Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp191769ybt; Tue, 7 Jul 2020 20:11:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyTF5Gq7NuhnSRoTmVZ07gt/ksBHy4pEi/8eo3FXZGU/IOQbBXszXRputGO+gZYowk0UMH/ X-Received: by 2002:aa7:c496:: with SMTP id m22mr51608495edq.336.1594177872377; Tue, 07 Jul 2020 20:11:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594177872; cv=none; d=google.com; s=arc-20160816; b=o8CApxEehzZ4454vTBoStKI5f9b8XCx8BKcTPnvSd+AHFmFuvt2Xjbl44pIPAkfoAP um+hSP5jDpQDD9R472nsqdGckjhmNWBPd6dqsesfIBk/5g1d0bKJH0n/6uspRi/Hj8IX pdaAQFXneSubihM62Ab07sFxoGDgDC8Q6ITBs3QR9AW2Ef5glAzRL6AEgpPEBf+2Nfz6 rEtU4czlfmgE+lqljgNkkVlKIuDo5WZ55ghbqeB43i9tHujo3jStQG8GKIQr7sFVExas yVhLXx8kbdMflN0azcr030MljwypXOtUZQbuB76RNRqsy9VE8lrwe6R57asR9dsF9KEv EDbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=aP+qpq9rpJgxeSxNlmZTY/t2cTRkQbWyuBAcSHQgTQs=; b=aPHk5vorTsLnYTQx4x6kYv2zTxSNwNz3AnoIc7YWCTvkLt0BGLcP6QKv/M3dFvi7PY BK99STuipRpLb52PLcQT7EGIz6vX7h6KA5A81FJmdQpham5Ik3htqLZT6ExFnBqtPnVw x7PpHC+wPXhtplH9gdfiSMCK3rDsSjUJr+wWyHeLR2mSoGiIwq4W1YwmX+y26L7KnndM V0vR/kyi0Nhfr8hDidQaX9f9nxSAdwins/RXQbDEvKXVnp/iyAbUk9tHPE6sPu5IKNdp 8SSWqzuN3JmHqY9Zi8odbGOc9N9javqz/mzQ03taPauPcieJj4WvtoiodbeuJfRTjnE6 MAzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=m+aeCWp1; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id du1si19671508ejc.616.2020.07.07.20.10.42; Tue, 07 Jul 2020 20:11:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=m+aeCWp1; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729421AbgGHDGC (ORCPT + 99 others); Tue, 7 Jul 2020 23:06:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56744 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729411AbgGHDGB (ORCPT ); Tue, 7 Jul 2020 23:06:01 -0400 Received: from mail-qt1-x84a.google.com (mail-qt1-x84a.google.com [IPv6:2607:f8b0:4864:20::84a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF5E0C061755 for ; Tue, 7 Jul 2020 20:06:01 -0700 (PDT) Received: by mail-qt1-x84a.google.com with SMTP id a52so20930508qtk.22 for ; Tue, 07 Jul 2020 20:06:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=aP+qpq9rpJgxeSxNlmZTY/t2cTRkQbWyuBAcSHQgTQs=; b=m+aeCWp1t2z+5Z871kAgTbmai1ropLBYbvcXIUdYvVLoQwv7bCZx9iAftANT1IFFlo QrtYdfunNKy9AaoKtNSQBk1PZ25S99QOMMhRkH0PyI0AN013bUZia2v+UAabrZEBy14d RiTqQXttxwcSVNwRvXV9zgUU9FegPldt1rBYu52LGG6DpKKW6PfhcN5ZGnD1HoKhPKHP Jf/9YTrxgNdgIgRJN3x5db9w2OGaf606GucLydCmVE5d6C/GNBFHG2SKoUeWvTMEIIq5 NZ08TOPAUQDoO9WmgandJMJ1ZODqAQzcViyU5FckE2bVW3GJSGm67JTKMG06JzgpEJLt 0Cww== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=aP+qpq9rpJgxeSxNlmZTY/t2cTRkQbWyuBAcSHQgTQs=; b=LfJdJvxFKDfC8pY39YZGmsXwWnuSILj/Gk3TXKltnwouSCkKm+N2YE3mudYFItPIwr /z+ka1/BrHOwM5IoT+LCo4pGr0EfcV/5qPTn2nR53WHfGYGAvYJBCI/ggA3fgz9IKKJz K5VX370WE3343UPkHCi+dz/nYqaX6kAK55MVoSvCBBwX61Ndy38sW+tol4u7hyXWSZAj 0zbhCqbVma3xwPbvTm7nJZCRaTZPWGBd1TLbYNf4/vkAAi1InUZGFfcnDTDTJJxsJxyT fLDcCBWtoB8ZVO2QNkqasc876OT0nLYxfY71wafiChJYohMoS2+8t6WVq8y5M5vmZQml zzFg== X-Gm-Message-State: AOAM531v6ZjaHdi2hDnSQ4xDxoxXo6E7CjAjp7E+oJ21I0HIIvD6UOBU DWfXUBR2Y4Yj3CmDBOKpojlBvChXJNM= X-Received: by 2002:a0c:dd87:: with SMTP id v7mr51408250qvk.192.1594177560817; Tue, 07 Jul 2020 20:06:00 -0700 (PDT) Date: Tue, 7 Jul 2020 20:05:50 -0700 In-Reply-To: <20200708030552.3829094-1-drosen@google.com> Message-Id: <20200708030552.3829094-3-drosen@google.com> Mime-Version: 1.0 References: <20200708030552.3829094-1-drosen@google.com> X-Mailer: git-send-email 2.27.0.383.g050319c2ae-goog Subject: [PATCH v11 2/4] fs: Add standard casefolding support From: Daniel Rosenberg To: "Theodore Ts'o" , linux-ext4@vger.kernel.org, Jaegeuk Kim , Chao Yu , linux-f2fs-devel@lists.sourceforge.net, Eric Biggers , linux-fscrypt@vger.kernel.org, Alexander Viro Cc: Andreas Dilger , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Gabriel Krisman Bertazi , kernel-team@android.com, Daniel Rosenberg Content-Type: text/plain; charset="UTF-8" Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org This adds general supporting functions for filesystems that use utf8 casefolding. It provides standard dentry_operations and adds the necessary structures in struct super_block to allow this standardization. The new dentry operations are functionally equivalent to the existing operations in ext4 and f2fs, apart from the use of utf8_casefold_hash to avoid an allocation. By providing a common implementation, all users can benefit from any optimizations without needing to port over improvements. Signed-off-by: Daniel Rosenberg --- fs/libfs.c | 94 ++++++++++++++++++++++++++++++++++++++++++++++ include/linux/fs.h | 16 ++++++++ 2 files changed, 110 insertions(+) diff --git a/fs/libfs.c b/fs/libfs.c index 4d08edf19c78..fe22e2be6f7a 100644 --- a/fs/libfs.c +++ b/fs/libfs.c @@ -20,6 +20,8 @@ #include #include #include +#include +#include #include @@ -1363,3 +1365,95 @@ bool is_empty_dir_inode(struct inode *inode) return (inode->i_fop == &empty_dir_operations) && (inode->i_op == &empty_dir_inode_operations); } + +#ifdef CONFIG_UNICODE +/* + * Determine if the name of a dentry should be casefolded. + * + * Return: if names will need casefolding + */ +static bool needs_casefold(const struct inode *dir) +{ + return IS_CASEFOLDED(dir) && dir->i_sb->s_encoding; +} + +/** + * generic_ci_d_compare - generic d_compare implementation for casefolding filesystems + * @dentry: dentry whose name we are checking against + * @len: len of name of dentry + * @str: str pointer to name of dentry + * @name: Name to compare against + * + * Return: 0 if names match, 1 if mismatch, or -ERRNO + */ +int generic_ci_d_compare(const struct dentry *dentry, unsigned int len, + const char *str, const struct qstr *name) +{ + const struct dentry *parent = READ_ONCE(dentry->d_parent); + const struct inode *inode = READ_ONCE(parent->d_inode); + const struct super_block *sb = dentry->d_sb; + const struct unicode_map *um = sb->s_encoding; + struct qstr qstr = QSTR_INIT(str, len); + char strbuf[DNAME_INLINE_LEN]; + int ret; + + if (!inode || !needs_casefold(inode)) + goto fallback; + /* + * If the dentry name is stored in-line, then it may be concurrently + * modified by a rename. If this happens, the VFS will eventually retry + * the lookup, so it doesn't matter what ->d_compare() returns. + * However, it's unsafe to call utf8_strncasecmp() with an unstable + * string. Therefore, we have to copy the name into a temporary buffer. + */ + if (len <= DNAME_INLINE_LEN - 1) { + memcpy(strbuf, str, len); + strbuf[len] = 0; + qstr.name = strbuf; + /* prevent compiler from optimizing out the temporary buffer */ + barrier(); + } + ret = utf8_strncasecmp(um, name, &qstr); + if (ret >= 0) + return ret; + + if (sb_has_strict_encoding(sb)) + return -EINVAL; +fallback: + if (len != name->len) + return 1; + return !!memcmp(str, name->name, len); +} +EXPORT_SYMBOL(generic_ci_d_compare); + +/** + * generic_ci_d_hash - generic d_hash implementation for casefolding filesystems + * @dentry: dentry whose name we are hashing + * @str: qstr of name whose hash we should fill in + * + * Return: 0 if hash was successful, or -ERRNO + */ +int generic_ci_d_hash(const struct dentry *dentry, struct qstr *str) +{ + const struct inode *inode = READ_ONCE(dentry->d_inode); + struct super_block *sb = dentry->d_sb; + const struct unicode_map *um = sb->s_encoding; + int ret = 0; + + if (!inode || !needs_casefold(inode)) + return 0; + + ret = utf8_casefold_hash(um, dentry, str); + if (ret < 0) + goto err; + + return 0; +err: + if (sb_has_strict_encoding(sb)) + ret = -EINVAL; + else + ret = 0; + return ret; +} +EXPORT_SYMBOL(generic_ci_d_hash); +#endif diff --git a/include/linux/fs.h b/include/linux/fs.h index 3f881a892ea7..af8f2ecec8ff 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -1392,6 +1392,12 @@ extern int send_sigurg(struct fown_struct *fown); #define SB_ACTIVE (1<<30) #define SB_NOUSER (1<<31) +/* These flags relate to encoding and casefolding */ +#define SB_ENC_STRICT_MODE_FL (1 << 0) + +#define sb_has_strict_encoding(sb) \ + (sb->s_encoding_flags & SB_ENC_STRICT_MODE_FL) + /* * Umount options */ @@ -1461,6 +1467,10 @@ struct super_block { #endif #ifdef CONFIG_FS_VERITY const struct fsverity_operations *s_vop; +#endif +#ifdef CONFIG_UNICODE + struct unicode_map *s_encoding; + __u16 s_encoding_flags; #endif struct hlist_bl_head s_roots; /* alternate root dentries for NFS */ struct list_head s_mounts; /* list of mounts; _not_ for fs use */ @@ -3385,6 +3395,12 @@ extern int generic_file_fsync(struct file *, loff_t, loff_t, int); extern int generic_check_addressable(unsigned, u64); +#ifdef CONFIG_UNICODE +extern int generic_ci_d_hash(const struct dentry *dentry, struct qstr *str); +extern int generic_ci_d_compare(const struct dentry *dentry, unsigned int len, + const char *str, const struct qstr *name); +#endif + #ifdef CONFIG_MIGRATION extern int buffer_migrate_page(struct address_space *, struct page *, struct page *, -- 2.27.0.383.g050319c2ae-goog