Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3821567ybi; Mon, 29 Jul 2019 13:17:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqyEOSB5Qys0c+BRIQrfJdGzZM+7ECMzP7NG3/zKGcrNe5ejNlS0qsqn2D8pbKHxxWiDGewh X-Received: by 2002:a62:1ac9:: with SMTP id a192mr29547889pfa.260.1564431429518; Mon, 29 Jul 2019 13:17:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564431429; cv=none; d=google.com; s=arc-20160816; b=JlJ/z8NJTCkb2mplb0E91HYvRGQ2WRF/h92+kUhztSQdno6t0KjKz3d0feFD/PE8jB 3NjL9uBlWRBrYdW+VSzwp6qlji5GXOoDS4Bb4CTMTkTWEKRzSV6b/GgojWdsnV7wY9pc 86o3vdP+XZ4PAYNtQwAKJKDr60p7htepjG5bF25hjIpYKaTwWp6k54WQDaWGBaeWKemg WP/1YIiPebIQv8j1+Pj54qTyfBmby43AEwGg9xcHaKs7Svr/LMLqpWQPWiNCODZ7bEPq CSTbnYLMPxAMArLkjudan51Wv4/HnHyIXjqrlboUFFOfKI3eCglJjjRizFs5ApDttCaq 2D0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jcbysA9YC8y/yzSjUytXWEGWZT00MdpS6mPwqJityIw=; b=cX/hUP7WCimOgJUXuXBWiiUPv6KiyEUPAz/I4YEfEYymzHliOIRb3MSeLrFhpoAt34 RReoDVE9GoV9xrWWPO1Ig+I6LyAi784C25BiIwEg5tI4ozDTzSm1UC/hSSveok5R2XFK 23vemtvQu2m4k6+oLBg95SwdQ3OUTarbQgSg0/Bur3jtIG8Y+mGdBSz323TE7vFsC2CW QMavgyPkRQ0cKQFN2mfrL8EILSU9NhY5yy/KK8TsDATLCoTdz6gDhEgTTl+/ojA9OGd/ MdqdS0lT57y/DhPs7UCTYVgA1zeRZuw+snFoges29gKAGOaVLvfX+FHTOyhWmq8u2MPg GgNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EWIayauy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 11si26426335pla.248.2019.07.29.13.16.54; Mon, 29 Jul 2019 13:17:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EWIayauy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388379AbfG2T1z (ORCPT + 99 others); Mon, 29 Jul 2019 15:27:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:40538 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729286AbfG2T1x (ORCPT ); Mon, 29 Jul 2019 15:27:53 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 52A3B217D4; Mon, 29 Jul 2019 19:27:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564428472; bh=EnJyaztDHpgHcFJXzpgoGij0JItQ9VAd1x/OnT9tPgE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EWIayauy+nJLJAyBur1vIE/xMwZSpIVPiTu92jLCDGbkujpkVn4RzhfgofxLRm5cK n+Enj0MdpxQiOzV4cEqCrFB2AMDzFre/Uoyjz9FYUyjcmL7z+sVyJ/CfLguBRhWDvN ECbLmK0Qtpx2gqRdarkaMsX5vbdd8V1zJSqPSrSA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Herbert Xu , Steffen Klassert , Sasha Levin Subject: [PATCH 4.14 060/293] ipsec: select crypto ciphers for xfrm_algo Date: Mon, 29 Jul 2019 21:19:11 +0200 Message-Id: <20190729190829.007823387@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190729190820.321094988@linuxfoundation.org> References: <20190729190820.321094988@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 597179b0ba550bd83fab1a9d57c42a9343c58514 ] kernelci.org reports failed builds on arc because of what looks like an old missed 'select' statement: net/xfrm/xfrm_algo.o: In function `xfrm_probe_algs': xfrm_algo.c:(.text+0x1e8): undefined reference to `crypto_has_ahash' I don't see this in randconfig builds on other architectures, but it's fairly clear we want to select the hash code for it, like we do for all its other users. As Herbert points out, CRYPTO_BLKCIPHER is also required even though it has not popped up in build tests. Fixes: 17bc19702221 ("ipsec: Use skcipher and ahash when probing algorithms") Signed-off-by: Arnd Bergmann Acked-by: Herbert Xu Signed-off-by: Steffen Klassert Signed-off-by: Sasha Levin --- net/xfrm/Kconfig | 2 ++ 1 file changed, 2 insertions(+) diff --git a/net/xfrm/Kconfig b/net/xfrm/Kconfig index 286ed25c1a69..2e747ae7dc89 100644 --- a/net/xfrm/Kconfig +++ b/net/xfrm/Kconfig @@ -14,6 +14,8 @@ config XFRM_ALGO tristate select XFRM select CRYPTO + select CRYPTO_HASH + select CRYPTO_BLKCIPHER config XFRM_USER tristate "Transformation user configuration interface" -- 2.20.1