Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp1790138ybj; Sun, 22 Sep 2019 12:00:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqyyF+SXug41WvFssgRkEnyzZCV5HlZ1afKD2ZcH+djAAPZNB2rfg3bfc3dfGdTz1dG9t/XB X-Received: by 2002:a17:906:129b:: with SMTP id k27mr26725851ejb.42.1569178835698; Sun, 22 Sep 2019 12:00:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569178835; cv=none; d=google.com; s=arc-20160816; b=Q9KqbwVXW4v8EcHt44VF1k3ez0IoWLBrjMNLaqJoSCK8qFlKsjzRd0F66x2NDVUU91 xNAeMQ4We0MZn10FLN6GgULtnqBN8A2Ia1uMD3K2SKj7Psfp7QZgd8RIQ4JRJGBKZEpO hEfLd+WmpQSmZh0eiSNF4GU2z/3xWgMGoA/YuzZ+IXUtMELOlHE7KiQ8X2tYP/ZVXeHb FMggNFfQd2HZ5EX+ELIQYqED1GlIPnLD1SG5Vb9fW4VdgUE9iyn5zNByG/IgNGSoRQcA KyWYX6Y/wPdDkDvoQXMSGys8czPJmTwN7RBu+9IpJHLOIa8GHPoTZ84xx/FLui0nDhol m6qw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=bZIB+WCoHeso0xzaxNuB/lWTyTu9p/YyTuqsDqC2VOw=; b=OoeYNoK5mp2E8pxhY9MGrzhgxZnwTt1DqtbbnXTSKEUmTb20xfBN30mocGk0Si/yOb c330XYRLlAYu36ovUAwz8o3g8bMVB73A6E/L4LLUtZoTpgNq+32TtZjBEVh3r4PAlkc3 b/6KBrcUZ05qHwNvHkR48HGpRomWoeQoxKR7MbMEPFAyf7nRATrnAw3VpVU60RaulmDt unjQYZR/y4wcrX8uMy/GvW2eUFQfezLLRQPqyM+gwqCLxVScxZBjNz41WQMWe8zp/xS8 BGJPekzftqHWsUiyKt65lF/O8ATQgXomhGgcfj8YTnMkXam8c9d0knZ3Omr3ZaU+hKKI tcLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i38si5306938eda.64.2019.09.22.12.00.12; Sun, 22 Sep 2019 12:00:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392102AbfITRhO (ORCPT + 99 others); Fri, 20 Sep 2019 13:37:14 -0400 Received: from mx1.redhat.com ([209.132.183.28]:44594 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390962AbfITRhO (ORCPT ); Fri, 20 Sep 2019 13:37:14 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 00FDF20E6; Fri, 20 Sep 2019 17:37:14 +0000 (UTC) Received: from localhost (unknown [10.18.25.174]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 78A4A600C6; Fri, 20 Sep 2019 17:37:08 +0000 (UTC) Date: Fri, 20 Sep 2019 13:37:07 -0400 From: Mike Snitzer To: Thibaut Sautereau , Milan Broz Cc: dm-devel@redhat.com, Alasdair Kergon , linux-kernel@vger.kernel.org Subject: Re: dm-crypt error when CONFIG_CRYPTO_AUTHENC is disabled Message-ID: <20190920173707.GA21143@redhat.com> References: <20190920154434.GA923@gandi.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190920154434.GA923@gandi.net> User-Agent: Mutt/1.5.21 (2010-09-15) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.71]); Fri, 20 Sep 2019 17:37:14 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 20 2019 at 11:44am -0400, Thibaut Sautereau wrote: > Hi, > > I just got a dm-crypt "crypt: Error allocating crypto tfm" error when > trying to "cryptsetup open" a volume. I found out that it was only > happening when I disabled CONFIG_CRYPTO_AUTHENC. > > drivers/md/dm-crypt.c includes the crypto/authenc.h header and seems to > use some CRYPTO_AUTHENC-related stuff. Therefore, shouldn't > CONFIG_DM_CRYPT select CONFIG_CRYPTO_AUTHENC? Yes, it looks like commit ef43aa38063a6 ("dm crypt: add cryptographic data integrity protection (authenticated encryption)") should've added 'select CRYPTO_AUTHENC' to dm-crypt's Kconfig. I'll let Milan weigh-in but that seems like the right way forward. Thanks for your report! Mike