Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2434473ioo; Sat, 28 May 2022 13:33:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOTCl5mVm2pt7plou7+pWJYxsFRn96JLFOShWnGtRT+VuD72DtudWIfPCjGdZoTCcTgqs2 X-Received: by 2002:a17:90b:3a88:b0:1df:faac:feb7 with SMTP id om8-20020a17090b3a8800b001dffaacfeb7mr14888013pjb.55.1653770032791; Sat, 28 May 2022 13:33:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653770032; cv=none; d=google.com; s=arc-20160816; b=I2gXr7uFdeW9kkuPWnYWGvRXVe7pekCDRX4oMK94hIASZalvaJmIMd4EgxFJ4VE12G PkFIV0xg8z7SHk31hbY+6wJZXbBpNQqD8TMARis7jGyB1SX/93kuqCCtRYOg5knvIT8k zNFlzJdNCicKWlLsmCjWqfUxgrzHQJRhaDwds4mpXXgjrYPVxP4pUYOp2V4JHXCirPo1 HVKlrWebC291+K3xgJD2XY3NVP1YSpBms7EPvk18Gz+J5NZRDSSQFOf34HTnxNZQBaF9 jF8krjUQonXSKwyiOIHyAtuSsW+w5ew7dOYh7Vj7c74ZmKzzJsmZOzZMEsKLOjdPwas9 3dQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :content-language:references:cc:to:subject:from:user-agent :mime-version:date:message-id; bh=PGomKbJbkDwad0FYN7LmABzoBH3+gMh1gddElQqvYSk=; b=RrM5dFw36q0amD6Bq0CIwaacErXqA+LSuFE1SIVEXzEDkfl7IfSTSxIe9tGWFKF+IB qVFB+O1fELYE50+bMUzso4RoJyz+h8MnpeQf3iqpLI2eTiq/4skSZEshssQekuVqA9j/ T3pZXYNQLJ9jXlqQpy1x6C2vHRKtrPoCvnRlPIfepMLYfQxONgwg7wmrV/ehWGQq4Exs DLgwaeuGEh0j7Ipe6AAnhQKtkXaXjvdAjN54wPnCY2LHxlHqsTDvOPUCdDHxDpnoWhPF Oj8Zyxk047kyoLKSQFUvIWiFuX6Guxf265Xv+eOrXrJEIXWmb9qmeHn1+1clUJSPUjp1 K6GA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id n38-20020a635c66000000b003fa6f09c9a5si10994785pgm.238.2022.05.28.13.33.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 13:33:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id CC6D919C3B2; Sat, 28 May 2022 12:35:27 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230512AbiE1IBW (ORCPT + 99 others); Sat, 28 May 2022 04:01:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230315AbiE1IBU (ORCPT ); Sat, 28 May 2022 04:01:20 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B93C11FB for ; Sat, 28 May 2022 01:01:17 -0700 (PDT) Received: from ptz.office.stw.pengutronix.de ([2a0a:edc0:0:900:1d::77] helo=[127.0.0.1]) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1nurNe-0002bB-Am; Sat, 28 May 2022 10:01:02 +0200 Message-ID: <9f278f81-1125-8c54-8f37-922e7b2129a9@pengutronix.de> Date: Sat, 28 May 2022 10:00:48 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.0 From: Ahmad Fatoum Subject: Re: kismet: WARNING: unmet direct dependencies detected for CRYPTO_DEV_FSL_CAAM_BLOB_GEN when selected by TRUSTED_KEYS_CAAM To: kernel test robot Cc: Paul Gazzillo , Necip Fazil Yildiran , kbuild-all@lists.01.org, linux-kernel@vger.kernel.org, Jarkko Sakkinen , David Gstir , Pankaj Gupta References: <202205281527.o6zXpTYo-lkp@intel.com> Content-Language: en-US In-Reply-To: <202205281527.o6zXpTYo-lkp@intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 2a0a:edc0:0:900:1d::77 X-SA-Exim-Mail-From: a.fatoum@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 28.05.22 09:42, kernel test robot wrote: > tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master > head: 9d004b2f4fea97cde123e7f1939b80e77bf2e695 > commit: e9c5048c2de1913d0bcd589bc1487810c2e24bc1 KEYS: trusted: Introduce support for NXP CAAM-based trusted keys > date: 5 days ago > config: (https://download.01.org/0day-ci/archive/20220528/202205281527.o6zXpTYo-lkp@intel.com/config) > reproduce: > # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9c5048c2de1913d0bcd589bc1487810c2e24bc1 > git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git > git fetch --no-tags linus master > git checkout e9c5048c2de1913d0bcd589bc1487810c2e24bc1 > # 1. reproduce by kismet > # install kmax per https://github.com/paulgazz/kmax/blob/master/README.md > kismet --linux-ksrc=linux --selectees CONFIG_CRYPTO_DEV_FSL_CAAM_BLOB_GEN --selectors CONFIG_TRUSTED_KEYS_CAAM -a=arm64 > # 2. reproduce by make > # save the config file to linux source tree > cd linux > make ARCH=arm64 olddefconfig > > If you fix the issue, kindly add following tag where applicable > Reported-by: kernel test robot > > > kismet warnings: (new ones prefixed by >>) >>> kismet: WARNING: unmet direct dependencies detected for CRYPTO_DEV_FSL_CAAM_BLOB_GEN when selected by TRUSTED_KEYS_CAAM The referenced config file doesn't have anything CAAM related enabled. I looked again at the Kconfig and CRYPTO_DEV_FSL_CAAM_BLOB_GEN depends on CRYPTO_DEV_FSL_CAAM_JR. TRUSTED_KEYS_CAAM depends on CRYPTO_DEV_FSL_CAAM_JR >= TRUSTED_KEYS and only then selects CRYPTO_DEV_FSL_CAAM_BLOB_GEN, which still looks correct to me. Could one of the authors elaborate what issue is being reported here? Cheers, Ahmad > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |