Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp221457pxy; Wed, 21 Apr 2021 01:06:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzSV7wMhnlnSN/YxMvMYYHO4JpXuif9z5yi73BNNVGjkKcF+/WhFtQbn8Bzq7JN54vWan7i X-Received: by 2002:a63:4d8:: with SMTP id 207mr17478147pge.261.1618992407531; Wed, 21 Apr 2021 01:06:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618992407; cv=none; d=google.com; s=arc-20160816; b=AeFJJwXJIZdOMLj3amBcONVKzA6uHxRuG+2GPO+/c/6ryzIla8EhwYzTEOsl+6HCmv nzhTd1UaHsa8l1Z2jpoIT7hv8MCSptpDNxxhCKxfSW33kyKxC6M27tGeBqDmiqgH6Vrn pRcmlLumJb6pAAr6ee3LjsnXh9Y0tFdJ5UGkOpBwHxKPG0kHvrbEpgQNnsQK4t4AR21g r2fznF5t2aQt+ku0/brQCMpf07qseN6jwq5R6zDE+Z4esC7UxuXaavK2ZIAwzsxzXUYQ fxRfu8C3zw9n/Po+Rudz2823+hBKoUc0FHh+LxRP+oMESk5zMaEdOtgkZbd+cOlkp8P6 yy7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=mpafFAcHGwdqkTlqtc/1rnuLzEYsLbC69y1/4OAdu3k=; b=D+5jfDYbW2nzwoFCyLENiIjimymbyhDtiF17cNDLqL7fyAX5SDDdz9RsA3eyBbS15j OBLE3/nv+2cksM+aQCqpBIkt6HksELHeAyTG1OdHWcCq46PalGH1HqnfQEGFz+npF7I/ PipFmehkWZXWmDFVzHZmOI7ZzNNz9gpMyqYMsngWWBgvJ7aDuGR85tPzBLhe6tdR8hxp urn/gAx+mEvdjGiApeekxithIlG717hZfSveSqnBWjmJwdR99RzXNk+Nuc1NITawu24R 7lmzpE4MuezW+1A9uiPjlfjMK+2dsd+qU5nfxQwiP5JeYZ6cfbvInu3Pwzu4un5t6JEt AchA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qSvQ8qH+; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g13si2324353pgl.237.2021.04.21.01.06.26; Wed, 21 Apr 2021 01:06:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qSvQ8qH+; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235107AbhDUHz6 (ORCPT + 99 others); Wed, 21 Apr 2021 03:55:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:54784 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237503AbhDUHzz (ORCPT ); Wed, 21 Apr 2021 03:55:55 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 168806143A; Wed, 21 Apr 2021 07:55:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1618991722; bh=Ckt8C8nl3QhgUfJhMmpZtLEs1VTyK1g47DgJO1qo5CI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qSvQ8qH+6Ef1OeqB7SaG0W6Kko1Utphhkn1DHCars7TQ/PmoCSauQYtb+bbu61gEd VpHHSm0oLfzcEv9Wjgv/ThfpmX2J0vpyTrNA2CGNEvXAtIiXXuJw2N2ZjkcHN+6/Ai X/1SedqFtDtfVxTCqNtIVUvaf1wJ3hgbRqSvpI1K3dMAM7W/MqsmBYoOinm6hXVTqS xuIOP/eM3aAcg2HyBNy9+/3Vy8NYmQb80IqrusSONYWxeNjkLiG5FjTxgLatjDghtu 0Haf5ESq202HOGnmpQeuDreg22L3cQngHeF+m8sfWmCiRzOQyRXV+/KAl4DiXqHGKE /VYqDBpsrJt5g== From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: linux-fscrypt@vger.kernel.org, Ard Biesheuvel , "Theodore Y. Ts'o" , Jaegeuk Kim , Eric Biggers , Eric Biggers Subject: [PATCH v2 2/2] fsverity: relax build time dependency on CRYPTO_SHA256 Date: Wed, 21 Apr 2021 09:55:11 +0200 Message-Id: <20210421075511.45321-3-ardb@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210421075511.45321-1-ardb@kernel.org> References: <20210421075511.45321-1-ardb@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org CONFIG_CRYPTO_SHA256 denotes the generic C implementation of the SHA-256 shash algorithm, which is selected as the default crypto shash provider for fsverity. However, fsverity has no strict link time dependency, and the same shash could be exposed by an optimized implementation, and arm64 has a number of those (scalar, NEON-based and one based on special crypto instructions). In such cases, it makes little sense to require that the generic C implementation is incorporated as well, given that it will never be called. To address this, relax the 'select' clause to 'imply' so that the generic driver can be omitted from the build if desired. Acked-by: Eric Biggers Signed-off-by: Ard Biesheuvel --- fs/verity/Kconfig | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/fs/verity/Kconfig b/fs/verity/Kconfig index 88fb25119899..24d1b54de807 100644 --- a/fs/verity/Kconfig +++ b/fs/verity/Kconfig @@ -3,9 +3,13 @@ config FS_VERITY bool "FS Verity (read-only file-based authenticity protection)" select CRYPTO - # SHA-256 is selected as it's intended to be the default hash algorithm. + # SHA-256 is implied as it's intended to be the default hash algorithm. # To avoid bloat, other wanted algorithms must be selected explicitly. - select CRYPTO_SHA256 + # Note that CRYPTO_SHA256 denotes the generic C implementation, but + # some architectures provided optimized implementations of the same + # algorithm that may be used instead. In this case, CRYPTO_SHA256 may + # be omitted even if SHA-256 is being used. + imply CRYPTO_SHA256 help This option enables fs-verity. fs-verity is the dm-verity mechanism implemented at the file level. On supported -- 2.30.2