Received: by 2002:ab2:60d1:0:b0:1f7:5705:b850 with SMTP id i17csp606305lqm; Wed, 1 May 2024 10:02:15 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWH0pQUvpkLuCeKREwI1U/4E9r1JKdpsdJPnaH3QPIxQuqsGY8ECz1/42/ZT6UdrhtXNvhYYm2Nthx/OY/pug25bSBDm7EzRVk9q+TLiQ== X-Google-Smtp-Source: AGHT+IGDqK5tTRvSA9OOJR7uJAmm3tdoxES6c1M04FfskOP1spEisB/1HxVrt5MLtX1MPViDclSA X-Received: by 2002:a05:6358:7f1b:b0:186:5cb:30d6 with SMTP id p27-20020a0563587f1b00b0018605cb30d6mr3669966rwn.10.1714582934843; Wed, 01 May 2024 10:02:14 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714582934; cv=pass; d=google.com; s=arc-20160816; b=mpqkQXsXIqu0YQK6GHoPzCcrCscAYA48s/srYIUZtWGrJ5SFAkwqVoc4V1pLtiILxP krIskVDuqXHdtPHKz71dXQa5rTJeEU2CA114sRnUF+B6oIcujdzacbbhj7h7gJl9IRpP 9OnBvF5xsc4ZRm8uIh2Qk/Zwc6lHLFNU2HAgJkmfGnbGmDqxr/u9K6gCiW5nbvhdb+q8 Y5+yoJCOu/r/93jlQeDX8oawJ6TgHd+jew8q6GRvqgdabv4Wx4CrAzzCH9ty9HDgBBnI jB+/dcN5kAbDDmsOaylN4PZl8bS2HPclzDCvlwDbjmmIoa6OchNXI75R2hxK6XqU+IR3 F4tQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :content-transfer-encoding:message-id:date:subject:cc:to:from :dkim-signature; bh=udk0F/KA0u3ymt82al7pZ6iIYBODYjSafKhMsfUmCeg=; fh=C5VNuWhHxxppQ5oWRlQeGW4qKLwIzcPmTI1zohW9a+U=; b=Jctz/2/G9kK/eoBK1fVNOvZPtjYLrGYKvkpHAEPYm40XTPy4Pmti5nWTmRgR2kU332 Qs7TjgTdeEkEwIYSkYC30kLjVt+oaraT8+dCEJlTesxD1ChxcQD1oagzK4bloHIWD/Co 1OTBL2nCGl6kzvaagHJys/Iiz2B57kOfq0UvtRHGwi+lpsO+ngOzZIKx5/NkdAW67fDt RdJVuyHX0JAHXUWBVUlSB13j3KYAQcFv/Ow0/DypfJyR92IaIpNObI1G/g8XTP8JWMJF YR30kuxarrK3qs7H6683VYDztWdbdO5yyxWV9epZ0RNvnYqNS0Qh769elTAN9F0LAZnn 5JjA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@meta.com header.s=s2048-2021-q4 header.b=mVFS2axn; arc=pass (i=1 spf=pass spfdomain=meta.com dkim=pass dkdomain=meta.com dmarc=pass fromdomain=meta.com); spf=pass (google.com: domain of linux-crypto+bounces-3994-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3994-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=meta.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id s21-20020a634515000000b005e42b4c97f2si24163504pga.289.2024.05.01.10.02.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 May 2024 10:02:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto+bounces-3994-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@meta.com header.s=s2048-2021-q4 header.b=mVFS2axn; arc=pass (i=1 spf=pass spfdomain=meta.com dkim=pass dkdomain=meta.com dmarc=pass fromdomain=meta.com); spf=pass (google.com: domain of linux-crypto+bounces-3994-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3994-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=meta.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 6F70B282B89 for ; Wed, 1 May 2024 17:02:14 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 54B5E17C64; Wed, 1 May 2024 17:02:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com header.b="mVFS2axn" X-Original-To: linux-crypto@vger.kernel.org Received: from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6C14AFBEA; Wed, 1 May 2024 17:02:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=67.231.153.30 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714582928; cv=none; b=gLVzKAX//LGG3zz0tVCNLCEEyMUbbG4RJ2fEb5mV3WIz3mH1FAw4yeQWQPMIhz8I0LQ+HEKy3me4dKjqX2Obje/X7nHgDWHEvva1tTk+Uz8uJR6QwWEyTQ0bTFR5lFJBBulmpxxL5OjePI5qZgkJuoRYQKQ2MYKgwv2/4HeJK14= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714582928; c=relaxed/simple; bh=ybzwn+ydfIFK+DqICo0Legpr8uBh0C4IME5KILc5CxY=; h=From:To:CC:Subject:Date:Message-ID:Content-Type:MIME-Version; b=cbtgj/vRd7bmhCiT3TwXxCn31ne98zMsVLkET7zhocZAwf2J75W+Am4hZCZfDQlpRfdC6vajB0Aae0B6DTJnmN/SRpcnPWngSIYR3nWNinzQokhwmj1MD8xQ+kmbZlpUNA6JnGfsOdD/O3wBqYCL+XKepJcRr+RQvxxkOHjplpo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=meta.com; spf=pass smtp.mailfrom=meta.com; dkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com header.b=mVFS2axn; arc=none smtp.client-ip=67.231.153.30 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=meta.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=meta.com Received: from pps.filterd (m0148460.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 441G3SVd030744; Wed, 1 May 2024 10:01:54 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=from : to : cc : subject : date : message-id : content-type : content-transfer-encoding : mime-version; s=s2048-2021-q4; bh=udk0F/KA0u3ymt82al7pZ6iIYBODYjSafKhMsfUmCeg=; b=mVFS2axnHcM/GWx4hue24joAQUaeQgUZJLERqTmckQqTChddNotTqiGk1+JPkGRN791s O1Vl8bFf7KFEo3MFdwkRLnH33JV+a9bjRfPQOEPOZkzQr9GFN7vMfeQErLQ+EoOIUUqK 6C3xZzPE1RSqnd1nRdvp8DVtIkhQ1cuSj5BqQG8jPsVEH8ad3Bskbz3eSnZPYOq5ofuq Uh9Cu6pBMwyz0mn4GkQcq1hyhG4Jj9S+7p4ayZETYVs5MKgQ7hkhmVBhFpdbZX2AuLuG NFVkxx38/rL1VxxRbvbOckwwhJEJ1g0S0FnFas/whUUP0edKq/MeBmkFaqEGOAWkiF2Y vw== Received: from maileast.thefacebook.com ([163.114.130.16]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 3xuqv18xud-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Wed, 01 May 2024 10:01:53 -0700 Received: from devvm4158.cln0.facebook.com (2620:10d:c0a8:fe::f072) by mail.thefacebook.com (2620:10d:c0a8:83::8) with Microsoft SMTP Server id 15.1.2507.35; Wed, 1 May 2024 17:01:52 +0000 From: Vadim Fedorenko To: Vadim Fedorenko , Jakub Kicinski , Martin KaFai Lau , Andrii Nakryiko , Alexei Starovoitov , Mykola Lysenko , Herbert Xu CC: Vadim Fedorenko , , , , kernel test robot Subject: [PATCH bpf-next] bpf: crypto: fix build when CONFIG_CRYPTO=m Date: Wed, 1 May 2024 10:01:30 -0700 Message-ID: <20240501170130.1682309-1-vadfed@meta.com> X-Mailer: git-send-email 2.43.0 Content-Type: text/plain X-Proofpoint-GUID: Llnlnv5e43kv2K0G7cdRIdhWpImmv_eA X-Proofpoint-ORIG-GUID: Llnlnv5e43kv2K0G7cdRIdhWpImmv_eA Content-Transfer-Encoding: 8bit X-Proofpoint-UnRewURL: 0 URL was un-rewritten Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1011,Hydra:6.0.650,FMLib:17.11.176.26 definitions=2024-05-01_16,2024-04-30_01,2023-05-22_02 Crypto subsytem can be build as a module. In this case we still have to build BPF crypto framework otherwise the build will fail. Fixes: 3e1c6f35409f ("bpf: make common crypto API for TC/XDP programs") Reported-by: kernel test robot Closes: https://lore.kernel.org/oe-kbuild-all/202405011634.4JK40epY-lkp@intel.com/ Signed-off-by: Vadim Fedorenko --- kernel/bpf/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/bpf/Makefile b/kernel/bpf/Makefile index 85786fd97d2a..7eb9ad3a3ae6 100644 --- a/kernel/bpf/Makefile +++ b/kernel/bpf/Makefile @@ -44,7 +44,7 @@ obj-$(CONFIG_BPF_SYSCALL) += bpf_struct_ops.o obj-$(CONFIG_BPF_SYSCALL) += cpumask.o obj-${CONFIG_BPF_LSM} += bpf_lsm.o endif -ifeq ($(CONFIG_CRYPTO),y) +ifneq ($(CONFIG_CRYPTO),) obj-$(CONFIG_BPF_SYSCALL) += crypto.o endif obj-$(CONFIG_BPF_PRELOAD) += preload/ -- 2.43.0