Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp221458pxy; Wed, 21 Apr 2021 01:06:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzW2CYH7Qbywm45iI7wUq0AObg9qZo9GuW8FbwzQRF6ZGKByhxo+3RXrUgzwj1ALadt2jpb X-Received: by 2002:a63:8c4a:: with SMTP id q10mr20917633pgn.106.1618992407537; Wed, 21 Apr 2021 01:06:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618992407; cv=none; d=google.com; s=arc-20160816; b=dJd1jcqofOD2gq/ZAUpQwOXA3vLhzVlvezrzIStyoyJJ0TrGhHhqIMUP9FCjCP3GC5 xXiMhpsM8tvoW1YQBdRGTXRhJxDsfouC9WZ8/qwZ2Md0gA+LoX/SUQ52MjSEe98hhzYz f91nM85pMejDiHSBm2VE2IqiHwY/sJWSCvIHJl/PzIRfY7BmdeZsnnU7B2MVJQz8I7lc B8h10peADCifg8ZZWbfulbdIVinxjjlB6MGi//rGMcmoElaDJSbI0xrwcozil0KyQ5u4 JxyNsCL38rt70xmzH/ng5ztSARR/H+dU3jtG3HsE2aiSN8vcwR7gmqdHcsdT9s9GMKMY s4Tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=/58iPdtJcbbZAvCckx7BfvKpnuv6ZozOxjZt56nKucI=; b=YEEjP+ZUe/ayizV7BB84FBHrapHVgjklMo3s6D6Khk8J96FNDJISevtu8l6KHka+Y6 KY2omWvdtWiQ6jM1jiUGnsM/h+vk2vkXIAnAm8mbUiLOzQZlQ/13rcQWds5Ki2suwiFk Reeop3lx34ywyp6Fqp5ofSG4rGxxwHKjCDQdzXarqxRqZjSyIYeKpzgkv8ANt5WWHjtk SysEIKkDVHn2xrP6hVhYABx4LbitCRNW6OAU4NNKUZjztkAi8gLvQAfsbbwCSPRrwnLi 53tgLoy5y5h0ukg9zgrwvfg5ehnFzJpVCz9RPv1RvRDZ1J6t6G0i/iEicfISi0YS76/q wlPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GL+4S18d; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a16si1644130plh.306.2021.04.21.01.06.26; Wed, 21 Apr 2021 01:06:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GL+4S18d; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236911AbhDUHz5 (ORCPT + 99 others); Wed, 21 Apr 2021 03:55:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:54764 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235107AbhDUHzy (ORCPT ); Wed, 21 Apr 2021 03:55:54 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3F6E761438; Wed, 21 Apr 2021 07:55:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1618991720; bh=9wo1DQLdtI3MuzZYxymV2WhK5mxjl2O3K1NxVhptqfg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GL+4S18dnKDLGfuGPTaV/mn/Ndh1H0XCUa13oQ74/pkRdtNzZFJHrpdyUFEQt4gWJ yrH5n1k8Wo5YZkq5TYEmkagDFk10qcqf3Lsv9drNTEsTzUKvHjlIGaWBq9dQ9Cj22O LpXwG906Hc4ARA9eUBquK9E4mAI3KgnhVVGRMf3T4XuAcPcwimY57JwtSkKqQJoc48 0jTL8NoW1uiBR0KIv792vUDHeABSk3N3+yLrV6im5GlaR+KKcQMrrXpDiYQS9zUh8/ aGrVNy07viqtuJZHgg2z7jrHMLV0N0cOYQdmftOcm3QODn0xJ+71FeK8NYKkaORdb9 cE9aM/6k+PdeQ== From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: linux-fscrypt@vger.kernel.org, Ard Biesheuvel , "Theodore Y. Ts'o" , Jaegeuk Kim , Eric Biggers Subject: [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms Date: Wed, 21 Apr 2021 09:55:10 +0200 Message-Id: <20210421075511.45321-2-ardb@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210421075511.45321-1-ardb@kernel.org> References: <20210421075511.45321-1-ardb@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Even if FS encryption has strict functional dependencies on various crypto algorithms and chaining modes. those dependencies could potentially be satisified by other implementations than the generic ones, and no link time dependency exists on the 'depends on' claused defined by CONFIG_FS_ENCRYPTION_ALGS. So let's relax these clauses to 'imply', so that the default behavior is still to pull in those generic algorithms, but in a way that permits them to be disabled again in Kconfig. Signed-off-by: Ard Biesheuvel --- fs/crypto/Kconfig | 30 ++++++++++++++------ 1 file changed, 22 insertions(+), 8 deletions(-) diff --git a/fs/crypto/Kconfig b/fs/crypto/Kconfig index a5f5c30368a2..2d0c8922f635 100644 --- a/fs/crypto/Kconfig +++ b/fs/crypto/Kconfig @@ -14,16 +14,30 @@ config FS_ENCRYPTION F2FS and UBIFS make use of this feature. # Filesystems supporting encryption must select this if FS_ENCRYPTION. This -# allows the algorithms to be built as modules when all the filesystems are. +# allows the algorithms to be built as modules when all the filesystems are, +# whereas selecting them from FS_ENCRYPTION would force them to be built-in. +# +# Note: this option only pulls in the algorithms that filesystem encryption +# needs "by default". If userspace will use "non-default" encryption modes such +# as Adiantum encryption, then those other modes need to be explicitly enabled +# in the crypto API; see Documentation/filesystems/fscrypt.rst for details. +# +# Also note that this option only pulls in the generic implementations of the +# algorithms, not any per-architecture optimized implementations. It is +# strongly recommended to enable optimized implementations too. It is safe to +# disable these generic implementations if corresponding optimized +# implementations will always be available too; for this reason, these are soft +# dependencies ('imply' rather than 'select'). Only disable these generic +# implementations if you're sure they will never be needed, though. config FS_ENCRYPTION_ALGS tristate - select CRYPTO_AES - select CRYPTO_CBC - select CRYPTO_CTS - select CRYPTO_ECB - select CRYPTO_HMAC - select CRYPTO_SHA512 - select CRYPTO_XTS + imply CRYPTO_AES + imply CRYPTO_CBC + imply CRYPTO_CTS + imply CRYPTO_ECB + imply CRYPTO_HMAC + imply CRYPTO_SHA512 + imply CRYPTO_XTS config FS_ENCRYPTION_INLINE_CRYPT bool "Enable fscrypt to use inline crypto" -- 2.30.2