Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp450708pxb; Fri, 16 Apr 2021 09:25:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyYeBuDh2VYQJD8Zg4BBTxg0y3JyjSWRbfpOQahBaiFyINebyMRJ3zYOmYiXsG32z+q9QM0 X-Received: by 2002:a17:906:9bd3:: with SMTP id de19mr8804370ejc.329.1618590339616; Fri, 16 Apr 2021 09:25:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618590339; cv=none; d=google.com; s=arc-20160816; b=H03g5pl3fSjM/ePbVJCh1JBNGUfU1F9Glkjx/qfX4SbjZhc3fNsKOonF2jhjfylVCG Hoaqr8QsX4gp5yxW5YFXTgPmAbXwUVSmefPzccJW0yh2VLSJLacBEMfyWmNfrLOiNM9W BWwAh7+EZrYwukxXfrBR6TGKI3omSCFEN1OiQXTH1qh52N4LnerM8FW3zHLuZE3nIndU WNi9/YmwTA8bmk3jkJptEtUthZgQZWuHrxxCedgv6wWRmip1z2DmlhiM/rKTZufAiESv N2gRAbLb+wsQg83fUhgYsY5+JOGMp0RR+e3m0SHwT2N9XdG7hwIay+rQudUuHjTso2Ae PZSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=AcisDmF7RRirF+w2fW2GFDYCPuGR5Tm8Yzl/9iWkEdE=; b=ZUhsqYlDWgksKv1MSyw/QNA1EvQmQC2gBYfXp7WfPG7IzI98MvNbgWNs9b6CGRYtxx krx1StVUubWKbBOM9DxBGywbR0xI/0NxfLJiAXHvqAefAB02cOlf/+0Aywtam5qM/06Q zwxC5nbZOGX8GZ4BsctW3snhwplvHWto1F1pIKTbCsjw8/CLFN2npB/ElePJtCvbUvBR ucmKvsnd0DaMwbwutZbn3BcTMBo5eZ0rSlfWCmm8lc0aGhCQTjg933cEeERvSd1Tvei8 ocIRldRnxxSyGQ5jCT9f+JM8c/QVW9SK4snY/RhezYrLrDv6vOBIQ3TpcZJAjXHiNCmk CQCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Y6gVbgDx; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p8si5396622edj.611.2021.04.16.09.25.12; Fri, 16 Apr 2021 09:25:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Y6gVbgDx; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239767AbhDPQHV (ORCPT + 99 others); Fri, 16 Apr 2021 12:07:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:37438 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239183AbhDPQHU (ORCPT ); Fri, 16 Apr 2021 12:07:20 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 24F9C6113D; Fri, 16 Apr 2021 16:06:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1618589215; bh=rTkLI/G7keGXQVgDyrI7UE8GeDTwoxdlSggyy76+H4g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Y6gVbgDxaz/ZztWn7rWw5DW6/Swqkno/dGBQ0fhO3aHMiuaY/kd/YOVkyCU4suAio fm6sZKg1DezRKaqo0OSX/WYpxo4nvopfoUd5t9BMaL34lQBU3EJy1bXzwRWPUJPnef 0xZ351NAknAzONLoPA/txYI2w2KytoQZ5W5WzMdHi+aph0HIuQZhAhpVdA0Y5JRos5 7LKTuoufSK7STg44rpcrOViMO67VolqQLpXli9poWOgm5FFrWeGlCV0PF+TqcsDfIT Uak50ip4IVV1EorGmBMESs02rndc2AnTQfIXAxWcgWPXIuRXSBe4W/Tu7wffRi2zUK Iihedt1/QqAEg== From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: linux-fscrypt@vger.kernel.org, Ard Biesheuvel , "Theodore Y. Ts'o" , Jaegeuk Kim , Eric Biggers Subject: [PATCH 2/2] fsverity: relax build time dependency on CRYPTO_SHA256 Date: Fri, 16 Apr 2021 18:06:42 +0200 Message-Id: <20210416160642.85387-3-ardb@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210416160642.85387-1-ardb@kernel.org> References: <20210416160642.85387-1-ardb@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org CONFIG_CRYPTO_SHA256 denotes the generic C implementation of the SHA-256 shash algorithm, which is selected as the default crypto shash provider for fsverity. However, fsverity has no strict link time dependency, and the same shash could be exposed by an optimized implementation, and arm64 has a number of those (scalar, NEON-based and one based on special crypto instructions). In such cases, it makes little sense to require that the generic C implementation is incorporated as well, given that it will never be called. To address this, relax the 'select' clause to 'imply' so that the generic driver can be omitted from the build if desired. Signed-off-by: Ard Biesheuvel --- fs/verity/Kconfig | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/fs/verity/Kconfig b/fs/verity/Kconfig index 88fb25119899..24d1b54de807 100644 --- a/fs/verity/Kconfig +++ b/fs/verity/Kconfig @@ -3,9 +3,13 @@ config FS_VERITY bool "FS Verity (read-only file-based authenticity protection)" select CRYPTO - # SHA-256 is selected as it's intended to be the default hash algorithm. + # SHA-256 is implied as it's intended to be the default hash algorithm. # To avoid bloat, other wanted algorithms must be selected explicitly. - select CRYPTO_SHA256 + # Note that CRYPTO_SHA256 denotes the generic C implementation, but + # some architectures provided optimized implementations of the same + # algorithm that may be used instead. In this case, CRYPTO_SHA256 may + # be omitted even if SHA-256 is being used. + imply CRYPTO_SHA256 help This option enables fs-verity. fs-verity is the dm-verity mechanism implemented at the file level. On supported -- 2.30.2