Received: by 2002:a05:7412:e79e:b0:f3:1519:9f41 with SMTP id o30csp241612rdd; Wed, 22 Nov 2023 14:48:04 -0800 (PST) X-Google-Smtp-Source: AGHT+IHckLrQn2PqFoh4MZmv7IjQFRNltLfIHnJ4tt3sK6jT6T5d6X5S4hK0B1S3xDKPlY1D+2ie X-Received: by 2002:a17:90b:3807:b0:280:c9a1:861e with SMTP id mq7-20020a17090b380700b00280c9a1861emr4173250pjb.13.1700693284274; Wed, 22 Nov 2023 14:48:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700693284; cv=none; d=google.com; s=arc-20160816; b=a5iHz8kwl9qazRAr/PQnvnkKXP94U9Y+lRoLaGCcHSX/KGOu89cXWxK3wWopOIjeii IyfRhSnnT09uYalHKMviFT5Z1o/H3UWKHygsjZua20hr/D+nUV/lj76dnuovp1sKye0/ onx4nZDcTw/LooBosl2N6CspemcXuN/fHAZpMYZnJMAkLUbfWEP/10Ezv+U44nbpU0Lk c2fkEnzxNJAUsjxDqMkNMo0RkXP3vfmBRXTMCvCwcO2bLNA70pSabAXqYIE0D9ZNWAl0 rsHsFvCN7evsATEiiMw42xb0jM2hGTEGiSXG4rYT7B2r2qE4+/FBwaUnPxCSv9kR6Dl8 Jqzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=qsUVpK7HlOI/alQSigdp1G103zNHyTMbEL0zYM2mhEk=; fh=z9F1xB7Zil5negm71YQkGNSLKveYIL/Zk7w910Ma8Q0=; b=kXGGuK7F3no5SnnLTUV28pBo8Zh8KIw8Ky6jtjist8mD+lrBsijoYpojwPTOHWQmJ8 NYJVlNNttWqw1vKwhLb+PvshNxXv/+1Z2ydbq8EQVo/2dy5iNXOhY/cLjj3Nv/85b+t8 qLHXyl4nRNOWj8x2/9HEO5yLnawXSua4zLVzrfl5lwfVI30CuMc0qfIo90jyCCrSW06f oRr6V/FQjRPUgTDKiQeyHA7M5qEHomGTnG/Z/yl/c4aAgizEJLohzHHWv7l8qtpX8DZi uhieT8jobpEEdgwZA+Z41Ky5nno8gkhYdlYbx3Ms4Yh2ea+puG3zEy+JdDkTEDmjFZdT TJuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=g0Ll4JW9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id b1-20020a17090a10c100b002839dee7fc2si38300pje.184.2023.11.22.14.48.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 14:48:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=g0Ll4JW9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id E0BE88253FF7; Wed, 22 Nov 2023 14:48:01 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344491AbjKVWrf (ORCPT + 99 others); Wed, 22 Nov 2023 17:47:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46926 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235132AbjKVWre (ORCPT ); Wed, 22 Nov 2023 17:47:34 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8C43592 for ; Wed, 22 Nov 2023 14:47:31 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5ADF4C433CA; Wed, 22 Nov 2023 22:47:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1700693251; bh=9ZYZZkr3I5hnymOVMd0KFdtSw5PNdjLQfrciVWD6egI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=g0Ll4JW9tS/EGX5GtWauX3N3e0xBMe2+rvzFXjJizYae6g08d5AOtIUQdHAYH4r3j miRPhXbgooUsZmqDaFwTIzizmKrjwCvSL6EsAjpWFXVaB1JOMlqq+Id82oY9eJWD79 MiyaP8PV6qFHRPchKcdC0wxoXcbOutpDU85RFFRiHVckcMqOZaR93oQj4+/8yGlhP/ HDiEzsRWpQZ3suv0Ed6pqdU8CJ6tn0lcmC5PBh3DKwbln5NrzA5wnGi0csKYTIHb9o AouSbelHAd+ju3CJkgO7Tld8h5ecegxq5WwoxE/x5v3xY0Hfw3QAobcADR+4LearDf Zy7uciJ+6VNwg== From: Arnd Bergmann To: linux-nvme@lists.infradead.org Cc: Arnd Bergmann , Keith Busch , Jens Axboe , Christoph Hellwig , Sagi Grimberg , Chaitanya Kulkarni , linux-kernel@vger.kernel.org Subject: [PATCH v3 2/3] nvme: target: fix Kconfig select statements Date: Wed, 22 Nov 2023 23:47:18 +0100 Message-Id: <20231122224719.4042108-3-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20231122224719.4042108-1-arnd@kernel.org> References: <20231122224719.4042108-1-arnd@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.3 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 22 Nov 2023 14:48:02 -0800 (PST) From: Arnd Bergmann When the NVME target code is built-in but its TCP frontend is a loadable module, enabling keyring support causes a link failure: x86_64-linux-ld: vmlinux.o: in function `nvmet_ports_make': configfs.c:(.text+0x100a211): undefined reference to `nvme_keyring_id' The problem is that CONFIG_NVME_TARGET_TCP_TLS is a 'bool' symbol that depends on the tristate CONFIG_NVME_TARGET_TCP, so any 'select' from it inherits the state of the tristate symbol rather than the intended CONFIG_NVME_TARGET one that contains the actual call. The same thing is true for CONFIG_KEYS, which itself is required for NVME_KEYRING. Signed-off-by: Arnd Bergmann --- drivers/nvme/target/Kconfig | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/nvme/target/Kconfig b/drivers/nvme/target/Kconfig index 31633da9427c..e1ebc73f3e5e 100644 --- a/drivers/nvme/target/Kconfig +++ b/drivers/nvme/target/Kconfig @@ -4,6 +4,8 @@ config NVME_TARGET tristate "NVMe Target support" depends on BLOCK depends on CONFIGFS_FS + select NVME_KEYRING if NVME_TARGET_TCP_TLS + select KEYS if NVME_TARGET_TCP_TLS select BLK_DEV_INTEGRITY_T10 if BLK_DEV_INTEGRITY select SGL_ALLOC help @@ -87,9 +89,7 @@ config NVME_TARGET_TCP config NVME_TARGET_TCP_TLS bool "NVMe over Fabrics TCP target TLS encryption support" depends on NVME_TARGET_TCP - select NVME_KEYRING select NET_HANDSHAKE - select KEYS help Enables TLS encryption for the NVMe TCP target using the netlink handshake API. -- 2.39.2