From patchwork Wed Oct 4 10:27:00 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 114765 Delivered-To: patch@linaro.org Received: by 10.140.22.163 with SMTP id 32csp2942458qgn; Wed, 4 Oct 2017 03:27:40 -0700 (PDT) X-Google-Smtp-Source: AOwi7QCK3JAmj4hAbxPmHoOz7Clwa1vIrxKis2lNqlWfCJsiMlljtkG/56WXLlZPpHqMwweGOmHm X-Received: by 10.98.147.219 with SMTP id r88mr20067856pfk.0.1507112860071; Wed, 04 Oct 2017 03:27:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1507112860; cv=none; d=google.com; s=arc-20160816; b=aFFLa1pjiFoCUbt3fUlm3iKD6vQFOnGtLeZK4E2r6hw6rXuuBLKb1K7WK5syFqxrhm sScCZCNSclPlQolD2gs4T6n0kNBc5N+kLhEhJwXJxMLmA5J1mJJfWgU9oKGL5fCT6HB2 GPhO6TLT3jVBI2E/2OPNjMauzghhGTKSR3g2FMksxGAD9yTWqZfwK2l7z44xpG1RUzA7 kGtensFqZLbIhn2TRex43hquFo6nooW9X1Dw7jv/6D9XnzyvLBH+6IZqZ0v62K6zu7P+ TFdYegmh/wnaAq7PeJmmKmZ95AOVkDRg15b8aseOrzL7nmYrZBC0w6ImKHapxgT0zcmt ixzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=SsAWr1X/TAc3ZqbNcRJ/Hr0dvOK6NIFgp8TsNkNHlsk=; b=L3P+Pt9aczSgDulZ140uWKgcMfRGAIe1biZQTGwOb93btqz0oyM2N7hQnCJ57nFx6W vVFIP6zdXgw/5SwpRGZeJzpr6Rl/lBY2RK9nzS3E3PMUW0YtUDKUsRTy8rreH7Qlrl+F 8XpTkdBlFOzOymlusXYtv+zGB/t8ir4SA8TvH/DTo90ghk7f7H+QBtH4Y/8BqKWBUIyk A21hkOiheNFdd3PmkGPfd/aYgE4U23u5RzdCV6URZjMFGF2Fc5y6pJCpfKMhIgILIbbs IpBSfQ82Y7W5KfMy7uOnnqWTFjEsXVbwMugyX+Kgz4GxW5WoliZ5pxXiuM9oUB1FPSyI 6OkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i1si12227374plt.124.2017.10.04.03.27.39; Wed, 04 Oct 2017 03:27:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751441AbdJDK1g (ORCPT + 26 others); Wed, 4 Oct 2017 06:27:36 -0400 Received: from mout.kundenserver.de ([212.227.17.10]:65010 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751114AbdJDK1e (ORCPT ); Wed, 4 Oct 2017 06:27:34 -0400 Received: from wuerfel.lan ([95.208.190.237]) by mrelayeu.kundenserver.de (mreue101 [212.227.15.145]) with ESMTPA (Nemesis) id 0MXHhV-1dlgAI3Jwr-00WFYs; Wed, 04 Oct 2017 12:27:23 +0200 From: Arnd Bergmann To: David Howells , James Morris , "Serge E. Hallyn" Cc: Arnd Bergmann , =?utf-8?q?Stephan_M=C3=BCller?= , keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] security/keys: BIG_KEY requires CONFIG_CRYPTO Date: Wed, 4 Oct 2017 12:27:00 +0200 Message-Id: <20171004102722.1834761-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:K+6KKcS1D2iYDZpxeYognC8BCZvTaMKUZbFt0k2VtSq1RMHH2wn IAED6c/O17ZRBgbtQ+CWpSUqKDmNo+NOQcDu91AQowGx41cMEbQ/TUb4hGU40QQqjXsPIia fLS3bCEiImoRe3k4tCtoGD57GzHZtPT2NmsW+Vn7fogpKsbva5KegE8FpLDUSNaxUSykDj5 i7tl0xDMXI+rLC9I17EMw== X-UI-Out-Filterresults: notjunk:1; V01:K0:1xh3cEOtjZI=:NZ2zyoqbBbDNuYHW3oXUnk Xj7zYmRi8ZLQ89MHzCSeZDG15KuWzZbjuJ1zplAM/xEYNr41G0OeIYlqUTIaKxHiHPGVAXF1s Vv+y9KTeb0Rj10d2xjmBFynVj7ePC208o06VKzm2LfTX9uPbo7vhbZZMswOCK9iWwt4RHlC3f 1JerTQ+TPt/JL13YasBBgP7pf9YyaJQF7dhAfODhEUqZbgxx5zniAbzZSy6m24BMIYzj+6o3w T47/9mGYQhJabkQPtoxHoeAa/1QzVgeLEP5hrorBAtSz056iGl0MIS54kyBTzSnR9G6c2x4+r yUyczD+DFjd9z9sPCNFxLE3USUwyALeBX7s07kw475ItVmoH7Y8Ns1w2PBXQyCUD86Lq6mpu+ /U6F8IlZmB7/XWCVHEQq/vHJ/+h4UaOnv7lERxZ6zpPXWXwwcsAKeBTCEEtg52caDh96bLF/A HrsJ/jBWw8MohXbIDBpfdU9hKUlSUEqlWeN9A6w5CifgxgiJ7oY+9xGliAPQ9uX+N3HbmMV/i 6gkijiAhXl8NpJ13POaFlGgfLxXkeTy85JwAkj9NYllvn+VdVE3+JUJRdm5d9Gq6lQNPUWLDS NWkk1nU7bysq+fzWRCzLjQpj9dWgO+WyLRJv/zFRinnD4XhK4ovtvgL3atGVsZWlTQi539TwV GUAGKQ2ZCHf0ZNSd6kW24XDh6BQaFtNlze2nM3SEG91ZF3p97Y2EpTkdkY2mXq2+an46Fz/l9 79zHDP3S8LG1Du8TJpuc/AI7uXmdLORJDASDPw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The recent rework introduced a possible randconfig build failure when CONFIG_CRYPTO configured to only allow modules: security/keys/big_key.o: In function `big_key_crypt': big_key.c:(.text+0x29f): undefined reference to `crypto_aead_setkey' security/keys/big_key.o: In function `big_key_init': big_key.c:(.init.text+0x1a): undefined reference to `crypto_alloc_aead' big_key.c:(.init.text+0x45): undefined reference to `crypto_aead_setauthsize' big_key.c:(.init.text+0x77): undefined reference to `crypto_destroy_tfm' crypto/gcm.o: In function `gcm_hash_crypt_remain_continue': gcm.c:(.text+0x167): undefined reference to `crypto_ahash_finup' crypto/gcm.o: In function `crypto_gcm_exit_tfm': gcm.c:(.text+0x847): undefined reference to `crypto_destroy_tfm' When we 'select CRYPTO' like the other users, we always get a configuration that builds. Fixes: 428490e38b2e ("security/keys: rewrite all of big_key crypto") Signed-off-by: Arnd Bergmann --- security/keys/Kconfig | 1 + 1 file changed, 1 insertion(+) -- 2.9.0 Reviewed-by: Serge Hallyn diff --git a/security/keys/Kconfig b/security/keys/Kconfig index 91eafada3164..6462e6654ccf 100644 --- a/security/keys/Kconfig +++ b/security/keys/Kconfig @@ -45,6 +45,7 @@ config BIG_KEYS bool "Large payload keys" depends on KEYS depends on TMPFS + select CRYPTO select CRYPTO_AES select CRYPTO_GCM help