Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1549837ybl; Tue, 3 Dec 2019 08:52:24 -0800 (PST) X-Google-Smtp-Source: APXvYqzbmNWjKvi7hsW0Yz7fviYDXomsXHZaYKgWUnd5w6AaSKBMZDnNpuOxLlKPlNZT0+zEpy5s X-Received: by 2002:a54:451a:: with SMTP id l26mr4502455oil.69.1575391944842; Tue, 03 Dec 2019 08:52:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575391944; cv=none; d=google.com; s=arc-20160816; b=tCAJQ3AHbLaj49q/NFwCY/h72Bm9ZiRLsva01Q0heTjT31KYwROpsbntwiqsm+ynCH pPrvfwjQwHtTBDTt1zWIplubGwYsL5lla+Bs2q52GiwqicMI/F1tnsbkHRddxBivyn0X sEGiGwGSZbwq5koZKO1PavNbsxxEoA9/yvvK8iT/ExnDrdxKCOEjPyJJ0P/pj1V6GR3z 9cLuc4IbRZnlXfKxIBumAvP9WML0cKIeSCSouTzuJ57jllEhl8KqtKDrSiRl9P4d5EeH pYfsdhhFLNgDAd1XU8/6Sp3Dfbi6A101XXbZi3oG07yIPB52qxHxONWWz9OiQFUg2niM Oy7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature; bh=HJS959zgmPYJyxTarDK0UTqD7NIvOQe4pOWpkFPCo6E=; b=CITD/NJ+6MQUIUvTVzjjPCepVTW7k4tNUu710fkOqO6CMXqzdxTfcUwrM8eKXpAZJA 0Vi+Ln1YilkrmFuvzgn8Qjkw6+OSFtVwfjVuyjzgWcRSUs0V1yiLolkTc8RMQ3F9ryXF 1UkU5u22ML0zNsgxbJmVmdyPJpBvod/6+kWX3t1/VfpmXtKKW1Kll4rjL4RifFToiPJx WTCMdwGyT57PhEBJ3N3eyGPdbo5dfrv8uyKmoIBFPBv9DhdE56on+3pxqcLflNHMc3Bm k0FJDKrD2VoRiDgiXshPyZR6Fsa2DJCbMxS/Yfc7Ba2fNN5grVHUc7N8KZI07XwR7mLr OzSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=f0y0Kbyq; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i206si1606515oif.173.2019.12.03.08.52.12; Tue, 03 Dec 2019 08:52:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=f0y0Kbyq; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726482AbfLCQuY (ORCPT + 99 others); Tue, 3 Dec 2019 11:50:24 -0500 Received: from userp2130.oracle.com ([156.151.31.86]:56044 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726553AbfLCQuY (ORCPT ); Tue, 3 Dec 2019 11:50:24 -0500 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xB3GiA7j026421; Tue, 3 Dec 2019 16:50:19 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2019-08-05; bh=HJS959zgmPYJyxTarDK0UTqD7NIvOQe4pOWpkFPCo6E=; b=f0y0KbyqiYVleSwkag0m4d3+2cuCmLrHkKCO4pkchOr4ZBYgGzPqQqduIKiRBtl/tUlH 93vVzHZ5OzASrJmqAImUGnH+ILhrrbuIx5BNAtKOsT1ikLgDI53Kz1qLKG+9ULhYx6IF DeO9+XwfFeCm58mCxvADaDeWU0gSX9G1S91ROqsvyiWBY2Cqd7vv+D4oGvHseMKl5tYM wCLbRmaYvPJIKfl6Lwl6duOk27oevJm6vlC8kAC/ZFo4WduKATgrsOLmBY30nmcrjWq5 PA6ABgS5vxAabZQEqY72bH8U5PE9pL7xXLDlVmsZRVS40bSGkQnBEgwKyTFgS11Wa8Ce IQ== Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80]) by userp2130.oracle.com with ESMTP id 2wkfuu9579-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 03 Dec 2019 16:50:18 +0000 Received: from pps.filterd (userp3030.oracle.com [127.0.0.1]) by userp3030.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xB3Gi4ek083026; Tue, 3 Dec 2019 16:50:18 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by userp3030.oracle.com with ESMTP id 2wn7pqbwqq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 03 Dec 2019 16:50:18 +0000 Received: from abhmp0005.oracle.com (abhmp0005.oracle.com [141.146.116.11]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id xB3GoGqn011627; Tue, 3 Dec 2019 16:50:16 GMT Received: from anon-dhcp-152.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 03 Dec 2019 08:50:15 -0800 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: [PATCH] nfsd: depend on CRYPTO_MD5 for legacy client tracking From: Chuck Lever In-Reply-To: Date: Tue, 3 Dec 2019 11:50:14 -0500 Cc: Linux NFS Mailing List , Bruce Fields Content-Transfer-Encoding: 7bit Message-Id: <6B0AEF69-ED97-4031-9511-7DC9A16802B7@oracle.com> References: To: Patrick Steinhardt X-Mailer: Apple Mail (2.3445.104.11) X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9460 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1911140001 definitions=main-1912030125 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9460 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1911140001 definitions=main-1912030125 Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hi Patrick- > On Dec 3, 2019, at 1:52 AM, Patrick Steinhardt wrote: > > The legacy client tracking infrastructure of nfsd makes use of MD5 to > derive a client's recovery directory name. As the nfsd module doesn't > declare any dependency on CRYPTO_MD5, though, it may fail to allocate > the hash if the kernel was compiled without it. As a result, generation > of client recovery directories will fail with the following error: > > NFSD: unable to generate recoverydir name > > The dependency was removed as a seemingly redundant dependency back in > 6aaa67b5f3b9 (NFSD: Remove redundant "select" clauses in fs/Kconfig > 2008-02-11). But in fact, even then the MD5 module was pulled in only > when RPCSEC_GSS_KRB5 or RPCSEC_GSS_KRB5 was selected. > > Fix the issue by adding back an explicit dependency on CRYPTO_MD5. > > Fixes: 6aaa67b5f3b9 (NFSD: Remove redundant "select" clauses in fs/Kconfig) Just a quibble with your Fixes: tag. At that time, selecting NFSv4 support did bring in CRYPTO, because NFSv4 support always selected RPCSEC_GSS_KRB5. It was a later commit that removed RPCSEC_GSS_KRB5: df486a25900f ("NFS: Fix the selection of security flavours in Kconfig") > Signed-off-by: Patrick Steinhardt > --- > fs/nfsd/Kconfig | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/fs/nfsd/Kconfig b/fs/nfsd/Kconfig > index c4b1a89b8845..f2f81561ebb6 100644 > --- a/fs/nfsd/Kconfig > +++ b/fs/nfsd/Kconfig > @@ -73,6 +73,7 @@ config NFSD_V4 > select NFSD_V3 > select FS_POSIX_ACL > select SUNRPC_GSS > + select CRYPTO_MD5 > select CRYPTO_SHA256 > select GRACE_PERIOD > help > -- > 2.24.0 > -- Chuck Lever