Received: by 2002:a05:7412:40d:b0:e2:908c:2ebd with SMTP id 13csp964643rdf; Wed, 22 Nov 2023 01:36:13 -0800 (PST) X-Google-Smtp-Source: AGHT+IHZhnmzQDrZTXHufjanTErfn87ffGjBDcb84iF0IeQXznJyh1fIId4RKcSTRfzJYDSjaCQs X-Received: by 2002:a05:6a20:3ca2:b0:187:bb9c:569 with SMTP id b34-20020a056a203ca200b00187bb9c0569mr3208384pzj.5.1700645772854; Wed, 22 Nov 2023 01:36:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700645772; cv=none; d=google.com; s=arc-20160816; b=NCoqOujy93Ukea3H8Gd6MWiILygFy7FtiZCOJGtOZhkqTT/GMcxYrN2CMxn+dpLESg jvPEU/joE28+oB8lHQOVizATi4DRUNKfcBWq6LCb7LqNDqO1xkQxQdmBT/8V4cKrZCmc t3GJQSoaXTzWgmmathbF96kU+qUABHrzfyh40GkgcVaXtJe3MGMImn8/hU2jQTX7ILlo B/cLjKdNiEtF54KhctYx1uFjXcz+CazAFOKlVUXyke0ciPDD29XibGK4v+kTPTugvb0g uUPpTIbQSRFLHn2E0x2dEAMYj5nzWy3Mr3gWi8jy+ypylx9JeIECq9s5A8l7Qu+2XLh7 X0Ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=+OTgZltwB2ZS+YZyn6PYgFPXeR3pdRlWkz0aWS8O4HE=; fh=ltonKVugXFfkW2ftetTgl/Oa4zWreTeKDopFbuK8wRI=; b=YbnK8QM69TK3ZwDZV32Lrksl+76RyaJ/d72N+/fnQSMrPvjc6h54vVWw/7Pc8TuB44 9GIoMcs/DJlCrzviUiPPhC3AeS8CI0p99rFFYVKh79byRuIpLKjfIzGToEQTTeGUlyir EzvsD1UC4olklT8T+e7jsalNrXOfRPq2ohhQWbkubSrDk8G4zvko56RgBx1tmGHFgw0J JdtOVTyGyv4tN+zY9H/qgY5xgaVP8x4F3wLz7lWcaOBSxZO2Ll5Qc3gkjq4GQxevqntW tSWDSaNHbftE6w/j/IncfPGOtOV9agIGGnThlawf6k+ko64n48TypX2+Jvk8Mu/KcrXr nIzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BwWuuSDS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id 32-20020a631060000000b005b8f61fcba4si11439970pgq.35.2023.11.22.01.36.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 01:36:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BwWuuSDS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 3D45A807E65C; Wed, 22 Nov 2023 01:35:09 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230181AbjKVJev (ORCPT + 99 others); Wed, 22 Nov 2023 04:34:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42562 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229995AbjKVJet (ORCPT ); Wed, 22 Nov 2023 04:34:49 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9FE25198 for ; Wed, 22 Nov 2023 01:34:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1700645683; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+OTgZltwB2ZS+YZyn6PYgFPXeR3pdRlWkz0aWS8O4HE=; b=BwWuuSDSvBZX8Mo7G/uzuxwxVixnrmmdqUnkZx0OtwE1DVMH27AH4c6jJvXbP/BVBm2pnd 77sZlTm5mtm89rkaBPL3o9nnd+bXlfVH6dL/cYz2vincEezSthdFNVSkUO8hR+dnyun2so bzfx4LydAh4Vj2wfqlYfnQ+tbldTuWc= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-591-_biuZLCONCOAsgDXiclx4A-1; Wed, 22 Nov 2023 04:34:40 -0500 X-MC-Unique: _biuZLCONCOAsgDXiclx4A-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 8960E3C0FCA6; Wed, 22 Nov 2023 09:34:39 +0000 (UTC) Received: from localhost (unknown [10.72.112.97]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 2A80F1C060AE; Wed, 22 Nov 2023 09:34:36 +0000 (UTC) Date: Wed, 22 Nov 2023 17:34:33 +0800 From: Baoquan He To: Ignat Korchagin Cc: eric_devolder@yahoo.com, linux@armlinux.org.uk, catalin.marinas@arm.com, will@kernel.org, chenhuacai@kernel.org, geert@linux-m68k.org, tsbogend@alpha.franken.de, James Bottomley , deller@gmx.de, ysato@users.sourceforge.jp, dalias@libc.org, glaubitz@physik.fu-berlin.de, Thomas Gleixner , Ingo Molnar , Borislav Petkov , dave.hansen@linux.intel.com, x86@kernel.org, linux-kernel , linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, loongarch@lists.linux.dev, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, kernel@xen0n.name, mpe@ellerman.id.au, npiggin@gmail.com, christophe.leroy@csgroup.eu, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, borntraeger@linux.ibm.com, svens@linux.ibm.com, hpa@zytor.com, keescook@chromium.org, paulmck@kernel.org, Peter Zijlstra , frederic@kernel.org, Andrew Morton , Ard Biesheuvel , samitolvanen@google.com, juerg.haefliger@canonical.com, arnd@arndb.de, rmk+kernel@armlinux.org.uk, linus.walleij@linaro.org, sebastian.reichel@collabora.com, rppt@kernel.org, kirill.shutemov@linux.intel.com, anshuman.khandual@arm.com, ziy@nvidia.com, masahiroy@kernel.org, ndesaulniers@google.com, mhiramat@kernel.org, ojeda@kernel.org, thunder.leizhen@huawei.com, xin3.li@intel.com, tj@kernel.org, Greg KH , tsi@tuyoix.net, hbathini@linux.ibm.com, sourabhjain@linux.ibm.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com, kernel-team Subject: Re: Potential config regression after 89cde455 ("kexec: consolidate kexec and crash options into kernel/Kconfig.kexec") Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.7 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 22 Nov 2023 01:35:09 -0800 (PST) On 11/21/23 at 09:43am, Ignat Korchagin wrote: > On Tue, Nov 21, 2023 at 7:53 AM Ignat Korchagin wrote: > > > > On Tue, Nov 21, 2023 at 1:50 AM Baoquan He wrote: > > > > > > Eric DeVolder's Oracle mail address is not available anymore, add his > > > current mail address he told me. > > > > Thank you! > > > > > On 11/20/23 at 10:52pm, Ignat Korchagin wrote: > > > > Good day! > > > > > > > > We have recently started to evaluate Linux 6.6 and noticed that we > > > > cannot disable CONFIG_KEXEC anymore, but keep CONFIG_CRASH_DUMP > > > > enabled. It seems to be related to commit 89cde455 ("kexec: > > > > consolidate kexec and crash options into kernel/Kconfig.kexec"), where > > > > a CONFIG_KEXEC dependency was added to CONFIG_CRASH_DUMP. > > > > > > > > In our current kernel (Linux 6.1) we only enable CONFIG_KEXEC_FILE > > > > with enforced signature check to support the kernel crash dumping > > > > functionality and would like to keep CONFIG_KEXEC disabled for > > > > security reasons [1]. > > > > > > > > I was reading the long commit message, but the reason for adding > > > > CONFIG_KEXEC as a dependency for CONFIG_CRASH_DUMP evaded me. And I > > > > believe from the implementation perspective CONFIG_KEXEC_FILE should > > > > suffice here (as we successfully used it for crashdumps on Linux 6.1). > > > > > > > > Is there a reason for adding this dependency or is it just an > > > > oversight? Would some solution of requiring either CONFIG_KEXEC or > > > > CONFIG_KEXEC_FILE work here? > > > > > > I searched the patch history, found Eric didn't add the dependency on > > > CONFIG_KEXEC at the beginning. Later a linux-next building failure with > > > randconfig was reported, in there CONFIG_CRASH_DUMP enabled, while > > > CONFIG_KEXEC is disabled. Finally Eric added the KEXEC dependency for > > > CRASH_DUMP. Please see below link for more details: > > > > > > https://lore.kernel.org/all/3e8eecd1-a277-2cfb-690e-5de2eb7b988e@oracle.com/T/#u > > > > Thank you for digging this up. However I'm still confused, because > > this is exactly how we configure Linux 6.1 (although we do have > > CONFIG_KEXEC_FILE enabled) and we don't have any problems. I believe > > we did not investigate this issue properly. > > I did some preliminary investigation for this. If I patch out the > dependency on CONFIG_KEXEC the kernel builds just fine for x86 > (without CONFIG_CRASH_HOTPLUG - which is probably another issue) - so > this was the previous behaviour. I can see that the reported error is > for arm architecture and was able to reproduce it with a simple cross > compiler in Debian. However, I think it is still somehow related to > this patchset as the previous kernels (up to 6.5) build fine with just > CONFIG_CRASH_DUMP and without CONFIG_KEXEC for arm as well. So even > for arm it was introduced in 6.6. Thanks for the information. I haven't run the reproducer of issue reported on Eric's old patchset, while checkout to kernel 6.1, only s390 selected KEXEC for CRASH_DUMP already. And with the ARM building breakage, the simplest idea is to select KEXEC only for ARM or S390 CRASH_DUMP. I plan to try the reproducer later. If you have any idea or draft patch, please feel free to post. diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec index 7aff28ded2f4..382dcd8d7a9d 100644 --- a/kernel/Kconfig.kexec +++ b/kernel/Kconfig.kexec @@ -97,7 +97,7 @@ config CRASH_DUMP depends on ARCH_SUPPORTS_KEXEC select CRASH_CORE select KEXEC_CORE - select KEXEC + select KEXEC if (ARM || S390) arch/s390/Kconfig in kernel 6.1: config CRASH_DUMP bool "kernel crash dumps" select KEXEC help Generate crash dump after being started by kexec. Crash dump kernels are loaded in the main kernel with kexec-tools into a specially reserved region and then later executed after a crash by kdump/kexec. Refer to for more details on this. This option also enables s390 zfcpdump. See also > > > > And besides, the newly added CONFIG_CRASH_HOTPLUG also needs > > > CONFIG_KEXEC if the elfcorehdr is allowed to be manipulated when > > > cpu/memory hotplug hapened. > > > > This still feels like a regression to me: any crash dump support > > should be independent of KEXEC syscalls being present. While probably > > the common case (including us) that the crashing kernel and recovery > > kernel are the same, they don't have to be. We need kexec syscall in > > the crashing kernel, but crashdump support in the recovery kernel (but > > the recovery kernel not having the kexec syscalls should be totally > > fine). If we do require some code definitions from kexec - at most we > > should put them under CONFIG_KEXEC_CORE. > > > > > Thanks > > > Baoquan > > > > > Ignat >