Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1173608yba; Wed, 24 Apr 2019 16:44:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqzv9/yrXidhZ0orhG22Wc9OXpCzQL+XkoSVAd2aawl3mUS6As17xNnm8TGunbILmNZKhXVl X-Received: by 2002:a65:63cb:: with SMTP id n11mr1591141pgv.236.1556149459585; Wed, 24 Apr 2019 16:44:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556149459; cv=none; d=google.com; s=arc-20160816; b=AZ2TvthElrrTCmS52rWhHJNjl7aDaDtLZPAIqnHl8DU095e2xnLT0z9dZ096mCqLyV QgW2OTDuHhSQHpb4pKH608W7zGlBUDfoHaV6OVMJPCtDVPJgOvDBeVI8r/LKHOjSWgx9 3vj2CnWcT5iPvYHZ4aDxuxbXFeui/NH/8KkkowmGsRPm8FgpJCzAsM1u6JRwZcIt9hOY geZ1ShtDkHYec2G8l5LA+ths2TcXTWigUoJq7caWTDEoupV8ou5ORf1CjBHuI74xFJkf tbvaIdoaw2UPPN5Nb8gaPtWMKpP1Ai7L7q1Jl3LTsrXay0tsFQAfH3mj8QcqdpiB+aIP EvBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=td2g9Kow80TiG3a3I6fZm1Dw4wti4RaT/I7tjUHh1yo=; b=fSp+iyNL508fJp4wkh1IZj80bNe0TtbOFoUtJNnG1zlt7wk4f2putbzLxn0EIs13Km oKbkBVoGJ40/f8fLFSRjH22vd7awZw034oGS7Pbhgdp7H/9uiI2UImXM4m6/nnlDC61e myPwh/l4Tkctt5fuSeoqrx6kRCLI3YCu75tKDmWYoTIGqzntxNpXBpIrH7kWE4t367Nr ntYIJRPuAGB6E6Vk2nDjcp6XVT5xZXDpdeh0EDBteOTswZqlCnHJPA9xcO9RJN8oGdPH 7p12JzjB9yOMzIKYq9UlgijWDZ0ndVaVdqKEDQxUs8cE+Vkv+F3JDYlfaZwA8wD0DOjB 3UuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YBw3ZQVH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u4si4688215pgk.56.2019.04.24.16.44.04; Wed, 24 Apr 2019 16:44:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YBw3ZQVH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391954AbfDXRfk (ORCPT + 99 others); Wed, 24 Apr 2019 13:35:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:34486 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391927AbfDXRff (ORCPT ); Wed, 24 Apr 2019 13:35:35 -0400 Received: from localhost (62-193-50-229.as16211.net [62.193.50.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AD9C721905; Wed, 24 Apr 2019 17:35:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556127335; bh=3TbLcuFwlu1Tk3iqgGesrxWiD8uIOc3zA7AZtHsAOj8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YBw3ZQVHCJV0webxnYPj+kEPrws7Izoh49nxcritwxy9pTfv0orwI4KqAcPrE5EIL 1Z+p+r9rLsSFh1BaHhTDbelYvCUatqtyS7r+ccbNfxUUJHjLO+3wHSDtf3kBLWUHAJ Nlo04spJgGpBOWoT/Dre5xRpx510u3fuS5shE4ck= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jakub Kicinski , "David S. Miller" Subject: [PATCH 5.0 025/115] net/tls: fix build without CONFIG_TLS_DEVICE Date: Wed, 24 Apr 2019 19:09:21 +0200 Message-Id: <20190424170926.519593198@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190424170924.797924502@linuxfoundation.org> References: <20190424170924.797924502@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jakub Kicinski [ Upstream commit 903f1a187776bb8d79b13618ec05b25f86318885 ] buildbot noticed that TLS_HW is not defined if CONFIG_TLS_DEVICE=n. Wrap the cleanup branch into an ifdef, tls_device_free_resources_tx() wouldn't be compiled either in this case. Fixes: 35b71a34ada6 ("net/tls: don't leak partially sent record in device mode") Signed-off-by: Jakub Kicinski Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/tls/tls_main.c | 2 ++ 1 file changed, 2 insertions(+) --- a/net/tls/tls_main.c +++ b/net/tls/tls_main.c @@ -298,8 +298,10 @@ static void tls_sk_proto_close(struct so kfree(ctx->tx.rec_seq); kfree(ctx->tx.iv); tls_sw_free_resources_tx(sk); +#ifdef CONFIG_TLS_DEVICE } else if (ctx->tx_conf == TLS_HW) { tls_device_free_resources_tx(sk); +#endif } if (ctx->rx_conf == TLS_SW) {