Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp2865610pxb; Mon, 18 Apr 2022 09:52:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJww050AofV2qIn4v+ZMcMyqcx05edXjh6SJr6iS3f5Pw0R8sWiCylk0t84R3Fc4CB4i4FmF X-Received: by 2002:a17:907:971b:b0:6e8:67cf:6caf with SMTP id jg27-20020a170907971b00b006e867cf6cafmr10122045ejc.259.1650300730969; Mon, 18 Apr 2022 09:52:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650300730; cv=none; d=google.com; s=arc-20160816; b=JzGTtKvu6rdDZbdVCGlSNUA8E/o0R8LwKW8Rns1IL5AQEz18uzrejMZKAqETjs/JND pjmY6tn7QrgABycM/nWS0nld0CCH9FKG8f1bdJvymPvtHun52EiAKGxMKeIrbjdI4xdg MNGl5quMNODic+DZLsns3UaqYiNUrhrc5h9BUSAQDEbaLvf/dl6VssxuOSd7Bn8hfR8h faVq8fD2bXoO6qWhdCqmyao6Y0uA8GEMwWK5qe+8XWZ0hGDe8Y63QYeXP1NmM+G4Q209 kqUQG0CXqcAOIykxn3mjCXVlDD0jfpOXGjipBNgp5+7z3sOvWaE8vwgm3fFqsdZfwaCG 3YRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1sxN4sXnrBbLMHYBPeURPSgl2jJdQDd1wMQOIj6IvAM=; b=Fc9VIgrppenLsYQDscPTakVsWyqW3uzclqYoX0lV0jIXaoAQjLfbio2jyldLq3DWun S2X3zOeimdaKsCAijQgsps2py8jcspds0eEqs4lLoId3RN6Ft7i2eXM3FaW3vF32RaXt kUUuTztRGUqLOnDqffd20AP8yb+uHFumjrNY1QgOqz0pIT5Zi2M1+/WG+g/WSMU8t/h8 6ddttXUmN8lhDIcEwenkDHoYOX0z5713M5deKEapm+SubGG3dc8a4sGqzYtSMUe7fX2Z ArSgmaIp3z20zWbI34hkkmXMaKc2wzQeuLKaG+u6LMOMvk6X8YXUad+djKqt18aO7J49 s7BA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Jea9xpaH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u28-20020a50c05c000000b0041d7158ec30si7136651edd.137.2022.04.18.09.51.46; Mon, 18 Apr 2022 09:52:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Jea9xpaH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243001AbiDRNh2 (ORCPT + 99 others); Mon, 18 Apr 2022 09:37:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243939AbiDRNKh (ORCPT ); Mon, 18 Apr 2022 09:10:37 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B5C2F21E02; Mon, 18 Apr 2022 05:50:14 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 956A3B80E4E; Mon, 18 Apr 2022 12:50:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DD736C385A1; Mon, 18 Apr 2022 12:50:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1650286211; bh=OpD1BDYPwMtTDZCSK+H85PSOkBIsB6lrv4Odz2brAJk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Jea9xpaH4wHkPLul5G9GWIbjEKme3/6AFcz/ru3vPrV4+DFqC4xNyxhuT9CEMfnng 3LCXPh7Oi0b4TL+cx6RS2FyEUaWyRVess4sRSFeJlAzM7a6ITffQSyh6N4CWtXRxfn C/REil9/dSwrniwxMtUAOoWgspdEw0kkjgTBLo8U= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolai Stange , Petr Vorel , Herbert Xu , Sasha Levin Subject: [PATCH 4.14 063/284] crypto: vmx - add missing dependencies Date: Mon, 18 Apr 2022 14:10:44 +0200 Message-Id: <20220418121212.483293177@linuxfoundation.org> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220418121210.689577360@linuxfoundation.org> References: <20220418121210.689577360@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Petr Vorel [ Upstream commit 647d41d3952d726d4ae49e853a9eff68ebad3b3f ] vmx-crypto module depends on CRYPTO_AES, CRYPTO_CBC, CRYPTO_CTR or CRYPTO_XTS, thus add them. These dependencies are likely to be enabled, but if CRYPTO_DEV_VMX=y && !CRYPTO_MANAGER_DISABLE_TESTS and either of CRYPTO_AES, CRYPTO_CBC, CRYPTO_CTR or CRYPTO_XTS is built as module or disabled, alg_test() from crypto/testmgr.c complains during boot about failing to allocate the generic fallback implementations (2 == ENOENT): [ 0.540953] Failed to allocate xts(aes) fallback: -2 [ 0.541014] alg: skcipher: failed to allocate transform for p8_aes_xts: -2 [ 0.541120] alg: self-tests for p8_aes_xts (xts(aes)) failed (rc=-2) [ 0.544440] Failed to allocate ctr(aes) fallback: -2 [ 0.544497] alg: skcipher: failed to allocate transform for p8_aes_ctr: -2 [ 0.544603] alg: self-tests for p8_aes_ctr (ctr(aes)) failed (rc=-2) [ 0.547992] Failed to allocate cbc(aes) fallback: -2 [ 0.548052] alg: skcipher: failed to allocate transform for p8_aes_cbc: -2 [ 0.548156] alg: self-tests for p8_aes_cbc (cbc(aes)) failed (rc=-2) [ 0.550745] Failed to allocate transformation for 'aes': -2 [ 0.550801] alg: cipher: Failed to load transform for p8_aes: -2 [ 0.550892] alg: self-tests for p8_aes (aes) failed (rc=-2) Fixes: c07f5d3da643 ("crypto: vmx - Adding support for XTS") Fixes: d2e3ae6f3aba ("crypto: vmx - Enabling VMX module for PPC64") Suggested-by: Nicolai Stange Signed-off-by: Petr Vorel Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/vmx/Kconfig | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/crypto/vmx/Kconfig b/drivers/crypto/vmx/Kconfig index c3d524ea6998..f39eeca87932 100644 --- a/drivers/crypto/vmx/Kconfig +++ b/drivers/crypto/vmx/Kconfig @@ -1,7 +1,11 @@ config CRYPTO_DEV_VMX_ENCRYPT tristate "Encryption acceleration support on P8 CPU" depends on CRYPTO_DEV_VMX + select CRYPTO_AES + select CRYPTO_CBC + select CRYPTO_CTR select CRYPTO_GHASH + select CRYPTO_XTS default m help Support for VMX cryptographic acceleration instructions on Power8 CPU. -- 2.34.1