From patchwork Fri Jul 5 08:26:57 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steffen Klassert X-Patchwork-Id: 168509 Delivered-To: patch@linaro.org Received: by 2002:a92:4782:0:0:0:0:0 with SMTP id e2csp3262443ilk; Fri, 5 Jul 2019 01:27:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqza4DDiYI4b28gM0ysrJsxo1eqlrjsbeaR1NCDFoRheTG+sbeIwr31PIgCAXeXP/V5Dbqj5 X-Received: by 2002:a17:90a:d14b:: with SMTP id t11mr3682192pjw.79.1562315231527; Fri, 05 Jul 2019 01:27:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562315231; cv=none; d=google.com; s=arc-20160816; b=jjrNCqbeseqn+uqzOOXx+cx/Mk/c/8ju/HfQWCUKOKXeSVajtC4ICurJ7pbAeURxuw cwe5iToEaJ69AqhbVX0aV2bgPYKDY57SS0aSxcMqzh26IsZVwI03ZuxT1/K7IduNv/IN NQVKLqmdWpo5BQhQWg8zpNH3KUmd9bVlyfaOvmYaAQJdW7aq9SG3+5G3qC1eWugWcxxr 9UAIZUAlDobTta3C+2nl6mTOIJtuqd4NmLYTzziRNS4wALoTae5TDSLOnQzK1HppihzR ri+kZ8yMl20XD63jMoLRLSxPjhIbxtheHbo/xQdkQstBko3VDrBXbhuTLOtrzn9skawP Y2+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=WAuTDmdIl9QFu5fhY1aCy9qoykIqJp+tg6X3JeSCWso=; b=P2QwuwGO7Cr37KPa+xbd95+FlnV9VhGUi7rhBkZLyuM1OaMBypeQTlxfOQeRwMvUcy MheWmHDP2blaUXH88sDXciK19beQFsNjmskcxYw358kaXDbXiy3bkf1B7bxrEsB/MINc kUjUb+Q6OxKR6uDl0G83pAX4ton8FenxJyqHyCSOJrAOyZ3QyVwu0EMRyVtfE4s3K/ga FGxQnw/LwhUhxfLDLadh7gmaRorwDiZJYGX+aBfCMn38JJHrAXn/s2smrzsFbzdEH+D+ xV57aB2QvszK9R83P2IuvEtVE8+7BrFlgGFGKtfp5PlHq1ET+tQ04AExVe8C46YYDB7+ /Mvw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of netdev-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=netdev-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b61si8034444plb.401.2019.07.05.01.27.11; Fri, 05 Jul 2019 01:27:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of netdev-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of netdev-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=netdev-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727377AbfGEI1K (ORCPT + 9 others); Fri, 5 Jul 2019 04:27:10 -0400 Received: from a.mx.secunet.com ([62.96.220.36]:36396 "EHLO a.mx.secunet.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726601AbfGEI1J (ORCPT ); Fri, 5 Jul 2019 04:27:09 -0400 Received: from localhost (localhost [127.0.0.1]) by a.mx.secunet.com (Postfix) with ESMTP id B4D48201E6; Fri, 5 Jul 2019 10:27:07 +0200 (CEST) X-Virus-Scanned: by secunet Received: from a.mx.secunet.com ([127.0.0.1]) by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KXACd7-TTe1g; Fri, 5 Jul 2019 10:27:06 +0200 (CEST) Received: from mail-essen-01.secunet.de (mail-essen-01.secunet.de [10.53.40.204]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by a.mx.secunet.com (Postfix) with ESMTPS id 703E8201F9; Fri, 5 Jul 2019 10:27:05 +0200 (CEST) Received: from gauss2.secunet.de (10.182.7.193) by mail-essen-01.secunet.de (10.53.40.204) with Microsoft SMTP Server id 14.3.439.0; Fri, 5 Jul 2019 10:27:05 +0200 Received: by gauss2.secunet.de (Postfix, from userid 1000) id 2DEB731807B4; Fri, 5 Jul 2019 10:27:05 +0200 (CEST) From: Steffen Klassert To: David Miller CC: Herbert Xu , Steffen Klassert , Subject: [PATCH 4/7] ipsec: select crypto ciphers for xfrm_algo Date: Fri, 5 Jul 2019 10:26:57 +0200 Message-ID: <20190705082700.31107-5-steffen.klassert@secunet.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190705082700.31107-1-steffen.klassert@secunet.com> References: <20190705082700.31107-1-steffen.klassert@secunet.com> MIME-Version: 1.0 X-EXCLAIMER-MD-CONFIG: 2c86f778-e09b-4440-8b15-867914633a10 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org From: Arnd Bergmann kernelci.org reports failed builds on arc because of what looks like an old missed 'select' statement: net/xfrm/xfrm_algo.o: In function `xfrm_probe_algs': xfrm_algo.c:(.text+0x1e8): undefined reference to `crypto_has_ahash' I don't see this in randconfig builds on other architectures, but it's fairly clear we want to select the hash code for it, like we do for all its other users. As Herbert points out, CRYPTO_BLKCIPHER is also required even though it has not popped up in build tests. Fixes: 17bc19702221 ("ipsec: Use skcipher and ahash when probing algorithms") Signed-off-by: Arnd Bergmann Acked-by: Herbert Xu Signed-off-by: Steffen Klassert --- net/xfrm/Kconfig | 2 ++ 1 file changed, 2 insertions(+) -- 2.17.1 diff --git a/net/xfrm/Kconfig b/net/xfrm/Kconfig index 1ec8071226b2..06a6928d0e62 100644 --- a/net/xfrm/Kconfig +++ b/net/xfrm/Kconfig @@ -14,6 +14,8 @@ config XFRM_ALGO tristate select XFRM select CRYPTO + select CRYPTO_HASH + select CRYPTO_BLKCIPHER if INET config XFRM_USER