Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp699945pxk; Wed, 23 Sep 2020 13:45:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwAuFFbUBr3AB8YsMKiN1m47qEAQghxl0dsKdWZcuMyD2FanP7mcKFQe82X2LHfzKuxxzDa X-Received: by 2002:a50:f418:: with SMTP id r24mr1166666edm.295.1600893923837; Wed, 23 Sep 2020 13:45:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600893923; cv=none; d=google.com; s=arc-20160816; b=ct7GtyDnDk0WxMmdE5XIB0rwULAEaa7oLXhh+8JN4Ir9GWsMalrQveeBKtMbq+J3Ff M78vQrYcLZh5AIHcJ1FCNa1Y2l9Ke01LsI2VlLmtbKP3meIxVSbnI4oCZNSZqUqj+h6X gxM3nIvdRmsFYmPEY1DJzUtkFlGIy1HjJ08LenI9n+SSq0pIYzoQR2ksu6T1VvodrtOh oFikkdBSkf7DGSfpamJ43bHiRZfAZKjrr9a1CIf7q/LNAUrshe+RNt64sk+u7GAqef1W M29aD2HB9obYjGWwc3XmzlNi4hWKgTrtYY2eLxWkktNBEFY0wGLwW67+ZJnRWnrjLT19 OilQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:in-reply-to :date:references:organization:subject:cc:to:from; bh=komJWqXYYCQE256MNOWtBVLa2SoZT1V8yBjkudT1F/U=; b=FgSGZU6LAO0VUUDHYQ+N2JtcKurrMu3IMnA0eyYJfnD3SlMmXIY4iMry09WA6QtDd3 9JvpiGptQRMm36iu02Rz3BHTXH4EtkZlCqEQW0+F2wtOMYs7jR+/5W7Fbn8ku5oXMdmr eH2aBvuQDM2DlY3SWbyD5FbxWd8G+PvAehQk8EqAmiJIpbqZjPl/iQrFvNvkv0TVgPgB iRN+HkF+mkX25Lnve7o5R56lMQaPbxdxnRopbcJCRyOfr/URYXo/oGRoh4u8/MhFxZX+ BzVcu5WDapfBGr36sRNyGAy8I/ytc4TNRo1pYhViayaM5hI1KeIiZ7QNCqASVlin5zpi YCJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d7si778427eds.69.2020.09.23.13.44.59; Wed, 23 Sep 2020 13:45:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726634AbgIWUoj (ORCPT + 99 others); Wed, 23 Sep 2020 16:44:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34946 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726199AbgIWUoh (ORCPT ); Wed, 23 Sep 2020 16:44:37 -0400 Received: from bhuna.collabora.co.uk (bhuna.collabora.co.uk [IPv6:2a00:1098:0:82:1000:25:2eeb:e3e3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CEE1AC0613CE; Wed, 23 Sep 2020 13:44:36 -0700 (PDT) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: krisman) with ESMTPSA id 0338129C28A From: Gabriel Krisman Bertazi To: Daniel Rosenberg Cc: "Theodore Y . Ts'o" , Jaegeuk Kim , Eric Biggers , Andreas Dilger , Chao Yu , Alexander Viro , Richard Weinberger , linux-fscrypt@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mtd@lists.infradead.org, kernel-team@android.com Subject: Re: [PATCH 3/5] libfs: Add generic function for setting dentry_ops Organization: Collabora References: <20200923010151.69506-1-drosen@google.com> <20200923010151.69506-4-drosen@google.com> Date: Wed, 23 Sep 2020 16:44:28 -0400 In-Reply-To: <20200923010151.69506-4-drosen@google.com> (Daniel Rosenberg's message of "Wed, 23 Sep 2020 01:01:49 +0000") Message-ID: <87ft785ikz.fsf@collabora.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Daniel Rosenberg writes: > This adds a function to set dentry operations at lookup time that will > work for both encrypted files and casefolded filenames. > > A filesystem that supports both features simultaneously can use this > function during lookup preperations to set up its dentry operations once > fscrypt no longer does that itself. > > Currently the casefolding dentry operation are always set because the > feature is toggleable on empty directories. Since we don't know what > set of functions we'll eventually need, and cannot change them later, > we add just add them. > > Signed-off-by: Daniel Rosenberg > --- > fs/libfs.c | 49 ++++++++++++++++++++++++++++++++++++++++++++++ > include/linux/fs.h | 1 + > 2 files changed, 50 insertions(+) > > diff --git a/fs/libfs.c b/fs/libfs.c > index fc34361c1489..83303858f1fe 100644 > --- a/fs/libfs.c > +++ b/fs/libfs.c > @@ -1449,4 +1449,53 @@ int generic_ci_d_hash(const struct dentry *dentry, struct qstr *str) > return 0; > } > EXPORT_SYMBOL(generic_ci_d_hash); > + > +static const struct dentry_operations generic_ci_dentry_ops = { > + .d_hash = generic_ci_d_hash, > + .d_compare = generic_ci_d_compare, > +}; > +#endif > + > +#ifdef CONFIG_FS_ENCRYPTION > +static const struct dentry_operations generic_encrypted_dentry_ops = { > + .d_revalidate = fscrypt_d_revalidate, > +}; > +#endif > + > +#if IS_ENABLED(CONFIG_UNICODE) && IS_ENABLED(CONFIG_FS_ENCRYPTION) > +static const struct dentry_operations generic_encrypted_ci_dentry_ops = { > + .d_hash = generic_ci_d_hash, > + .d_compare = generic_ci_d_compare, > + .d_revalidate = fscrypt_d_revalidate, > +}; > +#endif > + > +/** > + * generic_set_encrypted_ci_d_ops - helper for setting d_ops for given dentry > + * @dentry: dentry to set ops on > + * > + * This function sets the dentry ops for the given dentry to handle both > + * casefolding and encryption of the dentry name. > + */ > +void generic_set_encrypted_ci_d_ops(struct dentry *dentry) > +{ > +#ifdef CONFIG_FS_ENCRYPTION > + if (dentry->d_flags & DCACHE_ENCRYPTED_NAME) { > +#ifdef CONFIG_UNICODE > + if (dentry->d_sb->s_encoding) { > + d_set_d_op(dentry, &generic_encrypted_ci_dentry_ops); > + return; > + } > #endif > + d_set_d_op(dentry, &generic_encrypted_dentry_ops); > + return; > + } > +#endif > +#ifdef CONFIG_UNICODE > + if (dentry->d_sb->s_encoding) { > + d_set_d_op(dentry, &generic_ci_dentry_ops); > + return; > + } > +#endif > +} I think this is harder to read than necessary. What do you think about just splitting the three cases like the following: void generic_set_encrypted_ci_d_ops(struct dentry *dentry) { #if defined(CONFIG_FS_ENCRYPTION) && defined(CONFIG_UNICODE) if (encoding && encryption) { d_set_d_op(dentry, &generic_encrypted_ci_dentry_ops); return; } #endif #if defined (CONFIG_FS_ENCRYPTION) if (encryption) { d_set_d_op(dentry, &generic_encrypted_dentry_ops); return; } #endif #if defined (CONFIG_UNICODE) if (encoding) { d_set_d_op(dentry, &generic_ci_dentry_ops); return; } #endif } > +EXPORT_SYMBOL(generic_set_encrypted_ci_d_ops); > diff --git a/include/linux/fs.h b/include/linux/fs.h > index bc5417c61e12..6627896db835 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -3277,6 +3277,7 @@ extern int generic_ci_d_hash(const struct dentry *dentry, struct qstr *str); > extern int generic_ci_d_compare(const struct dentry *dentry, unsigned int len, > const char *str, const struct qstr *name); > #endif > +extern void generic_set_encrypted_ci_d_ops(struct dentry *dentry); > > #ifdef CONFIG_MIGRATION > extern int buffer_migrate_page(struct address_space *, -- Gabriel Krisman Bertazi