License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 14:07:57 +00:00
|
|
|
# SPDX-License-Identifier: GPL-2.0
|
2005-04-16 22:20:36 +00:00
|
|
|
config MMU
|
2007-05-10 13:46:00 +00:00
|
|
|
def_bool y
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2016-04-14 07:00:27 +00:00
|
|
|
config CPU_BIG_ENDIAN
|
|
|
|
def_bool y
|
|
|
|
|
2006-07-03 07:25:02 +00:00
|
|
|
config LOCKDEP_SUPPORT
|
2007-05-10 13:46:00 +00:00
|
|
|
def_bool y
|
2006-07-03 07:25:02 +00:00
|
|
|
|
2006-07-03 07:24:41 +00:00
|
|
|
config STACKTRACE_SUPPORT
|
2007-05-10 13:46:00 +00:00
|
|
|
def_bool y
|
2006-07-03 07:24:41 +00:00
|
|
|
|
2006-12-08 10:37:49 +00:00
|
|
|
config ARCH_HAS_ILOG2_U32
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool n
|
2006-12-08 10:37:49 +00:00
|
|
|
|
|
|
|
config ARCH_HAS_ILOG2_U64
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool n
|
2006-12-08 10:37:49 +00:00
|
|
|
|
2006-03-26 09:39:34 +00:00
|
|
|
config GENERIC_HWEIGHT
|
2007-05-10 13:46:00 +00:00
|
|
|
def_bool y
|
2006-03-26 09:39:34 +00:00
|
|
|
|
2007-04-27 14:01:42 +00:00
|
|
|
config GENERIC_BUG
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y if BUG
|
2007-04-27 14:01:42 +00:00
|
|
|
|
2010-02-26 21:37:44 +00:00
|
|
|
config GENERIC_BUG_RELATIVE_POINTERS
|
|
|
|
def_bool y
|
|
|
|
|
2008-02-05 15:50:42 +00:00
|
|
|
config GENERIC_LOCKBREAK
|
2020-08-25 01:59:39 +00:00
|
|
|
def_bool y if PREEMPTION
|
2008-02-05 15:50:42 +00:00
|
|
|
|
2008-03-25 17:47:10 +00:00
|
|
|
config PGSTE
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y if KVM
|
2008-03-25 17:47:10 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
config AUDIT_ARCH
|
|
|
|
def_bool y
|
|
|
|
|
2014-04-07 22:39:19 +00:00
|
|
|
config NO_IOPORT_MAP
|
2012-11-29 13:38:46 +00:00
|
|
|
def_bool y
|
|
|
|
|
|
|
|
config PCI_QUIRKS
|
|
|
|
def_bool n
|
|
|
|
|
2014-09-22 14:39:06 +00:00
|
|
|
config ARCH_SUPPORTS_UPROBES
|
2015-02-12 12:08:27 +00:00
|
|
|
def_bool y
|
2014-09-22 14:39:06 +00:00
|
|
|
|
2017-11-19 10:39:39 +00:00
|
|
|
config KASAN_SHADOW_OFFSET
|
|
|
|
hex
|
|
|
|
depends on KASAN
|
2021-10-14 11:53:54 +00:00
|
|
|
default 0x1C000000000000
|
2017-11-19 10:39:39 +00:00
|
|
|
|
2006-01-06 08:19:28 +00:00
|
|
|
config S390
|
2007-05-10 13:46:00 +00:00
|
|
|
def_bool y
|
2020-12-28 08:51:57 +00:00
|
|
|
#
|
|
|
|
# Note: keep this list sorted alphabetically
|
|
|
|
#
|
|
|
|
imply IMA_SECURE_AND_OR_TRUSTED_BOOT
|
uaccess: generalize access_ok()
There are many different ways that access_ok() is defined across
architectures, but in the end, they all just compare against the
user_addr_max() value or they accept anything.
Provide one definition that works for most architectures, checking
against TASK_SIZE_MAX for user processes or skipping the check inside
of uaccess_kernel() sections.
For architectures without CONFIG_SET_FS(), this should be the fastest
check, as it comes down to a single comparison of a pointer against a
compile-time constant, while the architecture specific versions tend to
do something more complex for historic reasons or get something wrong.
Type checking for __user annotations is handled inconsistently across
architectures, but this is easily simplified as well by using an inline
function that takes a 'const void __user *' argument. A handful of
callers need an extra __user annotation for this.
Some architectures had trick to use 33-bit or 65-bit arithmetic on the
addresses to calculate the overflow, however this simpler version uses
fewer registers, which means it can produce better object code in the
end despite needing a second (statically predicted) branch.
Reviewed-by: Christoph Hellwig <hch@lst.de>
Acked-by: Mark Rutland <mark.rutland@arm.com> [arm64, asm-generic]
Acked-by: Geert Uytterhoeven <geert@linux-m68k.org>
Acked-by: Stafford Horne <shorne@gmail.com>
Acked-by: Dinh Nguyen <dinguyen@kernel.org>
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2022-02-15 16:55:04 +00:00
|
|
|
select ALTERNATE_USER_ADDRESS_SPACE
|
2021-02-10 20:51:02 +00:00
|
|
|
select ARCH_32BIT_USTAT_F_TINODE
|
2017-06-07 12:10:24 +00:00
|
|
|
select ARCH_BINFMT_ELF_STATE
|
2022-03-05 12:16:07 +00:00
|
|
|
select ARCH_CORRECT_STACKTRACE_ON_KRETPROBE
|
2021-05-05 01:38:17 +00:00
|
|
|
select ARCH_ENABLE_MEMORY_HOTPLUG if SPARSEMEM
|
|
|
|
select ARCH_ENABLE_MEMORY_HOTREMOVE
|
2021-07-01 01:51:58 +00:00
|
|
|
select ARCH_ENABLE_SPLIT_PMD_PTLOCK if PGTABLE_LEVELS > 2
|
2022-02-16 20:05:28 +00:00
|
|
|
select ARCH_HAS_CURRENT_STACK_POINTER
|
2024-03-07 12:28:27 +00:00
|
|
|
select ARCH_HAS_DEBUG_VIRTUAL
|
mm/debug: add tests validating architecture page table helpers
This adds tests which will validate architecture page table helpers and
other accessors in their compliance with expected generic MM semantics.
This will help various architectures in validating changes to existing
page table helpers or addition of new ones.
This test covers basic page table entry transformations including but not
limited to old, young, dirty, clean, write, write protect etc at various
level along with populating intermediate entries with next page table page
and validating them.
Test page table pages are allocated from system memory with required size
and alignments. The mapped pfns at page table levels are derived from a
real pfn representing a valid kernel text symbol. This test gets called
via late_initcall().
This test gets built and run when CONFIG_DEBUG_VM_PGTABLE is selected.
Any architecture, which is willing to subscribe this test will need to
select ARCH_HAS_DEBUG_VM_PGTABLE. For now this is limited to arc, arm64,
x86, s390 and powerpc platforms where the test is known to build and run
successfully Going forward, other architectures too can subscribe the test
after fixing any build or runtime problems with their page table helpers.
Folks interested in making sure that a given platform's page table helpers
conform to expected generic MM semantics should enable the above config
which will just trigger this test during boot. Any non conformity here
will be reported as an warning which would need to be fixed. This test
will help catch any changes to the agreed upon semantics expected from
generic MM and enable platforms to accommodate it thereafter.
[anshuman.khandual@arm.com: v17]
Link: http://lkml.kernel.org/r/1587436495-22033-3-git-send-email-anshuman.khandual@arm.com
[anshuman.khandual@arm.com: v18]
Link: http://lkml.kernel.org/r/1588564865-31160-3-git-send-email-anshuman.khandual@arm.com
Suggested-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com>
Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Qian Cai <cai@lca.pw>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Tested-by: Gerald Schaefer <gerald.schaefer@de.ibm.com> [s390]
Tested-by: Christophe Leroy <christophe.leroy@c-s.fr> [ppc32]
Reviewed-by: Ingo Molnar <mingo@kernel.org>
Cc: Mike Rapoport <rppt@linux.ibm.com>
Cc: Vineet Gupta <vgupta@synopsys.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will@kernel.org>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Paul Mackerras <paulus@samba.org>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
Cc: Vasily Gorbik <gor@linux.ibm.com>
Cc: Christian Borntraeger <borntraeger@de.ibm.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Kirill A. Shutemov <kirill@shutemov.name>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Link: http://lkml.kernel.org/r/1583919272-24178-1-git-send-email-anshuman.khandual@arm.com
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2020-06-04 23:47:15 +00:00
|
|
|
select ARCH_HAS_DEBUG_VM_PGTABLE
|
2020-09-09 15:10:29 +00:00
|
|
|
select ARCH_HAS_DEBUG_WX
|
2015-11-20 02:19:29 +00:00
|
|
|
select ARCH_HAS_DEVMEM_IS_ALLOWED
|
2015-04-14 22:48:00 +00:00
|
|
|
select ARCH_HAS_ELF_RANDOMIZE
|
2020-12-28 08:51:57 +00:00
|
|
|
select ARCH_HAS_FORCE_DMA_UNENCRYPTED
|
2017-09-12 11:49:57 +00:00
|
|
|
select ARCH_HAS_FORTIFY_SOURCE
|
2014-12-13 00:57:44 +00:00
|
|
|
select ARCH_HAS_GCOV_PROFILE_ALL
|
2019-05-14 00:19:04 +00:00
|
|
|
select ARCH_HAS_GIGANTIC_PAGE
|
2016-06-20 12:08:32 +00:00
|
|
|
select ARCH_HAS_KCOV
|
2023-03-17 09:31:40 +00:00
|
|
|
select ARCH_HAS_MEMBARRIER_SYNC_CORE
|
2019-08-06 04:49:14 +00:00
|
|
|
select ARCH_HAS_MEM_ENCRYPT
|
2022-09-28 18:25:20 +00:00
|
|
|
select ARCH_HAS_NMI_SAFE_THIS_CPU_OPS
|
2018-06-08 00:06:08 +00:00
|
|
|
select ARCH_HAS_PTE_SPECIAL
|
2020-12-28 08:51:57 +00:00
|
|
|
select ARCH_HAS_SCALED_CPUTIME
|
2023-04-14 12:30:44 +00:00
|
|
|
select ARCH_HAS_SET_DIRECT_MAP
|
2017-02-21 15:09:33 +00:00
|
|
|
select ARCH_HAS_SET_MEMORY
|
2017-02-07 00:31:57 +00:00
|
|
|
select ARCH_HAS_STRICT_KERNEL_RWX
|
|
|
|
select ARCH_HAS_STRICT_MODULE_RWX
|
s390: autogenerate compat syscall wrappers
Any system call that takes a pointer argument on s390 requires
a wrapper function to do a 31-to-64 zero-extension, these are
currently generated in arch/s390/kernel/compat_wrapper.c.
On arm64 and x86, we already generate similar wrappers for all
system calls in the place of their definition, just for a different
purpose (they load the arguments from pt_regs).
We can do the same thing here, by adding an asm/syscall_wrapper.h
file with a copy of all the relevant macros to override the generic
version. Besides the addition of the compat entry point, these also
rename the entry points with a __s390_ or __s390x_ prefix, similar
to what we do on arm64 and x86. This in turn requires renaming
a few things, and adding a proper ni_syscall() entry point.
In order to still compile system call definitions that pass an
loff_t argument, the __SC_COMPAT_CAST() macro checks for that
and forces an -ENOSYS error, which was the best I could come up
with. Those functions must obviously not get called from user
space, but instead require hand-written compat_sys_*() handlers,
which fortunately already exist.
Link: https://lore.kernel.org/lkml/20190116131527.2071570-5-arnd@arndb.de
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Reviewed-by: Heiko Carstens <heiko.carstens@de.ibm.com>
[heiko.carstens@de.ibm.com: compile fix for !CONFIG_COMPAT]
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2019-01-16 13:15:22 +00:00
|
|
|
select ARCH_HAS_SYSCALL_WRAPPER
|
2024-01-28 18:45:29 +00:00
|
|
|
select ARCH_HAS_UBSAN
|
2020-04-28 07:52:23 +00:00
|
|
|
select ARCH_HAS_VDSO_DATA
|
2013-02-06 09:15:55 +00:00
|
|
|
select ARCH_HAVE_NMI_SAFE_CMPXCHG
|
2009-11-09 15:21:34 +00:00
|
|
|
select ARCH_INLINE_READ_LOCK
|
|
|
|
select ARCH_INLINE_READ_LOCK_BH
|
|
|
|
select ARCH_INLINE_READ_LOCK_IRQ
|
|
|
|
select ARCH_INLINE_READ_LOCK_IRQSAVE
|
2013-02-06 09:15:55 +00:00
|
|
|
select ARCH_INLINE_READ_TRYLOCK
|
2009-11-09 15:21:34 +00:00
|
|
|
select ARCH_INLINE_READ_UNLOCK
|
|
|
|
select ARCH_INLINE_READ_UNLOCK_BH
|
|
|
|
select ARCH_INLINE_READ_UNLOCK_IRQ
|
|
|
|
select ARCH_INLINE_READ_UNLOCK_IRQRESTORE
|
2013-02-06 09:15:55 +00:00
|
|
|
select ARCH_INLINE_SPIN_LOCK
|
|
|
|
select ARCH_INLINE_SPIN_LOCK_BH
|
|
|
|
select ARCH_INLINE_SPIN_LOCK_IRQ
|
|
|
|
select ARCH_INLINE_SPIN_LOCK_IRQSAVE
|
|
|
|
select ARCH_INLINE_SPIN_TRYLOCK
|
|
|
|
select ARCH_INLINE_SPIN_TRYLOCK_BH
|
|
|
|
select ARCH_INLINE_SPIN_UNLOCK
|
|
|
|
select ARCH_INLINE_SPIN_UNLOCK_BH
|
|
|
|
select ARCH_INLINE_SPIN_UNLOCK_IRQ
|
|
|
|
select ARCH_INLINE_SPIN_UNLOCK_IRQRESTORE
|
2009-11-09 15:21:34 +00:00
|
|
|
select ARCH_INLINE_WRITE_LOCK
|
|
|
|
select ARCH_INLINE_WRITE_LOCK_BH
|
|
|
|
select ARCH_INLINE_WRITE_LOCK_IRQ
|
|
|
|
select ARCH_INLINE_WRITE_LOCK_IRQSAVE
|
2013-02-06 09:15:55 +00:00
|
|
|
select ARCH_INLINE_WRITE_TRYLOCK
|
2009-11-09 15:21:34 +00:00
|
|
|
select ARCH_INLINE_WRITE_UNLOCK
|
|
|
|
select ARCH_INLINE_WRITE_UNLOCK_BH
|
|
|
|
select ARCH_INLINE_WRITE_UNLOCK_IRQ
|
|
|
|
select ARCH_INLINE_WRITE_UNLOCK_IRQRESTORE
|
2024-01-08 13:27:47 +00:00
|
|
|
select ARCH_MHP_MEMMAP_ON_MEMORY_ENABLE
|
2019-08-14 12:27:44 +00:00
|
|
|
select ARCH_STACKWALK
|
2014-08-05 07:57:51 +00:00
|
|
|
select ARCH_SUPPORTS_ATOMIC_RMW
|
2020-12-15 03:10:30 +00:00
|
|
|
select ARCH_SUPPORTS_DEBUG_PAGEALLOC
|
2021-09-08 15:45:06 +00:00
|
|
|
select ARCH_SUPPORTS_HUGETLBFS
|
2023-04-25 11:42:11 +00:00
|
|
|
select ARCH_SUPPORTS_INT128 if CC_HAS_INT128 && CC_IS_CLANG
|
2015-05-08 15:40:44 +00:00
|
|
|
select ARCH_SUPPORTS_NUMA_BALANCING
|
2023-03-14 13:28:08 +00:00
|
|
|
select ARCH_SUPPORTS_PER_VMA_LOCK
|
2015-10-29 00:16:04 +00:00
|
|
|
select ARCH_USE_BUILTIN_BSWAP
|
2013-09-05 11:26:17 +00:00
|
|
|
select ARCH_USE_CMPXCHG_LOCKREF
|
2023-04-19 13:17:02 +00:00
|
|
|
select ARCH_USE_SYM_ANNOTATIONS
|
2021-06-21 23:18:22 +00:00
|
|
|
select ARCH_WANTS_NO_INSTR
|
2020-03-05 14:01:21 +00:00
|
|
|
select ARCH_WANT_DEFAULT_BPF_JIT
|
2023-03-01 08:41:06 +00:00
|
|
|
select ARCH_WANT_IPC_PARSE_VERSION
|
2023-06-13 00:10:27 +00:00
|
|
|
select ARCH_WANT_KERNEL_PMD_MKWRITE
|
2024-02-08 00:15:02 +00:00
|
|
|
select ARCH_WANT_LD_ORPHAN_WARN
|
2023-07-24 19:07:53 +00:00
|
|
|
select ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP
|
2019-12-04 00:46:31 +00:00
|
|
|
select BUILDTIME_TABLE_SORT
|
2013-02-06 09:15:55 +00:00
|
|
|
select CLONE_BACKWARDS2
|
2023-10-06 13:42:42 +00:00
|
|
|
select DCACHE_WORD_ACCESS if !KMSAN
|
2020-07-08 07:30:00 +00:00
|
|
|
select DMA_OPS if PCI
|
2014-08-15 11:16:09 +00:00
|
|
|
select DYNAMIC_FTRACE if FUNCTION_TRACER
|
2023-03-13 12:50:35 +00:00
|
|
|
select FUNCTION_ALIGNMENT_8B if CC_IS_GCC
|
|
|
|
select FUNCTION_ALIGNMENT_16B if !CC_IS_GCC
|
2020-12-28 08:51:57 +00:00
|
|
|
select GENERIC_ALLOCATOR
|
2015-02-19 11:22:02 +00:00
|
|
|
select GENERIC_CPU_AUTOPROBE
|
2018-03-21 08:38:21 +00:00
|
|
|
select GENERIC_CPU_VULNERABILITIES
|
2020-11-21 10:14:56 +00:00
|
|
|
select GENERIC_ENTRY
|
2020-04-28 07:52:23 +00:00
|
|
|
select GENERIC_GETTIMEOFDAY
|
2020-09-04 15:41:27 +00:00
|
|
|
select GENERIC_PTDUMP
|
2012-04-20 13:05:52 +00:00
|
|
|
select GENERIC_SMP_IDLE_THREAD
|
2013-11-22 09:04:53 +00:00
|
|
|
select GENERIC_TIME_VSYSCALL
|
2021-02-05 15:19:32 +00:00
|
|
|
select GENERIC_VDSO_TIME_NS
|
2023-07-06 15:45:11 +00:00
|
|
|
select GENERIC_IOREMAP if PCI
|
2023-10-02 13:43:03 +00:00
|
|
|
select HAVE_ALIGNED_STRUCT_PAGE
|
2014-02-25 09:16:24 +00:00
|
|
|
select HAVE_ARCH_AUDITSYSCALL
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_ARCH_JUMP_LABEL
|
2018-09-19 06:51:44 +00:00
|
|
|
select HAVE_ARCH_JUMP_LABEL_RELATIVE
|
2017-11-17 13:29:13 +00:00
|
|
|
select HAVE_ARCH_KASAN
|
2019-08-02 10:42:59 +00:00
|
|
|
select HAVE_ARCH_KASAN_VMALLOC
|
2021-07-28 11:59:04 +00:00
|
|
|
select HAVE_ARCH_KCSAN
|
2021-07-28 19:02:53 +00:00
|
|
|
select HAVE_ARCH_KFENCE
|
2021-04-29 09:14:51 +00:00
|
|
|
select HAVE_ARCH_RANDOMIZE_KSTACK_OFFSET
|
2012-07-31 13:37:13 +00:00
|
|
|
select HAVE_ARCH_SECCOMP_FILTER
|
2015-04-22 12:47:42 +00:00
|
|
|
select HAVE_ARCH_SOFT_DIRTY
|
2023-03-27 09:37:28 +00:00
|
|
|
select HAVE_ARCH_STACKLEAK
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_ARCH_TRACEHOOK
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_ARCH_TRANSPARENT_HUGEPAGE
|
2017-09-12 14:37:33 +00:00
|
|
|
select HAVE_ARCH_VMAP_STACK
|
2019-08-19 05:54:20 +00:00
|
|
|
select HAVE_ASM_MODVERSIONS
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_CMPXCHG_DOUBLE
|
|
|
|
select HAVE_CMPXCHG_LOCAL
|
|
|
|
select HAVE_DEBUG_KMEMLEAK
|
2016-11-14 12:57:03 +00:00
|
|
|
select HAVE_DMA_CONTIGUOUS
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_DYNAMIC_FTRACE
|
2021-10-04 14:10:24 +00:00
|
|
|
select HAVE_DYNAMIC_FTRACE_WITH_ARGS
|
2021-10-12 13:37:59 +00:00
|
|
|
select HAVE_DYNAMIC_FTRACE_WITH_DIRECT_CALLS
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_DYNAMIC_FTRACE_WITH_REGS
|
2022-01-28 23:34:13 +00:00
|
|
|
select HAVE_EBPF_JIT if HAVE_MARCH_Z196_FEATURES
|
2016-09-12 11:13:38 +00:00
|
|
|
select HAVE_EFFICIENT_UNALIGNED_ACCESS
|
2020-12-28 08:51:57 +00:00
|
|
|
select HAVE_FAST_GUP
|
2018-08-06 13:17:47 +00:00
|
|
|
select HAVE_FENTRY
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_FTRACE_MCOUNT_RECORD
|
2021-10-06 09:59:29 +00:00
|
|
|
select HAVE_FUNCTION_ARG_ACCESS_API
|
2020-07-22 21:58:54 +00:00
|
|
|
select HAVE_FUNCTION_ERROR_INJECTION
|
2023-06-29 10:02:19 +00:00
|
|
|
select HAVE_FUNCTION_GRAPH_RETVAL
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_FUNCTION_GRAPH_TRACER
|
|
|
|
select HAVE_FUNCTION_TRACER
|
2018-08-14 11:29:11 +00:00
|
|
|
select HAVE_GCC_PLUGINS
|
2020-04-28 07:52:23 +00:00
|
|
|
select HAVE_GENERIC_VDSO
|
2021-02-19 11:00:52 +00:00
|
|
|
select HAVE_IOREMAP_PROT if PCI
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_KERNEL_BZIP2
|
|
|
|
select HAVE_KERNEL_GZIP
|
2013-07-18 13:18:24 +00:00
|
|
|
select HAVE_KERNEL_LZ4
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_KERNEL_LZMA
|
|
|
|
select HAVE_KERNEL_LZO
|
2018-06-12 22:00:25 +00:00
|
|
|
select HAVE_KERNEL_UNCOMPRESSED
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_KERNEL_XZ
|
2021-06-15 11:41:50 +00:00
|
|
|
select HAVE_KERNEL_ZSTD
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_KPROBES
|
2020-01-21 11:31:47 +00:00
|
|
|
select HAVE_KPROBES_ON_FTRACE
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_KRETPROBES
|
2015-03-26 09:10:17 +00:00
|
|
|
select HAVE_LIVEPATCH
|
2014-01-29 17:16:01 +00:00
|
|
|
select HAVE_MEMBLOCK_PHYS_MAP
|
2012-09-28 05:01:03 +00:00
|
|
|
select HAVE_MOD_ARCH_SPECIFIC
|
2020-12-28 08:51:57 +00:00
|
|
|
select HAVE_NMI
|
2018-08-06 13:17:47 +00:00
|
|
|
select HAVE_NOP_MCOUNT
|
2024-02-26 16:14:13 +00:00
|
|
|
select HAVE_PAGE_SIZE_4KB
|
2018-11-15 19:05:32 +00:00
|
|
|
select HAVE_PCI
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_PERF_EVENTS
|
2020-12-28 08:51:57 +00:00
|
|
|
select HAVE_PERF_REGS
|
|
|
|
select HAVE_PERF_USER_STACK_DUMP
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_REGS_AND_STACK_ACCESS_API
|
s390/livepatch: Implement reliable stack tracing for the consistency model
The livepatch consistency model requires reliable stack tracing
architecture support in order to work properly. In order to achieve
this, two main issues have to be solved. First, reliable and consistent
call chain backtracing has to be ensured. Second, the unwinder needs to
be able to detect stack corruptions and return errors.
The "zSeries ELF Application Binary Interface Supplement" says:
"The stack pointer points to the first word of the lowest allocated
stack frame. If the "back chain" is implemented this word will point to
the previously allocated stack frame (towards higher addresses), except
for the first stack frame, which shall have a back chain of zero (NULL).
The stack shall grow downwards, in other words towards lower addresses."
"back chain" is optional. GCC option -mbackchain enables it. Quoting
Martin Schwidefsky [1]:
"The compiler is called with the -mbackchain option, all normal C
function will store the backchain in the function prologue. All
functions written in assembler code should do the same, if you find one
that does not we should fix that. The end result is that a task that
*voluntarily* called schedule() should have a proper backchain at all
times.
Dependent on the use case this may or may not be enough. Asynchronous
interrupts may stop the CPU at the beginning of a function, if kernel
preemption is enabled we can end up with a broken backchain. The
production kernels for IBM Z are all compiled *without* kernel
preemption. So yes, we might get away without the objtool support.
On a side-note, we do have a line item to implement the ORC unwinder for
the kernel, that includes the objtool support. Once we have that we can
drop the -mbackchain option for the kernel build. That gives us a nice
little performance benefit. I hope that the change from backchain to the
ORC unwinder will not be too hard to implement in the livepatch tools."
Since -mbackchain is enabled by default when the kernel is compiled, the
call chain backtracing should be currently ensured and objtool should
not be necessary for livepatch purposes.
Regarding the second issue, stack corruptions and non-reliable states
have to be recognized by the unwinder. Mainly it means to detect
preemption or page faults, the end of the task stack must be reached,
return addresses must be valid text addresses and hacks like function
graph tracing and kretprobes must be properly detected.
Unwinding a running task's stack is not a problem, because there is a
livepatch requirement that every checked task is blocked, except for the
current task. Due to that, the implementation can be much simpler
compared to the existing non-reliable infrastructure. We can consider a
task's kernel/thread stack only and skip the other stacks.
[1] 20180912121106.31ffa97c@mschwideX1 [not archived on lore.kernel.org]
Link: https://lkml.kernel.org/r/20191106095601.29986-5-mbenes@suse.cz
Reviewed-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Tested-by: Miroslav Benes <mbenes@suse.cz>
Signed-off-by: Miroslav Benes <mbenes@suse.cz>
Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
2019-11-06 09:56:01 +00:00
|
|
|
select HAVE_RELIABLE_STACKTRACE
|
2023-03-01 08:41:06 +00:00
|
|
|
select HAVE_RETHOOK
|
2018-06-30 08:54:15 +00:00
|
|
|
select HAVE_RSEQ
|
2021-10-12 13:38:02 +00:00
|
|
|
select HAVE_SAMPLE_FTRACE_DIRECT
|
2021-11-15 19:56:14 +00:00
|
|
|
select HAVE_SAMPLE_FTRACE_DIRECT_MULTI
|
2022-10-31 13:11:57 +00:00
|
|
|
select HAVE_SETUP_PER_CPU_AREA
|
2021-02-09 23:40:52 +00:00
|
|
|
select HAVE_SOFTIRQ_ON_OWN_STACK
|
2013-02-06 09:15:55 +00:00
|
|
|
select HAVE_SYSCALL_TRACEPOINTS
|
|
|
|
select HAVE_VIRT_CPU_ACCOUNTING
|
2020-12-02 11:57:29 +00:00
|
|
|
select HAVE_VIRT_CPU_ACCOUNTING_IDLE
|
2018-11-15 19:05:32 +00:00
|
|
|
select IOMMU_HELPER if PCI
|
|
|
|
select IOMMU_SUPPORT if PCI
|
2023-03-01 08:41:06 +00:00
|
|
|
select MMU_GATHER_MERGE_VMAS
|
2020-12-28 08:51:57 +00:00
|
|
|
select MMU_GATHER_NO_GATHER
|
|
|
|
select MMU_GATHER_RCU_TABLE_FREE
|
2012-09-28 05:01:03 +00:00
|
|
|
select MODULES_USE_ELF_RELA
|
2018-11-15 19:05:32 +00:00
|
|
|
select NEED_DMA_MAP_STATE if PCI
|
2022-10-31 13:11:57 +00:00
|
|
|
select NEED_PER_CPU_EMBED_FIRST_CHUNK
|
2018-11-15 19:05:32 +00:00
|
|
|
select NEED_SG_DMA_LENGTH if PCI
|
2012-12-26 00:26:12 +00:00
|
|
|
select OLD_SIGACTION
|
2013-09-06 08:03:30 +00:00
|
|
|
select OLD_SIGSUSPEND3
|
2018-11-15 19:05:33 +00:00
|
|
|
select PCI_DOMAINS if PCI
|
2018-11-15 19:05:32 +00:00
|
|
|
select PCI_MSI if PCI
|
2020-09-28 10:13:07 +00:00
|
|
|
select PCI_MSI_ARCH_FALLBACKS if PCI_MSI
|
2016-06-02 12:57:17 +00:00
|
|
|
select SPARSE_IRQ
|
2020-12-28 08:51:57 +00:00
|
|
|
select SWIOTLB
|
2013-02-06 09:15:55 +00:00
|
|
|
select SYSCTL_EXCEPTION_TRACE
|
2016-11-08 10:08:26 +00:00
|
|
|
select THREAD_INFO_IN_TASK
|
2021-07-31 05:22:32 +00:00
|
|
|
select TRACE_IRQFLAGS_SUPPORT
|
2014-02-27 02:13:06 +00:00
|
|
|
select TTY
|
2023-10-30 15:50:47 +00:00
|
|
|
select USER_STACKTRACE_SUPPORT
|
2013-02-06 09:15:55 +00:00
|
|
|
select VIRT_CPU_ACCOUNTING
|
2021-07-01 01:52:20 +00:00
|
|
|
select ZONE_DMA
|
2020-12-28 08:51:57 +00:00
|
|
|
# Note: keep the above list sorted alphabetically
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2009-07-07 14:37:10 +00:00
|
|
|
config SCHED_OMIT_FRAME_POINTER
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2009-07-07 14:37:10 +00:00
|
|
|
|
2015-04-14 22:46:00 +00:00
|
|
|
config PGTABLE_LEVELS
|
|
|
|
int
|
2017-04-24 16:19:10 +00:00
|
|
|
default 5
|
2015-04-14 22:46:00 +00:00
|
|
|
|
2015-03-26 09:10:17 +00:00
|
|
|
source "kernel/livepatch/Kconfig"
|
|
|
|
|
2023-07-12 16:15:43 +00:00
|
|
|
config ARCH_SUPPORTS_KEXEC
|
|
|
|
def_bool y
|
|
|
|
|
|
|
|
config ARCH_SUPPORTS_KEXEC_FILE
|
kexec: fix KEXEC_FILE dependencies
The cleanup for the CONFIG_KEXEC Kconfig logic accidentally changed the
'depends on CRYPTO=y' dependency to a plain 'depends on CRYPTO', which
causes a link failure when all the crypto support is in a loadable module
and kexec_file support is built-in:
x86_64-linux-ld: vmlinux.o: in function `__x64_sys_kexec_file_load':
(.text+0x32e30a): undefined reference to `crypto_alloc_shash'
x86_64-linux-ld: (.text+0x32e58e): undefined reference to `crypto_shash_update'
x86_64-linux-ld: (.text+0x32e6ee): undefined reference to `crypto_shash_final'
Both s390 and x86 have this problem, while ppc64 and riscv have the
correct dependency already. On riscv, the dependency is only used for the
purgatory, not for the kexec_file code itself, which may be a bit
surprising as it means that with CONFIG_CRYPTO=m, it is possible to enable
KEXEC_FILE but then the purgatory code is silently left out.
Move this into the common Kconfig.kexec file in a way that is correct
everywhere, using the dependency on CRYPTO_SHA256=y only when the
purgatory code is available. This requires reversing the dependency
between ARCH_SUPPORTS_KEXEC_PURGATORY and KEXEC_FILE, but the effect
remains the same, other than making riscv behave like the other ones.
On s390, there is an additional dependency on CRYPTO_SHA256_S390, which
should technically not be required but gives better performance. Remove
this dependency here, noting that it was not present in the initial
Kconfig code but was brought in without an explanation in commit
71406883fd357 ("s390/kexec_file: Add kexec_file_load system call").
[arnd@arndb.de: fix riscv build]
Link: https://lkml.kernel.org/r/67ddd260-d424-4229-a815-e3fcfb864a77@app.fastmail.com
Link: https://lkml.kernel.org/r/20231023110308.1202042-1-arnd@kernel.org
Fixes: 6af5138083005 ("x86/kexec: refactor for kernel/Kconfig.kexec")
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Reviewed-by: Eric DeVolder <eric_devolder@yahoo.com>
Tested-by: Eric DeVolder <eric_devolder@yahoo.com>
Cc: Albert Ou <aou@eecs.berkeley.edu>
Cc: Alexander Gordeev <agordeev@linux.ibm.com>
Cc: Ard Biesheuvel <ardb@kernel.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Christian Borntraeger <borntraeger@linux.ibm.com>
Cc: Christophe Leroy <christophe.leroy@csgroup.eu>
Cc: Conor Dooley <conor@kernel.org>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: David S. Miller <davem@davemloft.net>
Cc: Heiko Carstens <hca@linux.ibm.com>
Cc: Herbert Xu <herbert@gondor.apana.org.au>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Nicholas Piggin <npiggin@gmail.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Sven Schnelle <svens@linux.ibm.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Vasily Gorbik <gor@linux.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
2023-10-23 11:01:54 +00:00
|
|
|
def_bool y
|
2023-07-12 16:15:43 +00:00
|
|
|
|
|
|
|
config ARCH_SUPPORTS_KEXEC_SIG
|
|
|
|
def_bool MODULE_SIG_FORMAT
|
|
|
|
|
2023-07-12 16:15:45 +00:00
|
|
|
config ARCH_SUPPORTS_KEXEC_PURGATORY
|
kexec: fix KEXEC_FILE dependencies
The cleanup for the CONFIG_KEXEC Kconfig logic accidentally changed the
'depends on CRYPTO=y' dependency to a plain 'depends on CRYPTO', which
causes a link failure when all the crypto support is in a loadable module
and kexec_file support is built-in:
x86_64-linux-ld: vmlinux.o: in function `__x64_sys_kexec_file_load':
(.text+0x32e30a): undefined reference to `crypto_alloc_shash'
x86_64-linux-ld: (.text+0x32e58e): undefined reference to `crypto_shash_update'
x86_64-linux-ld: (.text+0x32e6ee): undefined reference to `crypto_shash_final'
Both s390 and x86 have this problem, while ppc64 and riscv have the
correct dependency already. On riscv, the dependency is only used for the
purgatory, not for the kexec_file code itself, which may be a bit
surprising as it means that with CONFIG_CRYPTO=m, it is possible to enable
KEXEC_FILE but then the purgatory code is silently left out.
Move this into the common Kconfig.kexec file in a way that is correct
everywhere, using the dependency on CRYPTO_SHA256=y only when the
purgatory code is available. This requires reversing the dependency
between ARCH_SUPPORTS_KEXEC_PURGATORY and KEXEC_FILE, but the effect
remains the same, other than making riscv behave like the other ones.
On s390, there is an additional dependency on CRYPTO_SHA256_S390, which
should technically not be required but gives better performance. Remove
this dependency here, noting that it was not present in the initial
Kconfig code but was brought in without an explanation in commit
71406883fd357 ("s390/kexec_file: Add kexec_file_load system call").
[arnd@arndb.de: fix riscv build]
Link: https://lkml.kernel.org/r/67ddd260-d424-4229-a815-e3fcfb864a77@app.fastmail.com
Link: https://lkml.kernel.org/r/20231023110308.1202042-1-arnd@kernel.org
Fixes: 6af5138083005 ("x86/kexec: refactor for kernel/Kconfig.kexec")
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Reviewed-by: Eric DeVolder <eric_devolder@yahoo.com>
Tested-by: Eric DeVolder <eric_devolder@yahoo.com>
Cc: Albert Ou <aou@eecs.berkeley.edu>
Cc: Alexander Gordeev <agordeev@linux.ibm.com>
Cc: Ard Biesheuvel <ardb@kernel.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Christian Borntraeger <borntraeger@linux.ibm.com>
Cc: Christophe Leroy <christophe.leroy@csgroup.eu>
Cc: Conor Dooley <conor@kernel.org>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: David S. Miller <davem@davemloft.net>
Cc: Heiko Carstens <hca@linux.ibm.com>
Cc: Herbert Xu <herbert@gondor.apana.org.au>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Nicholas Piggin <npiggin@gmail.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Sven Schnelle <svens@linux.ibm.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Vasily Gorbik <gor@linux.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
2023-10-23 11:01:54 +00:00
|
|
|
def_bool y
|
2023-07-12 16:15:43 +00:00
|
|
|
|
|
|
|
config ARCH_SUPPORTS_CRASH_DUMP
|
|
|
|
def_bool y
|
|
|
|
help
|
2023-08-29 21:53:51 +00:00
|
|
|
Refer to <file:Documentation/arch/s390/zfcpdump.rst> for more details on this.
|
2023-07-12 16:15:43 +00:00
|
|
|
This option also enables s390 zfcpdump.
|
2023-08-29 21:53:51 +00:00
|
|
|
See also <file:Documentation/arch/s390/zfcpdump.rst>
|
2023-07-12 16:15:43 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
menu "Processor type and features"
|
|
|
|
|
|
|
|
config HAVE_MARCH_Z10_FEATURES
|
|
|
|
def_bool n
|
|
|
|
|
|
|
|
config HAVE_MARCH_Z196_FEATURES
|
|
|
|
def_bool n
|
|
|
|
select HAVE_MARCH_Z10_FEATURES
|
|
|
|
|
2012-11-13 08:26:37 +00:00
|
|
|
config HAVE_MARCH_ZEC12_FEATURES
|
|
|
|
def_bool n
|
|
|
|
select HAVE_MARCH_Z196_FEATURES
|
|
|
|
|
2015-01-14 16:50:19 +00:00
|
|
|
config HAVE_MARCH_Z13_FEATURES
|
|
|
|
def_bool n
|
|
|
|
select HAVE_MARCH_ZEC12_FEATURES
|
|
|
|
|
2017-04-12 12:17:25 +00:00
|
|
|
config HAVE_MARCH_Z14_FEATURES
|
|
|
|
def_bool n
|
|
|
|
select HAVE_MARCH_Z13_FEATURES
|
|
|
|
|
2019-02-06 07:22:11 +00:00
|
|
|
config HAVE_MARCH_Z15_FEATURES
|
|
|
|
def_bool n
|
|
|
|
select HAVE_MARCH_Z14_FEATURES
|
|
|
|
|
2021-07-20 12:28:08 +00:00
|
|
|
config HAVE_MARCH_Z16_FEATURES
|
|
|
|
def_bool n
|
|
|
|
select HAVE_MARCH_Z15_FEATURES
|
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
choice
|
|
|
|
prompt "Processor type"
|
2016-04-18 15:10:16 +00:00
|
|
|
default MARCH_Z196
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
config MARCH_Z10
|
|
|
|
bool "IBM System z10"
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_MARCH_Z10_FEATURES
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-march=z10)
|
2012-08-27 08:55:18 +00:00
|
|
|
help
|
2022-02-24 21:43:31 +00:00
|
|
|
Select this to enable optimizations for IBM System z10 (2097 and 2098
|
|
|
|
series). This is the oldest machine generation currently supported.
|
2012-08-27 08:55:18 +00:00
|
|
|
|
|
|
|
config MARCH_Z196
|
|
|
|
bool "IBM zEnterprise 114 and 196"
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_MARCH_Z196_FEATURES
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-march=z196)
|
2012-08-27 08:55:18 +00:00
|
|
|
help
|
|
|
|
Select this to enable optimizations for IBM zEnterprise 114 and 196
|
|
|
|
(2818 and 2817 series). The kernel will be slightly faster but will
|
|
|
|
not work on older machines.
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2012-11-13 08:26:37 +00:00
|
|
|
config MARCH_ZEC12
|
2013-07-24 08:35:33 +00:00
|
|
|
bool "IBM zBC12 and zEC12"
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_MARCH_ZEC12_FEATURES
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-march=zEC12)
|
2012-11-13 08:26:37 +00:00
|
|
|
help
|
2013-07-24 08:35:33 +00:00
|
|
|
Select this to enable optimizations for IBM zBC12 and zEC12 (2828 and
|
|
|
|
2827 series). The kernel will be slightly faster but will not work on
|
|
|
|
older machines.
|
2012-11-13 08:26:37 +00:00
|
|
|
|
2015-01-14 16:50:19 +00:00
|
|
|
config MARCH_Z13
|
2016-02-19 09:46:08 +00:00
|
|
|
bool "IBM z13s and z13"
|
2015-02-12 12:08:27 +00:00
|
|
|
select HAVE_MARCH_Z13_FEATURES
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-march=z13)
|
2015-01-14 16:50:19 +00:00
|
|
|
help
|
2016-02-19 09:46:08 +00:00
|
|
|
Select this to enable optimizations for IBM z13s and z13 (2965 and
|
|
|
|
2964 series). The kernel will be slightly faster but will not work on
|
|
|
|
older machines.
|
2015-01-14 16:50:19 +00:00
|
|
|
|
2017-04-12 12:17:25 +00:00
|
|
|
config MARCH_Z14
|
2018-04-13 12:04:24 +00:00
|
|
|
bool "IBM z14 ZR1 and z14"
|
2017-04-12 12:17:25 +00:00
|
|
|
select HAVE_MARCH_Z14_FEATURES
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-march=z14)
|
2017-04-12 12:17:25 +00:00
|
|
|
help
|
2018-04-13 12:04:24 +00:00
|
|
|
Select this to enable optimizations for IBM z14 ZR1 and z14 (3907
|
|
|
|
and 3906 series). The kernel will be slightly faster but will not
|
|
|
|
work on older machines.
|
2017-04-12 12:17:25 +00:00
|
|
|
|
2019-02-06 07:22:11 +00:00
|
|
|
config MARCH_Z15
|
|
|
|
bool "IBM z15"
|
|
|
|
select HAVE_MARCH_Z15_FEATURES
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-march=z15)
|
2019-02-06 07:22:11 +00:00
|
|
|
help
|
|
|
|
Select this to enable optimizations for IBM z15 (8562
|
|
|
|
and 8561 series). The kernel will be slightly faster but will not
|
|
|
|
work on older machines.
|
|
|
|
|
2021-07-20 12:28:08 +00:00
|
|
|
config MARCH_Z16
|
|
|
|
bool "IBM z16"
|
|
|
|
select HAVE_MARCH_Z16_FEATURES
|
|
|
|
depends on $(cc-option,-march=z16)
|
|
|
|
help
|
|
|
|
Select this to enable optimizations for IBM z16 (3931 and
|
|
|
|
3932 series).
|
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
endchoice
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2013-10-30 11:12:50 +00:00
|
|
|
config MARCH_Z10_TUNE
|
|
|
|
def_bool TUNE_Z10 || MARCH_Z10 && TUNE_DEFAULT
|
|
|
|
|
|
|
|
config MARCH_Z196_TUNE
|
|
|
|
def_bool TUNE_Z196 || MARCH_Z196 && TUNE_DEFAULT
|
|
|
|
|
|
|
|
config MARCH_ZEC12_TUNE
|
|
|
|
def_bool TUNE_ZEC12 || MARCH_ZEC12 && TUNE_DEFAULT
|
|
|
|
|
2015-01-14 16:50:19 +00:00
|
|
|
config MARCH_Z13_TUNE
|
|
|
|
def_bool TUNE_Z13 || MARCH_Z13 && TUNE_DEFAULT
|
|
|
|
|
2017-04-12 12:17:25 +00:00
|
|
|
config MARCH_Z14_TUNE
|
|
|
|
def_bool TUNE_Z14 || MARCH_Z14 && TUNE_DEFAULT
|
|
|
|
|
2019-02-06 07:22:11 +00:00
|
|
|
config MARCH_Z15_TUNE
|
|
|
|
def_bool TUNE_Z15 || MARCH_Z15 && TUNE_DEFAULT
|
|
|
|
|
2021-07-20 12:28:08 +00:00
|
|
|
config MARCH_Z16_TUNE
|
|
|
|
def_bool TUNE_Z16 || MARCH_Z16 && TUNE_DEFAULT
|
|
|
|
|
2013-10-30 11:12:50 +00:00
|
|
|
choice
|
|
|
|
prompt "Tune code generation"
|
|
|
|
default TUNE_DEFAULT
|
|
|
|
help
|
|
|
|
Cause the compiler to tune (-mtune) the generated code for a machine.
|
|
|
|
This will make the code run faster on the selected machine but
|
|
|
|
somewhat slower on other machines.
|
|
|
|
This option only changes how the compiler emits instructions, not the
|
|
|
|
selection of instructions itself, so the resulting kernel will run on
|
|
|
|
all other machines.
|
|
|
|
|
|
|
|
config TUNE_DEFAULT
|
|
|
|
bool "Default"
|
|
|
|
help
|
|
|
|
Tune the generated code for the target processor for which the kernel
|
|
|
|
will be compiled.
|
|
|
|
|
|
|
|
config TUNE_Z10
|
|
|
|
bool "IBM System z10"
|
|
|
|
|
|
|
|
config TUNE_Z196
|
|
|
|
bool "IBM zEnterprise 114 and 196"
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-mtune=z196)
|
2013-10-30 11:12:50 +00:00
|
|
|
|
|
|
|
config TUNE_ZEC12
|
|
|
|
bool "IBM zBC12 and zEC12"
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-mtune=zEC12)
|
2013-10-30 11:12:50 +00:00
|
|
|
|
2015-01-14 16:50:19 +00:00
|
|
|
config TUNE_Z13
|
2019-10-06 15:02:07 +00:00
|
|
|
bool "IBM z13s and z13"
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-mtune=z13)
|
2015-01-14 16:50:19 +00:00
|
|
|
|
2017-04-12 12:17:25 +00:00
|
|
|
config TUNE_Z14
|
2019-10-06 15:02:07 +00:00
|
|
|
bool "IBM z14 ZR1 and z14"
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-mtune=z14)
|
2017-04-12 12:17:25 +00:00
|
|
|
|
2019-02-06 07:22:11 +00:00
|
|
|
config TUNE_Z15
|
|
|
|
bool "IBM z15"
|
2019-10-06 14:55:53 +00:00
|
|
|
depends on $(cc-option,-mtune=z15)
|
2019-02-06 07:22:11 +00:00
|
|
|
|
2021-07-20 12:28:08 +00:00
|
|
|
config TUNE_Z16
|
|
|
|
bool "IBM z16"
|
|
|
|
depends on $(cc-option,-mtune=z16)
|
|
|
|
|
2013-10-30 11:12:50 +00:00
|
|
|
endchoice
|
|
|
|
|
2006-01-06 08:19:28 +00:00
|
|
|
config 64BIT
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2006-09-28 14:55:39 +00:00
|
|
|
|
2021-09-29 07:09:34 +00:00
|
|
|
config COMMAND_LINE_SIZE
|
|
|
|
int "Maximum size of kernel command line"
|
|
|
|
default 4096
|
|
|
|
range 896 1048576
|
|
|
|
help
|
|
|
|
This allows you to specify the maximum length of the kernel command
|
|
|
|
line.
|
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
config COMPAT
|
2023-12-08 12:50:35 +00:00
|
|
|
def_bool n
|
2012-08-27 08:55:18 +00:00
|
|
|
prompt "Kernel support for 31 bit emulation"
|
|
|
|
select ARCH_WANT_OLD_COMPAT_IPC
|
2012-12-26 00:26:12 +00:00
|
|
|
select COMPAT_OLD_SIGACTION
|
2019-01-16 13:15:21 +00:00
|
|
|
select HAVE_UID16
|
kernel: conditionally support non-root users, groups and capabilities
There are a lot of embedded systems that run most or all of their
functionality in init, running as root:root. For these systems,
supporting multiple users is not necessary.
This patch adds a new symbol, CONFIG_MULTIUSER, that makes support for
non-root users, non-root groups, and capabilities optional. It is enabled
under CONFIG_EXPERT menu.
When this symbol is not defined, UID and GID are zero in any possible case
and processes always have all capabilities.
The following syscalls are compiled out: setuid, setregid, setgid,
setreuid, setresuid, getresuid, setresgid, getresgid, setgroups,
getgroups, setfsuid, setfsgid, capget, capset.
Also, groups.c is compiled out completely.
In kernel/capability.c, capable function was moved in order to avoid
adding two ifdef blocks.
This change saves about 25 KB on a defconfig build. The most minimal
kernels have total text sizes in the high hundreds of kB rather than
low MB. (The 25k goes down a bit with allnoconfig, but not that much.
The kernel was booted in Qemu. All the common functionalities work.
Adding users/groups is not possible, failing with -ENOSYS.
Bloat-o-meter output:
add/remove: 7/87 grow/shrink: 19/397 up/down: 1675/-26325 (-24650)
[akpm@linux-foundation.org: coding-style fixes]
Signed-off-by: Iulia Manda <iulia.manda21@gmail.com>
Reviewed-by: Josh Triplett <josh@joshtriplett.org>
Acked-by: Geert Uytterhoeven <geert@linux-m68k.org>
Tested-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Reviewed-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-04-15 23:16:41 +00:00
|
|
|
depends on MULTIUSER
|
2024-02-14 22:53:48 +00:00
|
|
|
depends on !CC_IS_CLANG && !LD_IS_LLD
|
2012-08-27 08:55:18 +00:00
|
|
|
help
|
|
|
|
Select this option if you want to enable your system kernel to
|
|
|
|
handle system-calls from ELF binaries for 31 bit ESA. This option
|
|
|
|
(and some other stuff like libraries and such) is needed for
|
2023-12-08 12:50:35 +00:00
|
|
|
executing 31 bit applications.
|
|
|
|
|
|
|
|
If unsure say N.
|
2012-08-27 08:55:18 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
config SMP
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
config NR_CPUS
|
2015-01-28 15:52:01 +00:00
|
|
|
int "Maximum number of CPUs (2-512)"
|
|
|
|
range 2 512
|
2015-02-12 12:08:27 +00:00
|
|
|
default "64"
|
2005-04-16 22:20:36 +00:00
|
|
|
help
|
|
|
|
This allows you to specify the maximum number of CPUs which this
|
2015-01-28 15:52:01 +00:00
|
|
|
kernel will support. The maximum supported value is 512 and the
|
2005-04-16 22:20:36 +00:00
|
|
|
minimum value which makes sense is 2.
|
|
|
|
|
|
|
|
This is purely to save memory - each supported CPU adds
|
|
|
|
approximately sixteen kilobytes to the kernel image.
|
|
|
|
|
|
|
|
config HOTPLUG_CPU
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2014-03-06 17:25:13 +00:00
|
|
|
config NUMA
|
|
|
|
bool "NUMA support"
|
2019-06-03 12:25:18 +00:00
|
|
|
depends on SCHED_TOPOLOGY
|
2014-03-06 17:25:13 +00:00
|
|
|
default n
|
|
|
|
help
|
|
|
|
Enable NUMA support
|
|
|
|
|
|
|
|
This option adds NUMA support to the kernel.
|
|
|
|
|
|
|
|
config NODES_SHIFT
|
2020-02-19 12:29:15 +00:00
|
|
|
int
|
2021-06-29 02:43:01 +00:00
|
|
|
depends on NUMA
|
2020-02-19 12:29:15 +00:00
|
|
|
default "1"
|
2015-12-28 12:20:43 +00:00
|
|
|
|
|
|
|
config SCHED_SMT
|
|
|
|
def_bool n
|
2014-03-06 17:47:21 +00:00
|
|
|
|
2010-10-29 14:50:37 +00:00
|
|
|
config SCHED_MC
|
2011-12-27 10:27:09 +00:00
|
|
|
def_bool n
|
2010-10-29 14:50:37 +00:00
|
|
|
|
2015-01-14 16:52:10 +00:00
|
|
|
config SCHED_TOPOLOGY
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2015-01-14 16:52:10 +00:00
|
|
|
prompt "Topology scheduler support"
|
|
|
|
select SCHED_SMT
|
2011-12-27 10:27:09 +00:00
|
|
|
select SCHED_MC
|
2010-08-31 08:28:18 +00:00
|
|
|
help
|
2015-01-14 16:52:10 +00:00
|
|
|
Topology scheduler support improves the CPU scheduler's decision
|
|
|
|
making when dealing with machines that have multi-threading,
|
|
|
|
multiple cores or multiple books.
|
2010-08-31 08:28:18 +00:00
|
|
|
|
2018-12-11 11:01:04 +00:00
|
|
|
source "kernel/Kconfig.hz"
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2023-04-28 10:42:42 +00:00
|
|
|
config CERT_STORE
|
|
|
|
bool "Get user certificates via DIAG320"
|
|
|
|
depends on KEYS
|
2023-07-28 10:04:30 +00:00
|
|
|
select CRYPTO_LIB_SHA256
|
2023-04-28 10:42:42 +00:00
|
|
|
help
|
|
|
|
Enable this option if you want to access user-provided secure boot
|
|
|
|
certificates via DIAG 0x320.
|
|
|
|
|
|
|
|
These certificates will be made available via the keyring named
|
|
|
|
'cert_store'.
|
|
|
|
|
2018-01-16 06:11:45 +00:00
|
|
|
config KERNEL_NOBP
|
|
|
|
def_bool n
|
|
|
|
prompt "Enable modified branch prediction for the kernel by default"
|
|
|
|
help
|
|
|
|
If this option is selected the kernel will switch to a modified
|
|
|
|
branch prediction mode if the firmware interface is available.
|
|
|
|
The modified branch prediction mode improves the behaviour in
|
|
|
|
regard to speculative execution.
|
|
|
|
|
|
|
|
With the option enabled the kernel parameter "nobp=0" or "nospec"
|
|
|
|
can be used to run the kernel in the normal branch prediction mode.
|
|
|
|
|
|
|
|
With the option disabled the modified branch prediction mode is
|
|
|
|
enabled with the "nobp=1" kernel parameter.
|
|
|
|
|
|
|
|
If unsure, say N.
|
|
|
|
|
2018-01-26 11:46:47 +00:00
|
|
|
config EXPOLINE
|
|
|
|
def_bool n
|
2022-03-06 19:56:07 +00:00
|
|
|
depends on $(cc-option,-mindirect-branch=thunk)
|
2018-01-26 11:46:47 +00:00
|
|
|
prompt "Avoid speculative indirect branches in the kernel"
|
|
|
|
help
|
|
|
|
Compile the kernel with the expoline compiler options to guard
|
|
|
|
against kernel-to-user data leaks by avoiding speculative indirect
|
|
|
|
branches.
|
|
|
|
Requires a compiler with -mindirect-branch=thunk support for full
|
|
|
|
protection. The kernel may run slower.
|
|
|
|
|
|
|
|
If unsure, say N.
|
|
|
|
|
2022-03-06 19:56:07 +00:00
|
|
|
config EXPOLINE_EXTERN
|
|
|
|
def_bool n
|
|
|
|
depends on EXPOLINE
|
|
|
|
depends on CC_IS_GCC && GCC_VERSION >= 110200
|
|
|
|
depends on $(success,$(srctree)/arch/s390/tools/gcc-thunk-extern.sh $(CC))
|
|
|
|
prompt "Generate expolines as extern functions."
|
|
|
|
help
|
|
|
|
This option is required for some tooling like kpatch. The kernel is
|
|
|
|
compiled with -mindirect-branch=thunk-extern and requires a newer
|
|
|
|
compiler.
|
|
|
|
|
|
|
|
If unsure, say N.
|
2018-01-26 11:46:47 +00:00
|
|
|
|
|
|
|
choice
|
|
|
|
prompt "Expoline default"
|
|
|
|
depends on EXPOLINE
|
|
|
|
default EXPOLINE_FULL
|
|
|
|
|
|
|
|
config EXPOLINE_OFF
|
|
|
|
bool "spectre_v2=off"
|
|
|
|
|
2018-03-23 12:04:49 +00:00
|
|
|
config EXPOLINE_AUTO
|
2018-01-26 11:46:47 +00:00
|
|
|
bool "spectre_v2=auto"
|
|
|
|
|
|
|
|
config EXPOLINE_FULL
|
|
|
|
bool "spectre_v2=on"
|
|
|
|
|
|
|
|
endchoice
|
|
|
|
|
2019-02-03 20:35:45 +00:00
|
|
|
config RELOCATABLE
|
2022-10-30 18:22:02 +00:00
|
|
|
def_bool y
|
2019-02-03 20:35:45 +00:00
|
|
|
help
|
|
|
|
This builds a kernel image that retains relocation information
|
|
|
|
so it can be loaded at an arbitrary address.
|
|
|
|
The relocations make the kernel image about 15% larger (compressed
|
|
|
|
10%), but are discarded at runtime.
|
2022-10-30 18:22:02 +00:00
|
|
|
Note: this option exists only for documentation purposes, please do
|
|
|
|
not remove it.
|
2019-02-03 20:35:45 +00:00
|
|
|
|
s390: compile relocatable kernel without -fPIE
On s390, currently kernel uses the '-fPIE' compiler flag for compiling
vmlinux. This has a few problems:
- It uses dynamic symbols (.dynsym), for which the linker refuses to
allow more than 64k sections. This can break features which use
'-ffunction-sections' and '-fdata-sections', including kpatch-build
[1] and Function Granular KASLR.
- It unnecessarily uses GOT relocations, adding an extra layer of
indirection for many memory accesses.
Instead of using '-fPIE', resolve all the relocations at link time and
then manually adjust any absolute relocations (R_390_64) during boot.
This is done by first telling the linker to preserve all relocations
during the vmlinux link. (Note this is harmless: they are later
stripped in the vmlinux.bin link.)
Then use the 'relocs' tool to find all absolute relocations (R_390_64)
which apply to allocatable sections. The offsets of those relocations
are saved in a special section which is then used to adjust the
relocations during boot.
(Note: For some reason, Clang occasionally creates a GOT reference, even
without '-fPIE'. So Clang-compiled kernels have a GOT, which needs to
be adjusted.)
On my mostly-defconfig kernel, this reduces kernel text size by ~1.3%.
[1] https://github.com/dynup/kpatch/issues/1284
[2] https://gcc.gnu.org/pipermail/gcc-patches/2023-June/622872.html
[3] https://gcc.gnu.org/pipermail/gcc-patches/2023-August/625986.html
Compiler consideration:
Gcc recently implemented an optimization [2] for loading symbols without
explicit alignment, aligning with the IBM Z ELF ABI. This ABI mandates
symbols to reside on a 2-byte boundary, enabling the use of the larl
instruction. However, kernel linker scripts may still generate unaligned
symbols. To address this, a new -munaligned-symbols option has been
introduced [3] in recent gcc versions. This option has to be used with
future gcc versions.
Older Clang lacks support for handling unaligned symbols generated
by kernel linker scripts when the kernel is built without -fPIE. However,
future versions of Clang will include support for the -munaligned-symbols
option. When the support is unavailable, compile the kernel with -fPIE
to maintain the existing behavior.
In addition to it:
move vmlinux.relocs to safe relocation
When the kernel is built with CONFIG_KERNEL_UNCOMPRESSED, the entire
uncompressed vmlinux.bin is positioned in the bzImage decompressor
image at the default kernel LMA of 0x100000, enabling it to be executed
in-place. However, the size of .vmlinux.relocs could be large enough to
cause an overlap with the uncompressed kernel at the address 0x100000.
To address this issue, .vmlinux.relocs is positioned after the
.rodata.compressed in the bzImage. Nevertheless, in this configuration,
vmlinux.relocs will overlap with the .bss section of vmlinux.bin. To
overcome that, move vmlinux.relocs to a safe location before clearing
.bss and handling relocs.
Compile warning fix from Sumanth Korikkar:
When kernel is built with CONFIG_LD_ORPHAN_WARN and -fno-PIE, there are
several warnings:
ld: warning: orphan section `.rela.iplt' from
`arch/s390/kernel/head64.o' being placed in section `.rela.dyn'
ld: warning: orphan section `.rela.head.text' from
`arch/s390/kernel/head64.o' being placed in section `.rela.dyn'
ld: warning: orphan section `.rela.init.text' from
`arch/s390/kernel/head64.o' being placed in section `.rela.dyn'
ld: warning: orphan section `.rela.rodata.cst8' from
`arch/s390/kernel/head64.o' being placed in section `.rela.dyn'
Orphan sections are sections that exist in an object file but don't have
a corresponding output section in the final executable. ld raises a
warning when it identifies such sections.
Eliminate the warning by placing all .rela orphan sections in .rela.dyn
and raise an error when size of .rela.dyn is greater than zero. i.e.
Dont just neglect orphan sections.
This is similar to adjustment performed in x86, where kernel is built
with -fno-PIE.
commit 5354e84598f2 ("x86/build: Add asserts for unwanted sections")
[sumanthk@linux.ibm.com: rebased Josh Poimboeuf patches and move
vmlinux.relocs to safe location]
[hca@linux.ibm.com: merged compile warning fix from Sumanth]
Tested-by: Sumanth Korikkar <sumanthk@linux.ibm.com>
Acked-by: Vasily Gorbik <gor@linux.ibm.com>
Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Sumanth Korikkar <sumanthk@linux.ibm.com>
Link: https://lore.kernel.org/r/20240219132734.22881-4-sumanthk@linux.ibm.com
Link: https://lore.kernel.org/r/20240219132734.22881-5-sumanthk@linux.ibm.com
Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
2024-02-19 13:27:33 +00:00
|
|
|
config PIE_BUILD
|
|
|
|
def_bool CC_IS_CLANG && !$(cc-option,-munaligned-symbols)
|
|
|
|
help
|
|
|
|
If the compiler is unable to generate code that can manage unaligned
|
|
|
|
symbols, the kernel is linked as a position-independent executable
|
|
|
|
(PIE) and includes dynamic relocations that are processed early
|
|
|
|
during bootup.
|
|
|
|
|
|
|
|
For kpatch functionality, it is recommended to build the kernel
|
|
|
|
without the PIE_BUILD option. PIE_BUILD is only enabled when the
|
|
|
|
compiler lacks proper support for handling unaligned symbols.
|
|
|
|
|
2019-02-03 20:37:20 +00:00
|
|
|
config RANDOMIZE_BASE
|
|
|
|
bool "Randomize the address of the kernel image (KASLR)"
|
|
|
|
default y
|
|
|
|
help
|
|
|
|
In support of Kernel Address Space Layout Randomization (KASLR),
|
|
|
|
this randomizes the address at which the kernel image is loaded,
|
|
|
|
as a security feature that deters exploit attempts relying on
|
|
|
|
knowledge of the location of kernel internals.
|
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
endmenu
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
menu "Memory setup"
|
2012-02-24 17:01:27 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
config ARCH_SPARSEMEM_ENABLE
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2012-08-27 08:55:18 +00:00
|
|
|
select SPARSEMEM_VMEMMAP_ENABLE
|
|
|
|
select SPARSEMEM_VMEMMAP
|
2006-09-12 07:04:40 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
config ARCH_SPARSEMEM_DEFAULT
|
|
|
|
def_bool y
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2017-03-27 13:36:20 +00:00
|
|
|
config MAX_PHYSMEM_BITS
|
|
|
|
int "Maximum size of supported physical memory in bits (42-53)"
|
|
|
|
range 42 53
|
|
|
|
default "46"
|
|
|
|
help
|
|
|
|
This option specifies the maximum supported size of physical memory
|
|
|
|
in bits. Supported is any size between 2^42 (4TB) and 2^53 (8PB).
|
|
|
|
Increasing the number of bits also increases the kernel image size.
|
|
|
|
By default 46 bits (64TB) are supported.
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
config CHECK_STACK
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2017-09-12 14:37:33 +00:00
|
|
|
depends on !VMAP_STACK
|
2011-01-05 11:47:15 +00:00
|
|
|
prompt "Detect kernel stack overflow"
|
2005-04-16 22:20:36 +00:00
|
|
|
help
|
|
|
|
This option enables the compiler option -mstack-guard and
|
|
|
|
-mstack-size if they are available. If the compiler supports them
|
|
|
|
it will emit additional code to each function prolog to trigger
|
|
|
|
an illegal operation if the kernel stack is about to overflow.
|
|
|
|
|
|
|
|
Say N if you are unsure.
|
|
|
|
|
|
|
|
config STACK_GUARD
|
|
|
|
int "Size of the guard area (128-1024)"
|
|
|
|
range 128 1024
|
|
|
|
depends on CHECK_STACK
|
|
|
|
default "256"
|
|
|
|
help
|
|
|
|
This allows you to specify the size of the guard area at the lower
|
|
|
|
end of the kernel stack. If the kernel stack points into the guard
|
|
|
|
area on function entry an illegal operation is triggered. The size
|
|
|
|
needs to be a power of 2. Please keep in mind that the size of an
|
|
|
|
interrupt frame is 184 bytes for 31 bit and 328 bytes on 64 bit.
|
|
|
|
The minimum size for the stack guard should be 256 for 31 bit and
|
|
|
|
512 for 64 bit.
|
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
endmenu
|
2005-06-23 07:07:43 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
menu "I/O subsystem"
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
config QDIO
|
2011-01-05 11:47:15 +00:00
|
|
|
def_tristate y
|
|
|
|
prompt "QDIO support"
|
2020-06-13 16:50:22 +00:00
|
|
|
help
|
2006-01-06 08:19:20 +00:00
|
|
|
This driver provides the Queued Direct I/O base support for
|
2008-04-17 05:46:19 +00:00
|
|
|
IBM System z.
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
To compile this driver as a module, choose M here: the
|
|
|
|
module will be called qdio.
|
|
|
|
|
|
|
|
If unsure, say Y.
|
|
|
|
|
2012-11-29 13:38:46 +00:00
|
|
|
if PCI
|
|
|
|
|
|
|
|
config PCI_NR_FUNCTIONS
|
|
|
|
int "Maximum number of PCI functions (1-4096)"
|
|
|
|
range 1 4096
|
2020-11-19 10:38:46 +00:00
|
|
|
default "512"
|
2012-11-29 13:38:46 +00:00
|
|
|
help
|
|
|
|
This allows you to specify the maximum number of PCI functions which
|
|
|
|
this kernel will support.
|
|
|
|
|
2019-03-06 20:32:01 +00:00
|
|
|
endif # PCI
|
2012-11-29 13:38:46 +00:00
|
|
|
|
|
|
|
config HAS_IOMEM
|
|
|
|
def_bool PCI
|
|
|
|
|
2008-07-14 07:59:05 +00:00
|
|
|
config CHSC_SCH
|
2011-01-31 10:30:09 +00:00
|
|
|
def_tristate m
|
2011-01-05 11:47:15 +00:00
|
|
|
prompt "Support for CHSC subchannels"
|
2008-07-14 07:59:05 +00:00
|
|
|
help
|
|
|
|
This driver allows usage of CHSC subchannels. A CHSC subchannel
|
|
|
|
is usually present on LPAR only.
|
|
|
|
The driver creates a device /dev/chsc, which may be used to
|
|
|
|
obtain I/O configuration information about the machine and
|
|
|
|
to issue asynchronous chsc commands (DANGEROUS).
|
|
|
|
You will usually only want to use this interface on a special
|
|
|
|
LPAR designated for system management.
|
|
|
|
|
|
|
|
To compile this driver as a module, choose M here: the
|
|
|
|
module will be called chsc_sch.
|
|
|
|
|
|
|
|
If unsure, say N.
|
|
|
|
|
2012-08-28 14:46:26 +00:00
|
|
|
config SCM_BUS
|
|
|
|
def_bool y
|
|
|
|
prompt "SCM bus driver"
|
|
|
|
help
|
|
|
|
Bus driver for Storage Class Memory.
|
|
|
|
|
2012-08-28 14:48:16 +00:00
|
|
|
config EADM_SCH
|
|
|
|
def_tristate m
|
|
|
|
prompt "Support for EADM subchannels"
|
|
|
|
depends on SCM_BUS
|
|
|
|
help
|
|
|
|
This driver allows usage of EADM subchannels. EADM subchannels act
|
|
|
|
as a communication vehicle for SCM increments.
|
|
|
|
|
|
|
|
To compile this driver as a module, choose M here: the
|
|
|
|
module will be called eadm_sch.
|
|
|
|
|
2017-03-17 03:17:31 +00:00
|
|
|
config VFIO_CCW
|
|
|
|
def_tristate n
|
|
|
|
prompt "Support for VFIO-CCW subchannels"
|
2023-01-26 21:08:31 +00:00
|
|
|
depends on VFIO
|
2023-01-10 09:10:07 +00:00
|
|
|
select VFIO_MDEV
|
2017-03-17 03:17:31 +00:00
|
|
|
help
|
|
|
|
This driver allows usage of I/O subchannels via VFIO-CCW.
|
|
|
|
|
|
|
|
To compile this driver as a module, choose M here: the
|
|
|
|
module will be called vfio_ccw.
|
|
|
|
|
2018-09-25 23:16:19 +00:00
|
|
|
config VFIO_AP
|
|
|
|
def_tristate n
|
|
|
|
prompt "VFIO support for AP devices"
|
2023-05-01 17:11:28 +00:00
|
|
|
depends on KVM
|
2023-01-26 21:08:31 +00:00
|
|
|
depends on VFIO
|
2020-08-05 15:50:53 +00:00
|
|
|
depends on ZCRYPT
|
2023-01-26 21:08:31 +00:00
|
|
|
select VFIO_MDEV
|
2018-09-25 23:16:19 +00:00
|
|
|
help
|
2022-05-25 12:01:40 +00:00
|
|
|
This driver grants access to Adjunct Processor (AP) devices
|
|
|
|
via the VFIO mediated device interface.
|
2018-09-25 23:16:19 +00:00
|
|
|
|
2022-05-25 12:01:40 +00:00
|
|
|
To compile this driver as a module, choose M here: the module
|
|
|
|
will be called vfio_ap.
|
2018-09-25 23:16:19 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
endmenu
|
|
|
|
|
|
|
|
config CCW
|
|
|
|
def_bool y
|
|
|
|
|
2018-05-22 10:42:57 +00:00
|
|
|
config HAVE_PNETID
|
|
|
|
tristate
|
|
|
|
default (SMC || CCWGROUP)
|
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
menu "Virtualization"
|
2008-03-05 11:37:14 +00:00
|
|
|
|
2019-04-01 17:11:03 +00:00
|
|
|
config PROTECTED_VIRTUALIZATION_GUEST
|
|
|
|
def_bool n
|
|
|
|
prompt "Protected virtualization guest support"
|
|
|
|
help
|
|
|
|
Select this option, if you want to be able to run this
|
|
|
|
kernel as a protected virtualization KVM guest.
|
|
|
|
Protected virtualization capable machines have a mini hypervisor
|
|
|
|
located at machine level (an ultravisor). With help of the
|
|
|
|
Ultravisor, KVM will be able to run "protected" VMs, special
|
|
|
|
VMs whose memory and management data are unavailable to KVM.
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
config PFAULT
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
|
|
|
prompt "Pseudo page fault support"
|
2005-04-16 22:20:36 +00:00
|
|
|
help
|
|
|
|
Select this option, if you want to use PFAULT pseudo page fault
|
|
|
|
handling under VM. If running native or in LPAR, this option
|
|
|
|
has no effect. If your VM does not support PFAULT, PAGEEX
|
|
|
|
pseudo page fault handling will be used.
|
|
|
|
Note that VM 4.2 supports PFAULT but has a bug in its
|
|
|
|
implementation that causes some problems.
|
|
|
|
Everybody who wants to run Linux under VM != VM4.2 should select
|
|
|
|
this option.
|
|
|
|
|
|
|
|
config CMM
|
2011-01-05 11:47:15 +00:00
|
|
|
def_tristate n
|
|
|
|
prompt "Cooperative memory management"
|
2005-04-16 22:20:36 +00:00
|
|
|
help
|
|
|
|
Select this option, if you want to enable the kernel interface
|
|
|
|
to reduce the memory size of the system. This is accomplished
|
|
|
|
by allocating pages of memory and put them "on hold". This only
|
|
|
|
makes sense for a system running under VM where the unused pages
|
|
|
|
will be reused by VM for other guest systems. The interface
|
|
|
|
allows an external monitor to balance memory of many systems.
|
|
|
|
Everybody who wants to run Linux under VM should select this
|
|
|
|
option.
|
|
|
|
|
|
|
|
config CMM_IUCV
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
|
|
|
prompt "IUCV special message interface to cooperative memory management"
|
2005-04-16 22:20:36 +00:00
|
|
|
depends on CMM && (SMSGIUCV=y || CMM=SMSGIUCV)
|
|
|
|
help
|
|
|
|
Select this option to enable the special message interface to
|
|
|
|
the cooperative memory management.
|
|
|
|
|
|
|
|
config APPLDATA_BASE
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool n
|
|
|
|
prompt "Linux - VM Monitor Stream, base infrastructure"
|
2021-05-28 00:24:20 +00:00
|
|
|
depends on PROC_SYSCTL
|
2005-04-16 22:20:36 +00:00
|
|
|
help
|
|
|
|
This provides a kernel interface for creating and updating z/VM APPLDATA
|
|
|
|
monitor records. The monitor records are updated at certain time
|
|
|
|
intervals, once the timer is started.
|
|
|
|
Writing 1 or 0 to /proc/appldata/timer starts(1) or stops(0) the timer,
|
|
|
|
i.e. enables or disables monitoring on the Linux side.
|
|
|
|
A custom interval value (in seconds) can be written to
|
|
|
|
/proc/appldata/interval.
|
|
|
|
|
|
|
|
Defaults are 60 seconds interval and timer off.
|
|
|
|
The /proc entries can also be read from, showing the current settings.
|
|
|
|
|
|
|
|
config APPLDATA_MEM
|
2011-01-05 11:47:15 +00:00
|
|
|
def_tristate m
|
|
|
|
prompt "Monitor memory management statistics"
|
2006-12-13 08:34:59 +00:00
|
|
|
depends on APPLDATA_BASE && VM_EVENT_COUNTERS
|
2005-04-16 22:20:36 +00:00
|
|
|
help
|
|
|
|
This provides memory management related data to the Linux - VM Monitor
|
|
|
|
Stream, like paging/swapping rate, memory utilisation, etc.
|
|
|
|
Writing 1 or 0 to /proc/appldata/memory creates(1) or removes(0) a z/VM
|
|
|
|
APPLDATA monitor record, i.e. enables or disables monitoring this record
|
|
|
|
on the z/VM side.
|
|
|
|
|
|
|
|
Default is disabled.
|
|
|
|
The /proc entry can also be read from, showing the current settings.
|
|
|
|
|
|
|
|
This can also be compiled as a module, which will be called
|
|
|
|
appldata_mem.o.
|
|
|
|
|
|
|
|
config APPLDATA_OS
|
2011-01-05 11:47:15 +00:00
|
|
|
def_tristate m
|
|
|
|
prompt "Monitor OS statistics"
|
2005-04-16 22:20:36 +00:00
|
|
|
depends on APPLDATA_BASE
|
|
|
|
help
|
|
|
|
This provides OS related data to the Linux - VM Monitor Stream, like
|
|
|
|
CPU utilisation, etc.
|
|
|
|
Writing 1 or 0 to /proc/appldata/os creates(1) or removes(0) a z/VM
|
|
|
|
APPLDATA monitor record, i.e. enables or disables monitoring this record
|
|
|
|
on the z/VM side.
|
|
|
|
|
|
|
|
Default is disabled.
|
|
|
|
This can also be compiled as a module, which will be called
|
|
|
|
appldata_os.o.
|
|
|
|
|
|
|
|
config APPLDATA_NET_SUM
|
2011-01-05 11:47:15 +00:00
|
|
|
def_tristate m
|
|
|
|
prompt "Monitor overall network statistics"
|
2009-03-26 14:24:00 +00:00
|
|
|
depends on APPLDATA_BASE && NET
|
2005-04-16 22:20:36 +00:00
|
|
|
help
|
|
|
|
This provides network related data to the Linux - VM Monitor Stream,
|
|
|
|
currently there is only a total sum of network I/O statistics, no
|
|
|
|
per-interface data.
|
|
|
|
Writing 1 or 0 to /proc/appldata/net_sum creates(1) or removes(0) a z/VM
|
|
|
|
APPLDATA monitor record, i.e. enables or disables monitoring this record
|
|
|
|
on the z/VM side.
|
|
|
|
|
|
|
|
Default is disabled.
|
|
|
|
This can also be compiled as a module, which will be called
|
|
|
|
appldata_net_sum.o.
|
|
|
|
|
2023-07-04 13:47:13 +00:00
|
|
|
config S390_HYPFS
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2023-07-04 13:47:13 +00:00
|
|
|
prompt "s390 hypervisor information"
|
|
|
|
help
|
|
|
|
This provides several binary files at (debugfs)/s390_hypfs/ to
|
|
|
|
provide accounting information in an s390 hypervisor environment.
|
|
|
|
|
|
|
|
config S390_HYPFS_FS
|
|
|
|
def_bool n
|
2011-01-05 11:47:15 +00:00
|
|
|
prompt "s390 hypervisor file system support"
|
2006-06-23 09:05:06 +00:00
|
|
|
select SYS_HYPERVISOR
|
2023-07-04 13:47:13 +00:00
|
|
|
depends on S390_HYPFS
|
2006-06-23 09:05:06 +00:00
|
|
|
help
|
|
|
|
This is a virtual file system intended to provide accounting
|
2023-07-04 13:47:13 +00:00
|
|
|
information in an s390 hypervisor environment. This file system
|
|
|
|
is deprecated and should not be used.
|
|
|
|
|
|
|
|
Say N if you are unsure.
|
2006-06-23 09:05:06 +00:00
|
|
|
|
2012-08-27 08:55:18 +00:00
|
|
|
source "arch/s390/kvm/Kconfig"
|
2007-04-27 14:01:49 +00:00
|
|
|
|
2008-03-25 17:47:44 +00:00
|
|
|
config S390_GUEST
|
2011-01-05 11:47:15 +00:00
|
|
|
def_bool y
|
2012-10-02 18:16:42 +00:00
|
|
|
prompt "s390 support for virtio devices"
|
2013-07-23 08:26:08 +00:00
|
|
|
select TTY
|
2011-06-22 14:24:07 +00:00
|
|
|
select VIRTUALIZATION
|
2008-03-25 17:47:44 +00:00
|
|
|
select VIRTIO
|
|
|
|
help
|
2012-08-27 10:56:48 +00:00
|
|
|
Enabling this option adds support for virtio based paravirtual device
|
|
|
|
drivers on s390.
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-08-29 11:30:56 +00:00
|
|
|
Select this option if you want to run the kernel as a guest under
|
2012-08-27 10:56:48 +00:00
|
|
|
the KVM hypervisor.
|
2009-06-16 08:30:52 +00:00
|
|
|
|
|
|
|
endmenu
|
2019-10-17 13:09:08 +00:00
|
|
|
|
2022-01-19 18:26:38 +00:00
|
|
|
config S390_MODULES_SANITY_TEST_HELPERS
|
|
|
|
def_bool n
|
|
|
|
|
2019-10-17 13:09:08 +00:00
|
|
|
menu "Selftests"
|
|
|
|
|
|
|
|
config S390_UNWIND_SELFTEST
|
|
|
|
def_tristate n
|
2021-10-01 13:52:00 +00:00
|
|
|
depends on KUNIT
|
|
|
|
default KUNIT_ALL_TESTS
|
2019-10-17 13:09:08 +00:00
|
|
|
prompt "Test unwind functions"
|
|
|
|
help
|
|
|
|
This option enables s390 specific stack unwinder testing kernel
|
|
|
|
module. This option is not useful for distributions or general
|
|
|
|
kernels, but only for kernel developers working on architecture code.
|
|
|
|
|
|
|
|
Say N if you are unsure.
|
|
|
|
|
2021-09-09 18:59:17 +00:00
|
|
|
config S390_KPROBES_SANITY_TEST
|
|
|
|
def_tristate n
|
|
|
|
prompt "Enable s390 specific kprobes tests"
|
|
|
|
depends on KPROBES
|
|
|
|
depends on KUNIT
|
|
|
|
help
|
|
|
|
This option enables an s390 specific kprobes test module. This option
|
|
|
|
is not useful for distributions or general kernels, but only for kernel
|
|
|
|
developers working on architecture code.
|
|
|
|
|
|
|
|
Say N if you are unsure.
|
|
|
|
|
2022-01-19 18:26:38 +00:00
|
|
|
config S390_MODULES_SANITY_TEST
|
|
|
|
def_tristate n
|
|
|
|
depends on KUNIT
|
|
|
|
default KUNIT_ALL_TESTS
|
|
|
|
prompt "Enable s390 specific modules tests"
|
|
|
|
select S390_MODULES_SANITY_TEST_HELPERS
|
|
|
|
help
|
|
|
|
This option enables an s390 specific modules test. This option is
|
|
|
|
not useful for distributions or general kernels, but only for
|
|
|
|
kernel developers working on architecture code.
|
|
|
|
|
|
|
|
Say N if you are unsure.
|
2019-10-17 13:09:08 +00:00
|
|
|
endmenu
|