* [mmotm:master 298/396] kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash'
@ 2014-07-03 5:56 kbuild test robot
2014-07-03 6:13 ` Joe Perches
0 siblings, 1 reply; 3+ messages in thread
From: kbuild test robot @ 2014-07-03 5:56 UTC (permalink / raw)
To: Joe Perches
Cc: Linux Memory Management List, Andrew Morton, Johannes Weiner,
kbuild-all
Hi Joe,
It's probably a bug fix that unveils the link errors.
tree: git://git.cmpxchg.org/linux-mmotm.git master
head: 82b56f797fa200a5e9feac3a93cb6496909b9670
commit: f192fb3c695b607044d4476c822783a8ae10ce75 [298/396] sysctl-remove-now-unused-typedef-ctl_table-fix
config: make ARCH=arm prima2_defconfig
All error/warnings:
kernel/built-in.o: In function `kexec_calculate_store_digests':
>> kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash'
>> kernel/kexec.c:2223: undefined reference to `crypto_shash_update'
>> kernel/kexec.c:2238: undefined reference to `crypto_shash_update'
>> kernel/kexec.c:2253: undefined reference to `crypto_shash_final'
vim +2181 kernel/kexec.c
025d7537 Vivek Goyal 2014-07-02 2175 struct kexec_sha_region *sha_regions;
025d7537 Vivek Goyal 2014-07-02 2176 struct purgatory_info *pi = &image->purgatory_info;
025d7537 Vivek Goyal 2014-07-02 2177
025d7537 Vivek Goyal 2014-07-02 2178 zero_buf = __va(page_to_pfn(ZERO_PAGE(0)) << PAGE_SHIFT);
025d7537 Vivek Goyal 2014-07-02 2179 zero_buf_sz = PAGE_SIZE;
025d7537 Vivek Goyal 2014-07-02 2180
025d7537 Vivek Goyal 2014-07-02 @2181 tfm = crypto_alloc_shash("sha256", 0, 0);
025d7537 Vivek Goyal 2014-07-02 2182 if (IS_ERR(tfm)) {
025d7537 Vivek Goyal 2014-07-02 2183 ret = PTR_ERR(tfm);
025d7537 Vivek Goyal 2014-07-02 2184 goto out;
025d7537 Vivek Goyal 2014-07-02 2185 }
025d7537 Vivek Goyal 2014-07-02 2186
025d7537 Vivek Goyal 2014-07-02 2187 desc_size = crypto_shash_descsize(tfm) + sizeof(*desc);
025d7537 Vivek Goyal 2014-07-02 2188 desc = kzalloc(desc_size, GFP_KERNEL);
025d7537 Vivek Goyal 2014-07-02 2189 if (!desc) {
025d7537 Vivek Goyal 2014-07-02 2190 ret = -ENOMEM;
025d7537 Vivek Goyal 2014-07-02 2191 goto out_free_tfm;
025d7537 Vivek Goyal 2014-07-02 2192 }
025d7537 Vivek Goyal 2014-07-02 2193
025d7537 Vivek Goyal 2014-07-02 2194 sha_region_sz = KEXEC_SEGMENT_MAX * sizeof(struct kexec_sha_region);
025d7537 Vivek Goyal 2014-07-02 2195 sha_regions = vzalloc(sha_region_sz);
025d7537 Vivek Goyal 2014-07-02 2196 if (!sha_regions)
025d7537 Vivek Goyal 2014-07-02 2197 goto out_free_desc;
025d7537 Vivek Goyal 2014-07-02 2198
025d7537 Vivek Goyal 2014-07-02 2199 desc->tfm = tfm;
025d7537 Vivek Goyal 2014-07-02 2200 desc->flags = 0;
025d7537 Vivek Goyal 2014-07-02 2201
025d7537 Vivek Goyal 2014-07-02 2202 ret = crypto_shash_init(desc);
025d7537 Vivek Goyal 2014-07-02 2203 if (ret < 0)
025d7537 Vivek Goyal 2014-07-02 2204 goto out_free_sha_regions;
025d7537 Vivek Goyal 2014-07-02 2205
025d7537 Vivek Goyal 2014-07-02 2206 digest = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL);
025d7537 Vivek Goyal 2014-07-02 2207 if (!digest) {
025d7537 Vivek Goyal 2014-07-02 2208 ret = -ENOMEM;
025d7537 Vivek Goyal 2014-07-02 2209 goto out_free_sha_regions;
025d7537 Vivek Goyal 2014-07-02 2210 }
025d7537 Vivek Goyal 2014-07-02 2211
025d7537 Vivek Goyal 2014-07-02 2212 for (j = i = 0; i < image->nr_segments; i++) {
025d7537 Vivek Goyal 2014-07-02 2213 struct kexec_segment *ksegment;
025d7537 Vivek Goyal 2014-07-02 2214
025d7537 Vivek Goyal 2014-07-02 2215 ksegment = &image->segment[i];
025d7537 Vivek Goyal 2014-07-02 2216 /*
025d7537 Vivek Goyal 2014-07-02 2217 * Skip purgatory as it will be modified once we put digest
025d7537 Vivek Goyal 2014-07-02 2218 * info in purgatory.
025d7537 Vivek Goyal 2014-07-02 2219 */
025d7537 Vivek Goyal 2014-07-02 2220 if (ksegment->kbuf == pi->purgatory_buf)
025d7537 Vivek Goyal 2014-07-02 2221 continue;
025d7537 Vivek Goyal 2014-07-02 2222
025d7537 Vivek Goyal 2014-07-02 @2223 ret = crypto_shash_update(desc, ksegment->kbuf,
025d7537 Vivek Goyal 2014-07-02 2224 ksegment->bufsz);
025d7537 Vivek Goyal 2014-07-02 2225 if (ret)
025d7537 Vivek Goyal 2014-07-02 2226 break;
025d7537 Vivek Goyal 2014-07-02 2227
025d7537 Vivek Goyal 2014-07-02 2228 /*
025d7537 Vivek Goyal 2014-07-02 2229 * Assume rest of the buffer is filled with zero and
025d7537 Vivek Goyal 2014-07-02 2230 * update digest accordingly.
025d7537 Vivek Goyal 2014-07-02 2231 */
025d7537 Vivek Goyal 2014-07-02 2232 nullsz = ksegment->memsz - ksegment->bufsz;
025d7537 Vivek Goyal 2014-07-02 2233 while (nullsz) {
025d7537 Vivek Goyal 2014-07-02 2234 unsigned long bytes = nullsz;
025d7537 Vivek Goyal 2014-07-02 2235
025d7537 Vivek Goyal 2014-07-02 2236 if (bytes > zero_buf_sz)
025d7537 Vivek Goyal 2014-07-02 2237 bytes = zero_buf_sz;
025d7537 Vivek Goyal 2014-07-02 @2238 ret = crypto_shash_update(desc, zero_buf, bytes);
025d7537 Vivek Goyal 2014-07-02 2239 if (ret)
025d7537 Vivek Goyal 2014-07-02 2240 break;
025d7537 Vivek Goyal 2014-07-02 2241 nullsz -= bytes;
025d7537 Vivek Goyal 2014-07-02 2242 }
025d7537 Vivek Goyal 2014-07-02 2243
025d7537 Vivek Goyal 2014-07-02 2244 if (ret)
025d7537 Vivek Goyal 2014-07-02 2245 break;
025d7537 Vivek Goyal 2014-07-02 2246
025d7537 Vivek Goyal 2014-07-02 2247 sha_regions[j].start = ksegment->mem;
025d7537 Vivek Goyal 2014-07-02 2248 sha_regions[j].len = ksegment->memsz;
025d7537 Vivek Goyal 2014-07-02 2249 j++;
025d7537 Vivek Goyal 2014-07-02 2250 }
025d7537 Vivek Goyal 2014-07-02 2251
025d7537 Vivek Goyal 2014-07-02 2252 if (!ret) {
025d7537 Vivek Goyal 2014-07-02 @2253 ret = crypto_shash_final(desc, digest);
025d7537 Vivek Goyal 2014-07-02 2254 if (ret)
025d7537 Vivek Goyal 2014-07-02 2255 goto out_free_digest;
025d7537 Vivek Goyal 2014-07-02 2256 ret = kexec_purgatory_get_set_symbol(image, "sha_regions",
:::::: The code at line 2181 was first introduced by commit
:::::: 025d75374c9c08274f60da5802381a8ef7490388 kexec: load and relocate purgatory at kernel load time
:::::: TO: Vivek Goyal <vgoyal@redhat.com>
:::::: CC: Johannes Weiner <hannes@cmpxchg.org>
---
0-DAY kernel build testing backend Open Source Technology Center
http://lists.01.org/mailman/listinfo/kbuild Intel Corporation
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [mmotm:master 298/396] kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash' 2014-07-03 5:56 [mmotm:master 298/396] kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash' kbuild test robot @ 2014-07-03 6:13 ` Joe Perches 2014-07-03 14:29 ` Vivek Goyal 0 siblings, 1 reply; 3+ messages in thread From: Joe Perches @ 2014-07-03 6:13 UTC (permalink / raw) To: kbuild test robot, Vivek Goyal Cc: Linux Memory Management List, Andrew Morton, Johannes Weiner, kbuild-all On Thu, 2014-07-03 at 13:56 +0800, kbuild test robot wrote: > Hi Joe, Hi Fengguang. > It's probably a bug fix that unveils the link errors. I don't understand how the typedef removal matters here. Is this some sort of bisect false positive? > tree: git://git.cmpxchg.org/linux-mmotm.git master > head: 82b56f797fa200a5e9feac3a93cb6496909b9670 > commit: f192fb3c695b607044d4476c822783a8ae10ce75 [298/396] sysctl-remove-now-unused-typedef-ctl_table-fix > config: make ARCH=arm prima2_defconfig > > All error/warnings: > > kernel/built-in.o: In function `kexec_calculate_store_digests': > >> kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash' > >> kernel/kexec.c:2223: undefined reference to `crypto_shash_update' > >> kernel/kexec.c:2238: undefined reference to `crypto_shash_update' > >> kernel/kexec.c:2253: undefined reference to `crypto_shash_final' > > vim +2181 kernel/kexec.c > > 025d7537 Vivek Goyal 2014-07-02 2175 struct kexec_sha_region *sha_regions; > 025d7537 Vivek Goyal 2014-07-02 2176 struct purgatory_info *pi = &image->purgatory_info; > 025d7537 Vivek Goyal 2014-07-02 2177 > 025d7537 Vivek Goyal 2014-07-02 2178 zero_buf = __va(page_to_pfn(ZERO_PAGE(0)) << PAGE_SHIFT); > 025d7537 Vivek Goyal 2014-07-02 2179 zero_buf_sz = PAGE_SIZE; > 025d7537 Vivek Goyal 2014-07-02 2180 > 025d7537 Vivek Goyal 2014-07-02 @2181 tfm = crypto_alloc_shash("sha256", 0, 0); > 025d7537 Vivek Goyal 2014-07-02 2182 if (IS_ERR(tfm)) { > 025d7537 Vivek Goyal 2014-07-02 2183 ret = PTR_ERR(tfm); > 025d7537 Vivek Goyal 2014-07-02 2184 goto out; > 025d7537 Vivek Goyal 2014-07-02 2185 } > 025d7537 Vivek Goyal 2014-07-02 2186 > 025d7537 Vivek Goyal 2014-07-02 2187 desc_size = crypto_shash_descsize(tfm) + sizeof(*desc); > 025d7537 Vivek Goyal 2014-07-02 2188 desc = kzalloc(desc_size, GFP_KERNEL); > 025d7537 Vivek Goyal 2014-07-02 2189 if (!desc) { > 025d7537 Vivek Goyal 2014-07-02 2190 ret = -ENOMEM; > 025d7537 Vivek Goyal 2014-07-02 2191 goto out_free_tfm; > 025d7537 Vivek Goyal 2014-07-02 2192 } > 025d7537 Vivek Goyal 2014-07-02 2193 > 025d7537 Vivek Goyal 2014-07-02 2194 sha_region_sz = KEXEC_SEGMENT_MAX * sizeof(struct kexec_sha_region); > 025d7537 Vivek Goyal 2014-07-02 2195 sha_regions = vzalloc(sha_region_sz); > 025d7537 Vivek Goyal 2014-07-02 2196 if (!sha_regions) > 025d7537 Vivek Goyal 2014-07-02 2197 goto out_free_desc; > 025d7537 Vivek Goyal 2014-07-02 2198 > 025d7537 Vivek Goyal 2014-07-02 2199 desc->tfm = tfm; > 025d7537 Vivek Goyal 2014-07-02 2200 desc->flags = 0; > 025d7537 Vivek Goyal 2014-07-02 2201 > 025d7537 Vivek Goyal 2014-07-02 2202 ret = crypto_shash_init(desc); > 025d7537 Vivek Goyal 2014-07-02 2203 if (ret < 0) > 025d7537 Vivek Goyal 2014-07-02 2204 goto out_free_sha_regions; > 025d7537 Vivek Goyal 2014-07-02 2205 > 025d7537 Vivek Goyal 2014-07-02 2206 digest = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL); > 025d7537 Vivek Goyal 2014-07-02 2207 if (!digest) { > 025d7537 Vivek Goyal 2014-07-02 2208 ret = -ENOMEM; > 025d7537 Vivek Goyal 2014-07-02 2209 goto out_free_sha_regions; > 025d7537 Vivek Goyal 2014-07-02 2210 } > 025d7537 Vivek Goyal 2014-07-02 2211 > 025d7537 Vivek Goyal 2014-07-02 2212 for (j = i = 0; i < image->nr_segments; i++) { > 025d7537 Vivek Goyal 2014-07-02 2213 struct kexec_segment *ksegment; > 025d7537 Vivek Goyal 2014-07-02 2214 > 025d7537 Vivek Goyal 2014-07-02 2215 ksegment = &image->segment[i]; > 025d7537 Vivek Goyal 2014-07-02 2216 /* > 025d7537 Vivek Goyal 2014-07-02 2217 * Skip purgatory as it will be modified once we put digest > 025d7537 Vivek Goyal 2014-07-02 2218 * info in purgatory. > 025d7537 Vivek Goyal 2014-07-02 2219 */ > 025d7537 Vivek Goyal 2014-07-02 2220 if (ksegment->kbuf == pi->purgatory_buf) > 025d7537 Vivek Goyal 2014-07-02 2221 continue; > 025d7537 Vivek Goyal 2014-07-02 2222 > 025d7537 Vivek Goyal 2014-07-02 @2223 ret = crypto_shash_update(desc, ksegment->kbuf, > 025d7537 Vivek Goyal 2014-07-02 2224 ksegment->bufsz); > 025d7537 Vivek Goyal 2014-07-02 2225 if (ret) > 025d7537 Vivek Goyal 2014-07-02 2226 break; > 025d7537 Vivek Goyal 2014-07-02 2227 > 025d7537 Vivek Goyal 2014-07-02 2228 /* > 025d7537 Vivek Goyal 2014-07-02 2229 * Assume rest of the buffer is filled with zero and > 025d7537 Vivek Goyal 2014-07-02 2230 * update digest accordingly. > 025d7537 Vivek Goyal 2014-07-02 2231 */ > 025d7537 Vivek Goyal 2014-07-02 2232 nullsz = ksegment->memsz - ksegment->bufsz; > 025d7537 Vivek Goyal 2014-07-02 2233 while (nullsz) { > 025d7537 Vivek Goyal 2014-07-02 2234 unsigned long bytes = nullsz; > 025d7537 Vivek Goyal 2014-07-02 2235 > 025d7537 Vivek Goyal 2014-07-02 2236 if (bytes > zero_buf_sz) > 025d7537 Vivek Goyal 2014-07-02 2237 bytes = zero_buf_sz; > 025d7537 Vivek Goyal 2014-07-02 @2238 ret = crypto_shash_update(desc, zero_buf, bytes); > 025d7537 Vivek Goyal 2014-07-02 2239 if (ret) > 025d7537 Vivek Goyal 2014-07-02 2240 break; > 025d7537 Vivek Goyal 2014-07-02 2241 nullsz -= bytes; > 025d7537 Vivek Goyal 2014-07-02 2242 } > 025d7537 Vivek Goyal 2014-07-02 2243 > 025d7537 Vivek Goyal 2014-07-02 2244 if (ret) > 025d7537 Vivek Goyal 2014-07-02 2245 break; > 025d7537 Vivek Goyal 2014-07-02 2246 > 025d7537 Vivek Goyal 2014-07-02 2247 sha_regions[j].start = ksegment->mem; > 025d7537 Vivek Goyal 2014-07-02 2248 sha_regions[j].len = ksegment->memsz; > 025d7537 Vivek Goyal 2014-07-02 2249 j++; > 025d7537 Vivek Goyal 2014-07-02 2250 } > 025d7537 Vivek Goyal 2014-07-02 2251 > 025d7537 Vivek Goyal 2014-07-02 2252 if (!ret) { > 025d7537 Vivek Goyal 2014-07-02 @2253 ret = crypto_shash_final(desc, digest); > 025d7537 Vivek Goyal 2014-07-02 2254 if (ret) > 025d7537 Vivek Goyal 2014-07-02 2255 goto out_free_digest; > 025d7537 Vivek Goyal 2014-07-02 2256 ret = kexec_purgatory_get_set_symbol(image, "sha_regions", > > :::::: The code at line 2181 was first introduced by commit > :::::: 025d75374c9c08274f60da5802381a8ef7490388 kexec: load and relocate purgatory at kernel load time > > :::::: TO: Vivek Goyal <vgoyal@redhat.com> > :::::: CC: Johannes Weiner <hannes@cmpxchg.org> > > --- > 0-DAY kernel build testing backend Open Source Technology Center > http://lists.01.org/mailman/listinfo/kbuild Intel Corporation -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [mmotm:master 298/396] kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash' 2014-07-03 6:13 ` Joe Perches @ 2014-07-03 14:29 ` Vivek Goyal 0 siblings, 0 replies; 3+ messages in thread From: Vivek Goyal @ 2014-07-03 14:29 UTC (permalink / raw) To: Joe Perches Cc: kbuild test robot, Linux Memory Management List, Andrew Morton, Johannes Weiner, kbuild-all On Wed, Jul 02, 2014 at 11:13:38PM -0700, Joe Perches wrote: > On Thu, 2014-07-03 at 13:56 +0800, kbuild test robot wrote: > > Hi Joe, > > Hi Fengguang. > > > It's probably a bug fix that unveils the link errors. > > I don't understand how the typedef removal matters here. > Is this some sort of bisect false positive? > > > tree: git://git.cmpxchg.org/linux-mmotm.git master > > head: 82b56f797fa200a5e9feac3a93cb6496909b9670 > > commit: f192fb3c695b607044d4476c822783a8ae10ce75 [298/396] sysctl-remove-now-unused-typedef-ctl_table-fix > > config: make ARCH=arm prima2_defconfig > > > > All error/warnings: > > > > kernel/built-in.o: In function `kexec_calculate_store_digests': > > >> kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash' > > >> kernel/kexec.c:2223: undefined reference to `crypto_shash_update' > > >> kernel/kexec.c:2238: undefined reference to `crypto_shash_update' > > >> kernel/kexec.c:2253: undefined reference to `crypto_shash_final' I think these errors are happening because of kexe changes. Now kexec requires CRYPTO and CRYPTO_SHA256. I did the change for x86 but not for other arches supporting kexec. Just now I sent a patch to fix these errors. Inlining same patch here again for reference. I think this patch should fix it. Subject: kexec: set CRYPTO=y and CRYPTO_SHA256=y for all arch supporting kexec Generic kexec implementation now makes use of crypto API to calculate the sha256 digest of loaded kernel segments (for new syscall kexec_file_load()). That means one need to enforce that CRYPTO and CRYPTO_SHA256 are built in for kexec to compile and for new syscall to work. I created this dependency for x86 but forgot to do for other arches supporting kexec. And ran into compilation failure reports from kbuild test robot. kernel/built-in.o: In function `sys_kexec_file_load': (.text+0x32314): undefined reference to `crypto_shash_final' kernel/built-in.o: In function `sys_kexec_file_load': (.text+0x32328): undefined reference to `crypto_shash_update' kernel/built-in.o: In function `sys_kexec_file_load': >> (.text+0x32338): undefined reference to `crypto_alloc_shash' Signed-off-by: Vivek Goyal <vgoyal@redhat.com> --- arch/arm/Kconfig | 2 ++ arch/ia64/Kconfig | 2 ++ arch/m68k/Kconfig | 2 ++ arch/mips/Kconfig | 2 ++ arch/powerpc/Kconfig | 2 ++ arch/s390/Kconfig | 2 ++ arch/sh/Kconfig | 2 ++ arch/tile/Kconfig | 2 ++ 8 files changed, 16 insertions(+) Index: linux-2.6/arch/s390/Kconfig =================================================================== --- linux-2.6.orig/arch/s390/Kconfig 2014-07-03 09:32:29.866684834 -0400 +++ linux-2.6/arch/s390/Kconfig 2014-07-03 09:41:40.918646043 -0400 @@ -48,6 +48,8 @@ config ARCH_SUPPORTS_DEBUG_PAGEALLOC config KEXEC def_bool y + select CRYPTO + select CRYPTO_SHA256 config AUDIT_ARCH def_bool y Index: linux-2.6/arch/powerpc/Kconfig =================================================================== --- linux-2.6.orig/arch/powerpc/Kconfig 2014-07-03 09:32:29.866684834 -0400 +++ linux-2.6/arch/powerpc/Kconfig 2014-07-03 09:41:40.918646043 -0400 @@ -397,6 +397,8 @@ config PPC64_SUPPORTS_MEMORY_FAILURE config KEXEC bool "kexec system call" depends on (PPC_BOOK3S || FSL_BOOKE || (44x && !SMP)) + select CRYPTO + select CRYPTO_SHA256 help kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot Index: linux-2.6/arch/arm/Kconfig =================================================================== --- linux-2.6.orig/arch/arm/Kconfig 2014-07-03 09:32:29.866684834 -0400 +++ linux-2.6/arch/arm/Kconfig 2014-07-03 09:41:40.919646043 -0400 @@ -2050,6 +2050,8 @@ config XIP_PHYS_ADDR config KEXEC bool "Kexec system call (EXPERIMENTAL)" depends on (!SMP || PM_SLEEP_SMP) + select CRYPTO + select CRYPTO_SHA256 help kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot Index: linux-2.6/arch/m68k/Kconfig =================================================================== --- linux-2.6.orig/arch/m68k/Kconfig 2014-07-03 09:32:29.866684834 -0400 +++ linux-2.6/arch/m68k/Kconfig 2014-07-03 09:41:40.919646043 -0400 @@ -91,6 +91,8 @@ config MMU_SUN3 config KEXEC bool "kexec system call" depends on M68KCLASSIC + select CRYPTO + select CRYPTO_SHA256 help kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot Index: linux-2.6/arch/ia64/Kconfig =================================================================== --- linux-2.6.orig/arch/ia64/Kconfig 2014-06-24 15:56:04.045803541 -0400 +++ linux-2.6/arch/ia64/Kconfig 2014-07-03 09:51:00.615606643 -0400 @@ -547,6 +547,8 @@ source "drivers/sn/Kconfig" config KEXEC bool "kexec system call" depends on !IA64_HP_SIM && (!SMP || HOTPLUG_CPU) + select CRYPTO + select CRYPTO_SHA256 help kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot Index: linux-2.6/arch/mips/Kconfig =================================================================== --- linux-2.6.orig/arch/mips/Kconfig 2014-06-30 16:17:09.974221907 -0400 +++ linux-2.6/arch/mips/Kconfig 2014-07-03 09:54:49.371590540 -0400 @@ -2392,6 +2392,8 @@ source "kernel/Kconfig.preempt" config KEXEC bool "Kexec system call" + select CRYPTO + select CRYPTO_SHA256 help kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot Index: linux-2.6/arch/sh/Kconfig =================================================================== --- linux-2.6.orig/arch/sh/Kconfig 2014-06-24 15:56:04.906803481 -0400 +++ linux-2.6/arch/sh/Kconfig 2014-07-03 09:59:31.849570655 -0400 @@ -596,6 +596,8 @@ source kernel/Kconfig.hz config KEXEC bool "kexec system call (EXPERIMENTAL)" depends on SUPERH32 && MMU + select CRYPTO + select CRYPTO_SHA256 help kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot Index: linux-2.6/arch/tile/Kconfig =================================================================== --- linux-2.6.orig/arch/tile/Kconfig 2014-06-24 15:56:05.086803468 -0400 +++ linux-2.6/arch/tile/Kconfig 2014-07-03 10:02:45.223557043 -0400 @@ -192,6 +192,8 @@ source "kernel/Kconfig.hz" config KEXEC bool "kexec system call" + select CRYPTO + select CRYPTO_SHA256 ---help--- kexec is a system call that implements the ability to shutdown your current kernel, and to start another kernel. It is like a reboot Thanks Vivek -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-07-03 14:29 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2014-07-03 5:56 [mmotm:master 298/396] kernel/kexec.c:2181: undefined reference to `crypto_alloc_shash' kbuild test robot 2014-07-03 6:13 ` Joe Perches 2014-07-03 14:29 ` Vivek Goyal
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).