From patchwork Tue Jan 17 03:47:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Rothwell X-Patchwork-Id: 13104152 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 63B05C677F1 for ; Tue, 17 Jan 2023 03:47:59 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235348AbjAQDr5 (ORCPT ); Mon, 16 Jan 2023 22:47:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45892 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235121AbjAQDr4 (ORCPT ); Mon, 16 Jan 2023 22:47:56 -0500 Received: from gandalf.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C701922DC5; Mon, 16 Jan 2023 19:47:54 -0800 (PST) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4Nwvx00xGvz4xG5; Tue, 17 Jan 2023 14:47:48 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canb.auug.org.au; s=201702; t=1673927268; bh=pdT0tLO8GhTYnyOobd7AHS4rLZhzpys/XxIhDrVwTQE=; h=Date:From:To:Cc:Subject:From; b=cEF0eu2Lw5aegSx7hGanxUhFFwulU0oLGRKzDX7StCDPirx2Abu/ytDSH084deiY7 0z/FDrubl8A/sJMWjvQUUlgCAdTrcAzoOKiE8PY3dHCZLToxTdMAOkXNvsVi3kQYa2 Z7+lGjW01f/8Kvfy3lOv3AQhHhxO6Qxb4iO8z1JGBtr2g6azOGXgZOqgseK6bzFVqP CV/C27yiGepyyLOvIuMHs/EhD+MgBM/DYHhse/55OFeSJ38FLztC92pSOp6zCGXTFL RF435i6MR6FINTJcMmn8kgsbx8nHJId1zOfw44IdKlanWq8Jd9SDDPrScs/UJrJBLz 6WmWN7eIklSfg== Date: Tue, 17 Jan 2023 14:47:47 +1100 From: Stephen Rothwell To: Herbert Xu , Linux Crypto List Cc: Danny Tsen , Michael Ellerman , PowerPC , Linux Kernel Mailing List , Linux Next Mailing List Subject: linux-next: build failure after merge of the crypto tree Message-ID: <20230117144747.37115c52@canb.auug.org.au> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi all, After merging the crypto tree, today's linux-next build (powerpc pseries_le_defconfig) failed like this: arch/powerpc/crypto/p10_aes_gcm.o: warning: objtool: .text+0x884: unannotated intra-function call arch/powerpc/crypto/aesp8-ppc.o: warning: objtool: aes_p8_set_encrypt_key+0x44: unannotated intra-function call ld: arch/powerpc/crypto/p10_aes_gcm.o: ABI version 1 is not compatible with ABI version 2 output ld: failed to merge target specific data of file arch/powerpc/crypto/p10_aes_gcm.o Caused by commit ca68a96c37eb ("crypto: p10-aes-gcm - An accelerated AES/GCM stitched implementation") I have applied the following hack for today. From: Stephen Rothwell Date: Tue, 17 Jan 2023 14:41:10 +1100 Subject: [PATCH] crypto: p10-aes-gcm - only ABIv1 code has been implemented Signed-off-by: Stephen Rothwell --- arch/powerpc/crypto/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/powerpc/crypto/Kconfig b/arch/powerpc/crypto/Kconfig index db7d99383993..36928ad14a6b 100644 --- a/arch/powerpc/crypto/Kconfig +++ b/arch/powerpc/crypto/Kconfig @@ -97,6 +97,7 @@ config CRYPTO_AES_PPC_SPE config CRYPTO_P10_AES_GCM tristate "Stitched AES/GCM acceleration support on P10+ CPU (PPC)" depends on PPC64 + depends on PPC64_ELF_ABI_V1 select CRYPTO_LIB_AES select CRYPTO_ALGAPI select CRYPTO_AEAD