda@kernel.org, thunder.leizhen@huawei.com, xin3.li@intel.com, tj@kernel.org, gregkh@linuxfoundation.org, tsi@tuyoix.net, bhe@redhat.com, hbathini@linux.ibm.com, sourabhjain@linux.ibm.com, eric.devolder@oracle.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com Subject: [PATCH v2 02/13] x86/kexec: refactor for kernel/Kconfig.kexec Date: Mon, 19 Jun 2023 10:57:50 -0400 Message-Id: <20230619145801.1064716-3-eric.devolder@oracle.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20230619145801.1064716-1-eric.devolder@oracle.com> References: <20230619145801.1064716-1-eric.devolder@oracle.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: DM6PR06CA0084.namprd06.prod.outlook.com (2603:10b6:5:336::17) To CO1PR10MB4531.namprd10.prod.outlook.com (2603:10b6:303:6c::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1PR10MB4531:EE_|SA1PR10MB6543:EE_ X-MS-Office365-Filtering-Correlation-Id: 090ce134-e2a8-45b7-cd0e-08db70d59cbe X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR10MB4531.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(39860400002)(396003)(346002)(366004)(136003)(376002)(451199021)(7416002)(7366002)(66946007)(7406005)(8936002)(8676002)(66556008)(66476007)(107886003)(1076003)(26005)(186003)(6506007)(6512007)(36756003)(83380400001)(41300700001)(38100700002)(5660300002)(4326008)(316002)(2616005)(921005)(6666004)(6486002)(478600001)(2906002)(86362001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 2 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-1: I2fGMIYx6pP8T7+NrGTbKfj50fN3p6n3Nwf1firFGZ32BxKsynH+dAUO57LJoOQI8eXbX+GWzMyy+sDXq47wdSJ2ItvWgh7i4jHD2LRfn7SYivJkoQNq0WQEG44r7b2UtJ8pO0OSDWQ38uAwSGksgPB4085xPo6VRFbut7OWoxGDeVkAIMSecVbqqCfq5fnBw9CpMxQUV6kb+dPE/vqpBqTeahDX05Fg6+BZIqpqe312hIkFsUuCzNsMLD2vpESBF8x9c1CC9Tqsu6/mrYr0aoNB5REPJi4TcClPc/z9ipYSSIVgM7QS8j61uiUlwav5gf1T6FzYaE4Sn78rdc9DG61Ec3eMX/3wH/Op55OzWoOitR+Jc5Mf2tPsyYM/w2qVa/DXlz0HySSYojQ4fTHzYsNOXYGsYtx3DyJxmSbBMBlY+SkFPgF/Po6UkZ7bOunQwzjDtPs02IGgcA== X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 090ce134-e2a8-45b7-cd0e-08db70d59cbe X-MS-Exchange-CrossTenant-AuthSource: CO1PR10MB4531.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Jun 2023 14:58:16.4560 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: dCsgTyOqbnj4Xj8vUn+3KPM4Aw6UwlOH/ic7KZICF7Afr9DV0JAmxsfPdS/s9xhHyuGf6rZGy4k7L50V40TAohZrbiSOwEH9PbTfyABYNWE= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR10MB6543 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-06-19_11,2023-06-16_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 adultscore=0 spamscore=0 bulkscore=0 malwarescore=0 phishscore=0 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2305260000 definitions=main-2306190137 X-Proofpoint-GUID: 8lEqwjPk3mns1e8sRyRZrpd1s-nTwbQ1 X-Proofpoint-ORIG-GUID: 8lEqwjPk3mns1e8sRyRZrpd1s-nTwbQ1 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1769143751190918788?= X-GMAIL-MSGID: =?utf-8?q?1769143751190918788?= |
Series |
refactor Kconfig to consolidate KEXEC and CRASH options
|
|
Commit Message
Eric DeVolder
June 19, 2023, 2:57 p.m. UTC
The kexec and crash kernel options are provided in the common
kernel/Kconfig.kexec. Utilize the common options and provide
the ARCH_SUPPORTS_ and ARCH_SELECTS_ entries to recreate the
equivalent set of KEXEC and CRASH options.
Signed-off-by: Eric DeVolder <eric.devolder@oracle.com>
---
arch/x86/Kconfig | 89 +++++++-----------------------------------------
1 file changed, 13 insertions(+), 76 deletions(-)
Comments
Hi Eric, On 06/19/23 at 10:57am, Eric DeVolder wrote: ...... > +config ARCH_SUPPORTS_KEXEC > + def_bool y > > -config ARCH_HAS_KEXEC_PURGATORY > - def_bool KEXEC_FILE > +config ARCH_SUPPORTS_KEXEC_FILE > + def_bool X86_64 && CRYPTO && CRYPTO_SHA256 ...... > +config ARCH_SELECTS_KEXEC_FILE > + def_bool y > depends on KEXEC_FILE > - help I am a little confused about this ARCH_SELECTS_XX adding. Wondering what limits us defining the ARCH_SUPPORTS_KEXEC_FILE like below? I have limited knowledge about Kconfig, please correct me if I am wrong. Thanks in advance. +config ARCH_SUPPORTS_KEXEC_FILE + def_bool y depends on KEXEC_FILE depends on X86_64 && CRYPTO && CRYPTO_SHA256 > - > - This option makes the kexec_file_load() syscall check for a valid > - signature of the kernel image. The image can still be loaded without > - a valid signature unless you also enable KEXEC_SIG_FORCE, though if > - there's a signature that we can check, then it must be valid. > - > - In addition to this option, you need to enable signature > - verification for the corresponding kernel image type being > - loaded in order for this to work. > -
On 6/20/23 03:21, Baoquan He wrote: > Hi Eric, > > On 06/19/23 at 10:57am, Eric DeVolder wrote: > ...... >> +config ARCH_SUPPORTS_KEXEC >> + def_bool y >> >> -config ARCH_HAS_KEXEC_PURGATORY >> - def_bool KEXEC_FILE >> +config ARCH_SUPPORTS_KEXEC_FILE >> + def_bool X86_64 && CRYPTO && CRYPTO_SHA256 > ...... >> +config ARCH_SELECTS_KEXEC_FILE >> + def_bool y >> depends on KEXEC_FILE >> - help > > I am a little confused about this ARCH_SELECTS_XX adding. Wondering what > limits us defining the ARCH_SUPPORTS_KEXEC_FILE like below? I have limited > knowledge about Kconfig, please correct me if I am wrong. Thanks in > advance. > > +config ARCH_SUPPORTS_KEXEC_FILE > + def_bool y > depends on KEXEC_FILE > depends on X86_64 && CRYPTO && CRYPTO_SHA256 > For the ARCH_SUPPORTS_ options, I chose to list the dependencies on the def_bool line to show that it took all those conditions to result in True. However, as you point out, using a def_bool y and then listing them as 'depends on' works as well. Probably would have resulted in fewer changes to the Kconfig file. Either way is ok (the 'depends on KEXEC_FILE' is erroneous in your example). eric >> - >> - This option makes the kexec_file_load() syscall check for a valid >> - signature of the kernel image. The image can still be loaded without >> - a valid signature unless you also enable KEXEC_SIG_FORCE, though if >> - there's a signature that we can check, then it must be valid. >> - >> - In addition to this option, you need to enable signature >> - verification for the corresponding kernel image type being >> - loaded in order for this to work. >> - >
On 06/20/23 at 07:56am, Eric DeVolder wrote: > > > On 6/20/23 03:21, Baoquan He wrote: > > Hi Eric, > > > > On 06/19/23 at 10:57am, Eric DeVolder wrote: > > ...... > > > +config ARCH_SUPPORTS_KEXEC > > > + def_bool y > > > -config ARCH_HAS_KEXEC_PURGATORY > > > - def_bool KEXEC_FILE > > > +config ARCH_SUPPORTS_KEXEC_FILE > > > + def_bool X86_64 && CRYPTO && CRYPTO_SHA256 > > ...... > > > +config ARCH_SELECTS_KEXEC_FILE > > > + def_bool y > > > depends on KEXEC_FILE > > > - help > > > > I am a little confused about this ARCH_SELECTS_XX adding. Wondering what > > limits us defining the ARCH_SUPPORTS_KEXEC_FILE like below? I have limited > > knowledge about Kconfig, please correct me if I am wrong. Thanks in > > advance. > > > > +config ARCH_SUPPORTS_KEXEC_FILE > > + def_bool y > > depends on KEXEC_FILE > > depends on X86_64 && CRYPTO && CRYPTO_SHA256 > > > > For the ARCH_SUPPORTS_ options, I chose to list the dependencies on the > def_bool line to show that it took all those conditions to result in True. > However, as you point out, using a def_bool y and then listing them as 'depends on' works as well. > Probably would have resulted in fewer changes to the Kconfig file. > Either way is ok (the 'depends on KEXEC_FILE' is erroneous in your example). Got it, thanks. To me, one option with explicit dependencies looks clearer and straightforward. I need check and investigage why two options are needed, whether two options are unavoidable. Not sure if other people would get the same feeling or not. Honestly, it's my first time to see the usage of XXX_SELECTS_XXX, it took me a while to dig into. > > > > - > > > - This option makes the kexec_file_load() syscall check for a valid > > > - signature of the kernel image. The image can still be loaded without > > > - a valid signature unless you also enable KEXEC_SIG_FORCE, though if > > > - there's a signature that we can check, then it must be valid. > > > - > > > - In addition to this option, you need to enable signature > > > - verification for the corresponding kernel image type being > > > - loaded in order for this to work. > > > - > > >
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 53bab123a8ee..1afc6ca2986b 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -2043,88 +2043,25 @@ config EFI_RUNTIME_MAP source "kernel/Kconfig.hz" -config KEXEC - bool "kexec system call" - select KEXEC_CORE - help - kexec is a system call that implements the ability to shutdown your - current kernel, and to start another kernel. It is like a reboot - but it is independent of the system firmware. And like a reboot - you can start any kernel with it, not just Linux. - - The name comes from the similarity to the exec system call. - - It is an ongoing process to be certain the hardware in a machine - is properly shutdown, so do not be surprised if this code does not - initially work for you. As of this writing the exact hardware - interface is strongly in flux, so no good recommendation can be - made. - -config KEXEC_FILE - bool "kexec file based system call" - select KEXEC_CORE - select HAVE_IMA_KEXEC if IMA - depends on X86_64 - depends on CRYPTO=y - depends on CRYPTO_SHA256=y - help - This is new version of kexec system call. This system call is - file based and takes file descriptors as system call argument - for kernel and initramfs as opposed to list of segments as - accepted by previous system call. +config ARCH_SUPPORTS_KEXEC + def_bool y -config ARCH_HAS_KEXEC_PURGATORY - def_bool KEXEC_FILE +config ARCH_SUPPORTS_KEXEC_FILE + def_bool X86_64 && CRYPTO && CRYPTO_SHA256 -config KEXEC_SIG - bool "Verify kernel signature during kexec_file_load() syscall" +config ARCH_SELECTS_KEXEC_FILE + def_bool y depends on KEXEC_FILE - help - - This option makes the kexec_file_load() syscall check for a valid - signature of the kernel image. The image can still be loaded without - a valid signature unless you also enable KEXEC_SIG_FORCE, though if - there's a signature that we can check, then it must be valid. - - In addition to this option, you need to enable signature - verification for the corresponding kernel image type being - loaded in order for this to work. - -config KEXEC_SIG_FORCE - bool "Require a valid signature in kexec_file_load() syscall" - depends on KEXEC_SIG - help - This option makes kernel signature verification mandatory for - the kexec_file_load() syscall. + select HAVE_IMA_KEXEC if IMA -config KEXEC_BZIMAGE_VERIFY_SIG - bool "Enable bzImage signature verification support" - depends on KEXEC_SIG - depends on SIGNED_PE_FILE_VERIFICATION - select SYSTEM_TRUSTED_KEYRING - help - Enable bzImage signature verification support. +config ARCH_HAS_KEXEC_PURGATORY + def_bool KEXEC_FILE -config CRASH_DUMP - bool "kernel crash dumps" - depends on X86_64 || (X86_32 && HIGHMEM) - help - Generate crash dump after being started by kexec. - This should be normally only set in special crash dump kernels - which are loaded in the main kernel with kexec-tools into - a specially reserved region and then later executed after - a crash by kdump/kexec. The crash dump kernel must be compiled - to a memory address not used by the main kernel or BIOS using - PHYSICAL_START, or it must be built as a relocatable image - (CONFIG_RELOCATABLE=y). - For more details see Documentation/admin-guide/kdump/kdump.rst +config ARCH_SUPPORTS_KEXEC_JUMP + def_bool y -config KEXEC_JUMP - bool "kexec jump" - depends on KEXEC && HIBERNATION - help - Jump between original kernel and kexeced kernel and invoke - code in physical address mode via KEXEC +config ARCH_SUPPORTS_CRASH_DUMP + def_bool X86_64 || (X86_32 && HIGHMEM) config PHYSICAL_START hex "Physical address where the kernel is loaded" if (EXPERT || CRASH_DUMP)