Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp7292095rwn; Tue, 13 Sep 2022 17:56:10 -0700 (PDT) X-Google-Smtp-Source: AA6agR7hjZfzwOljjwF37oGHgQWa0/eWOUCjQ+pi6Q9+bPqknaIa8JxdYL68q68GD8fjo0W/ejzd X-Received: by 2002:a65:450d:0:b0:42b:9117:ba5b with SMTP id n13-20020a65450d000000b0042b9117ba5bmr30386493pgq.418.1663116970500; Tue, 13 Sep 2022 17:56:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663116970; cv=none; d=google.com; s=arc-20160816; b=oGdc+c4BVydEchWHO/Je5tyqa+j5xuum8PzaNgQD3IZ8EYsjNhdoOxKhAX7bnP5rVS fYioECyO4PPaA/FWPo1HV5E6vKJp4G/m0y9/u2G5I44qR6r0SyzHy/4TSKClgoS5nFSn JVVnKQpFnQgIBJXGuRDo75RBJ9AnAxnBThHIhpmYBqP1nradr++E7D8pTOI8Xg456JVJ lj244ZZvqYk5da/A2SjPWzCYw9j5kITts432974JS6g7HpUXumMVAU1mcGw1gFXYmnp2 LXcpig0+4mGN1a005vCygNBoAvl61DDWBFBIe8J4AEdmrBxoYZWX7EGP0PmM8Wzbwvxr 7sgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=KwxU4uOMEV1vj9yKOwL5qX80RUwhaDHkt2xxt95hK2Y=; b=E2dFi8N8sKhRrdylRcIODtn82p+VvpwHsR7RAobbrsUCM8AyZ5zu1Q0Q+aGAaQXRtV nLfB9vwDd7UtvFSX+XAvy4Ej8JRii3UqxXfz3HHRjP5Vn3/UvubgyY+yRlJfeKY5vCBx izoW43A0YYxFH5vCtSmXp6Ijbpzgn2LNnOOjXXBCjTbQ89jFIS8kf+PCFC0ZmaO3nuyr h8CgEK1v+h/h9rhg5NL059cblWMLLzKOAl0mUVWoVkoAkwsGRS71aDbJ+s6uh3DHHaOb WXNWWPKBVwFOZ4meM2pIFlW4IeM8Ob/EjxldW+E2eMZg9VdJK+89LRtRlSB17dk5N/4H OGfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=LtUyuDbx; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a71-20020a63904a000000b0042f6352ba2csi14312087pge.745.2022.09.13.17.55.46; Tue, 13 Sep 2022 17:56:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=LtUyuDbx; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229773AbiINAwV (ORCPT + 99 others); Tue, 13 Sep 2022 20:52:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49316 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229806AbiINAwP (ORCPT ); Tue, 13 Sep 2022 20:52:15 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 32A1A3E75B; Tue, 13 Sep 2022 17:52:14 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 43F29CE1382; Wed, 14 Sep 2022 00:52:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 49906C433C1; Wed, 14 Sep 2022 00:52:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1663116731; bh=HhfvOX/urEKCqD/galW5El2921ZPvKAuj3jSUQUgd0c=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=LtUyuDbx4rnXrkrCZ5oYFM/E73o1qDkpaZK4tlkv0/4OEtTHYGMiqt8uicQCfwdI2 tc5xXrvEGcLozpTNqgMMnaPdivZl2ZcwIvUK2lNGfovt4M4i0QVrmfHCc/I5wJtZQQ jHDF8U1rcBcvlSKgfoY4R7J5MIOf5KD06k0b2agU= Date: Tue, 13 Sep 2022 17:52:10 -0700 From: Andrew Morton To: Alexander Potapenko Cc: Eric Biggers , Herbert Xu , Robert Elliott , Stephen Rothwell , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-next@vger.kernel.org Subject: Re: [PATCH -next 1/2] x86: crypto: kmsan: revert !KMSAN dependencies Message-Id: <20220913175210.50945edb0738bf95300dc500@linux-foundation.org> In-Reply-To: <20220909095811.2166073-1-glider@google.com> References: <20220909095811.2166073-1-glider@google.com> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, 9 Sep 2022 11:58:10 +0200 Alexander Potapenko wrote: > This patch reverts "crypto: Kconfig: fix up for "crypto: kmsan: disable > accelerated configs under KMSAN" used by Stephen Rothwell to cleanly > merge KMSAN patches into linux-next. > > Because now arch-specific crypto configs reside in a separate Kconfig > file, we can disable them all by adding a single !KMSAN before including > that file (done in the following patch). > > Among others, this patch reverts !KMSAN check for > CONFIG_CRYPTO_AEGIS128_SIMD, which is ARM-only and is hence unnecessary, > because KMSAN does not support ARM yet. As I understand it, these patches are against linux-next and only linux-next because they pertain to linux-next's resolution of conflicts between the MM tree and the crypto tree? I'm not sure how to handle that, even if anyone wants to. How about you send an update to git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm's mm-unstable branch so the code which is there makes sense? Then we'll ask Stephen to redo the crypto tree resolution?