linux-fscrypt.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt
@ 2021-04-21  7:55 Ard Biesheuvel
  2021-04-21  7:55 ` [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms Ard Biesheuvel
                   ` (2 more replies)
  0 siblings, 3 replies; 6+ messages in thread
From: Ard Biesheuvel @ 2021-04-21  7:55 UTC (permalink / raw)
  To: linux-crypto
  Cc: linux-fscrypt, Ard Biesheuvel, Theodore Y. Ts'o, Jaegeuk Kim,
	Eric Biggers

Relax 'select' dependencies to 'imply' for crypto algorithms that are
fulfilled only at runtime, and which may be implemented by other drivers
than the generic ones implemented in C. This permits, e.g., arm64 builds
to omit the generic CRYPTO_SHA256 and CRYPTO_AES drivers, both of which
are superseded by optimized scalar versions at the very least,

Changes since v1:
- use Eric's suggested comment text in patch #1
- add Eric's ack to partch #2

Cc: "Theodore Y. Ts'o" <tytso@mit.edu>
Cc: Jaegeuk Kim <jaegeuk@kernel.org>
Cc: Eric Biggers <ebiggers@kernel.org>

Ard Biesheuvel (2):
  fscrypt: relax Kconfig dependencies for crypto API algorithms
  fsverity: relax build time dependency on CRYPTO_SHA256

 fs/crypto/Kconfig | 30 ++++++++++++++------
 fs/verity/Kconfig |  8 ++++--
 2 files changed, 28 insertions(+), 10 deletions(-)

-- 
2.30.2


^ permalink raw reply	[flat|nested] 6+ messages in thread

* [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
  2021-04-21  7:55 [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt Ard Biesheuvel
@ 2021-04-21  7:55 ` Ard Biesheuvel
  2021-04-21 18:18   ` Eric Biggers
  2021-04-21  7:55 ` [PATCH v2 2/2] fsverity: relax build time dependency on CRYPTO_SHA256 Ard Biesheuvel
  2021-04-22  7:48 ` [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt Herbert Xu
  2 siblings, 1 reply; 6+ messages in thread
From: Ard Biesheuvel @ 2021-04-21  7:55 UTC (permalink / raw)
  To: linux-crypto
  Cc: linux-fscrypt, Ard Biesheuvel, Theodore Y. Ts'o, Jaegeuk Kim,
	Eric Biggers

Even if FS encryption has strict functional dependencies on various
crypto algorithms and chaining modes. those dependencies could potentially
be satisified by other implementations than the generic ones, and no link
time dependency exists on the 'depends on' claused defined by
CONFIG_FS_ENCRYPTION_ALGS.

So let's relax these clauses to 'imply', so that the default behavior
is still to pull in those generic algorithms, but in a way that permits
them to be disabled again in Kconfig.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
---
 fs/crypto/Kconfig | 30 ++++++++++++++------
 1 file changed, 22 insertions(+), 8 deletions(-)

diff --git a/fs/crypto/Kconfig b/fs/crypto/Kconfig
index a5f5c30368a2..2d0c8922f635 100644
--- a/fs/crypto/Kconfig
+++ b/fs/crypto/Kconfig
@@ -14,16 +14,30 @@ config FS_ENCRYPTION
 	  F2FS and UBIFS make use of this feature.
 
 # Filesystems supporting encryption must select this if FS_ENCRYPTION.  This
-# allows the algorithms to be built as modules when all the filesystems are.
+# allows the algorithms to be built as modules when all the filesystems are,
+# whereas selecting them from FS_ENCRYPTION would force them to be built-in.
+#
+# Note: this option only pulls in the algorithms that filesystem encryption
+# needs "by default".  If userspace will use "non-default" encryption modes such
+# as Adiantum encryption, then those other modes need to be explicitly enabled
+# in the crypto API; see Documentation/filesystems/fscrypt.rst for details.
+#
+# Also note that this option only pulls in the generic implementations of the
+# algorithms, not any per-architecture optimized implementations.  It is
+# strongly recommended to enable optimized implementations too.  It is safe to
+# disable these generic implementations if corresponding optimized
+# implementations will always be available too; for this reason, these are soft
+# dependencies ('imply' rather than 'select').  Only disable these generic
+# implementations if you're sure they will never be needed, though.
 config FS_ENCRYPTION_ALGS
 	tristate
-	select CRYPTO_AES
-	select CRYPTO_CBC
-	select CRYPTO_CTS
-	select CRYPTO_ECB
-	select CRYPTO_HMAC
-	select CRYPTO_SHA512
-	select CRYPTO_XTS
+	imply CRYPTO_AES
+	imply CRYPTO_CBC
+	imply CRYPTO_CTS
+	imply CRYPTO_ECB
+	imply CRYPTO_HMAC
+	imply CRYPTO_SHA512
+	imply CRYPTO_XTS
 
 config FS_ENCRYPTION_INLINE_CRYPT
 	bool "Enable fscrypt to use inline crypto"
-- 
2.30.2


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [PATCH v2 2/2] fsverity: relax build time dependency on CRYPTO_SHA256
  2021-04-21  7:55 [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt Ard Biesheuvel
  2021-04-21  7:55 ` [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms Ard Biesheuvel
@ 2021-04-21  7:55 ` Ard Biesheuvel
  2021-04-22  7:48 ` [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt Herbert Xu
  2 siblings, 0 replies; 6+ messages in thread
From: Ard Biesheuvel @ 2021-04-21  7:55 UTC (permalink / raw)
  To: linux-crypto
  Cc: linux-fscrypt, Ard Biesheuvel, Theodore Y. Ts'o, Jaegeuk Kim,
	Eric Biggers, Eric Biggers

CONFIG_CRYPTO_SHA256 denotes the generic C implementation of the SHA-256
shash algorithm, which is selected as the default crypto shash provider
for fsverity. However, fsverity has no strict link time dependency, and
the same shash could be exposed by an optimized implementation, and arm64
has a number of those (scalar, NEON-based and one based on special crypto
instructions). In such cases, it makes little sense to require that the
generic C implementation is incorporated as well, given that it will never
be called.

To address this, relax the 'select' clause to 'imply' so that the generic
driver can be omitted from the build if desired.

Acked-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
---
 fs/verity/Kconfig | 8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/fs/verity/Kconfig b/fs/verity/Kconfig
index 88fb25119899..24d1b54de807 100644
--- a/fs/verity/Kconfig
+++ b/fs/verity/Kconfig
@@ -3,9 +3,13 @@
 config FS_VERITY
 	bool "FS Verity (read-only file-based authenticity protection)"
 	select CRYPTO
-	# SHA-256 is selected as it's intended to be the default hash algorithm.
+	# SHA-256 is implied as it's intended to be the default hash algorithm.
 	# To avoid bloat, other wanted algorithms must be selected explicitly.
-	select CRYPTO_SHA256
+	# Note that CRYPTO_SHA256 denotes the generic C implementation, but
+	# some architectures provided optimized implementations of the same
+	# algorithm that may be used instead. In this case, CRYPTO_SHA256 may
+	# be omitted even if SHA-256 is being used.
+	imply CRYPTO_SHA256
 	help
 	  This option enables fs-verity.  fs-verity is the dm-verity
 	  mechanism implemented at the file level.  On supported
-- 
2.30.2


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
  2021-04-21  7:55 ` [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms Ard Biesheuvel
@ 2021-04-21 18:18   ` Eric Biggers
  2021-04-22  0:01     ` Herbert Xu
  0 siblings, 1 reply; 6+ messages in thread
From: Eric Biggers @ 2021-04-21 18:18 UTC (permalink / raw)
  To: Herbert Xu
  Cc: linux-crypto, linux-fscrypt, Theodore Y. Ts'o, Jaegeuk Kim,
	Ard Biesheuvel

On Wed, Apr 21, 2021 at 09:55:10AM +0200, Ard Biesheuvel wrote:
> Even if FS encryption has strict functional dependencies on various
> crypto algorithms and chaining modes. those dependencies could potentially
> be satisified by other implementations than the generic ones, and no link
> time dependency exists on the 'depends on' claused defined by
> CONFIG_FS_ENCRYPTION_ALGS.
> 
> So let's relax these clauses to 'imply', so that the default behavior
> is still to pull in those generic algorithms, but in a way that permits
> them to be disabled again in Kconfig.
> 
> Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
> ---

Acked-by: Eric Biggers <ebiggers@google.com>

Herbert, is there still time for you to take these two patches through the
crypto tree for 5.13?  There aren't any other fscrypt or fsverity patches for
5.13, so that would be easiest for me.

- Eric

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms
  2021-04-21 18:18   ` Eric Biggers
@ 2021-04-22  0:01     ` Herbert Xu
  0 siblings, 0 replies; 6+ messages in thread
From: Herbert Xu @ 2021-04-22  0:01 UTC (permalink / raw)
  To: Eric Biggers
  Cc: linux-crypto, linux-fscrypt, Theodore Y. Ts'o, Jaegeuk Kim,
	Ard Biesheuvel

On Wed, Apr 21, 2021 at 11:18:05AM -0700, Eric Biggers wrote:
>
> Herbert, is there still time for you to take these two patches through the
> crypto tree for 5.13?  There aren't any other fscrypt or fsverity patches for
> 5.13, so that would be easiest for me.

Sure, I can take these patches.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt
  2021-04-21  7:55 [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt Ard Biesheuvel
  2021-04-21  7:55 ` [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms Ard Biesheuvel
  2021-04-21  7:55 ` [PATCH v2 2/2] fsverity: relax build time dependency on CRYPTO_SHA256 Ard Biesheuvel
@ 2021-04-22  7:48 ` Herbert Xu
  2 siblings, 0 replies; 6+ messages in thread
From: Herbert Xu @ 2021-04-22  7:48 UTC (permalink / raw)
  To: Ard Biesheuvel
  Cc: linux-crypto, linux-fscrypt, ardb, tytso, jaegeuk, ebiggers

Ard Biesheuvel <ardb@kernel.org> wrote:
> Relax 'select' dependencies to 'imply' for crypto algorithms that are
> fulfilled only at runtime, and which may be implemented by other drivers
> than the generic ones implemented in C. This permits, e.g., arm64 builds
> to omit the generic CRYPTO_SHA256 and CRYPTO_AES drivers, both of which
> are superseded by optimized scalar versions at the very least,
> 
> Changes since v1:
> - use Eric's suggested comment text in patch #1
> - add Eric's ack to partch #2
> 
> Cc: "Theodore Y. Ts'o" <tytso@mit.edu>
> Cc: Jaegeuk Kim <jaegeuk@kernel.org>
> Cc: Eric Biggers <ebiggers@kernel.org>
> 
> Ard Biesheuvel (2):
>  fscrypt: relax Kconfig dependencies for crypto API algorithms
>  fsverity: relax build time dependency on CRYPTO_SHA256
> 
> fs/crypto/Kconfig | 30 ++++++++++++++------
> fs/verity/Kconfig |  8 ++++--
> 2 files changed, 28 insertions(+), 10 deletions(-)

All applied.  Thanks.
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2021-04-22  7:48 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-04-21  7:55 [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt Ard Biesheuvel
2021-04-21  7:55 ` [PATCH v2 1/2] fscrypt: relax Kconfig dependencies for crypto API algorithms Ard Biesheuvel
2021-04-21 18:18   ` Eric Biggers
2021-04-22  0:01     ` Herbert Xu
2021-04-21  7:55 ` [PATCH v2 2/2] fsverity: relax build time dependency on CRYPTO_SHA256 Ard Biesheuvel
2021-04-22  7:48 ` [PATCH v2 0/2] relax crypto Kconfig dependencies for fsverity/fscrypt Herbert Xu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).