Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp605437pxb; Thu, 5 Nov 2020 08:18:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJza4aq+9gRG1kt1dopZoEtLONlrp+udE2QCyBxS+YihK06/uFxM9QQfRkIN9t1qkwwjN0S7 X-Received: by 2002:aa7:c2c3:: with SMTP id m3mr3352683edp.361.1604593120811; Thu, 05 Nov 2020 08:18:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604593120; cv=none; d=google.com; s=arc-20160816; b=yiEfDZu5uNzZMpu4GUF0xrUP+vzyDw8+p6o70AQObG/qX8bzClJc/AoJ0OLVUqE+0J iOmSx+VAmlVjaaGawbvTqggJYHC1hNqKaSb0QMZSr4TCri5SWpxePSA9E0U+coSGUTzA z2VMGRWRz++FX5+WhLEH++3KLB4ZlIQLre2P1cXMmgVM4RmoOdvBDlaIvV63G00PoHYE BEW8WDKFSbyFSuvihaq3HVg9mva3p1qTCRCvKfhe9QCn+rcnYjDx/SnoxaZW8uwTF094 SF89JqR/rGdgS8JV8K4ASvCKumxL4auZCnlrwA1a/ad0c9WMlH9f71ROSnWXlLUDRwQf c+XA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=A+IwDcz+B7ZigPgW6I1GiW+2Gjqfp+6h1/TzE8yK2Ew=; b=KkLHnbY8fVNkmYWObbnMC6AlHP6Dy0rE5ZWBxdCitr9tGWbVEKFGOzt7+Ed2whQhwG +T1sLhgsiGfDSaJLTIIGYYi2t1maCNOIIao+LlH5awgH7OqSOX0TCA92VEYBnbUY+Eq3 Ze6EN7K6D/rC43SFfy1hE2269ip8nThSPA6VsYDRWsQrzxorMS1UZ+iiR1FQ0oB6BdCl n3p0rxv4tYBEhTDbai15FBcSIIpP2t899quQ299WAwXaKtBZN40sm0xhYQgZ0zQHLe6q I2t/VGVawZULpuxMwK9IvqEjYJEvfle3E/KrwrtQu6/cF+WvDvAf1hXHCzi6JsGUOJ/j lRhw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t12si2115828edc.181.2020.11.05.08.18.17; Thu, 05 Nov 2020 08:18:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730429AbgKEQSC (ORCPT + 99 others); Thu, 5 Nov 2020 11:18:02 -0500 Received: from bhuna.collabora.co.uk ([46.235.227.227]:49740 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730174AbgKEQSC (ORCPT ); Thu, 5 Nov 2020 11:18:02 -0500 Received: from xps.home (unknown [IPv6:2a01:e35:2fb5:1510:4a7e:bc14:686e:75db]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: aferraris) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 3D6AA1F4612C; Thu, 5 Nov 2020 16:17:59 +0000 (GMT) From: Arnaud Ferraris To: linux-ext4@vger.kernel.org Cc: Gabriel Krisman Bertazi , Arnaud Ferraris Subject: [PATCH 09/11] e2fsck: Add option to force encoded filename verification Date: Thu, 5 Nov 2020 17:16:41 +0100 Message-Id: <20201105161642.87488-10-arnaud.ferraris@collabora.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201105161642.87488-1-arnaud.ferraris@collabora.com> References: <20201105161642.87488-1-arnaud.ferraris@collabora.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Gabriel Krisman Bertazi This is interesting for !strict filesystems as part of the encoding update procedure. Once the filesystem is known to not have badly encoded filenames, the update is trivial, thanks to the stability of assigned code points in the unicode specification. Signed-off-by: Gabriel Krisman Bertazi Signed-off-by: Arnaud Ferraris --- e2fsck/e2fsck.h | 1 + e2fsck/pass2.c | 5 +++-- e2fsck/unix.c | 4 ++++ 3 files changed, 8 insertions(+), 2 deletions(-) diff --git a/e2fsck/e2fsck.h b/e2fsck/e2fsck.h index dcaab0a1..f324e92c 100644 --- a/e2fsck/e2fsck.h +++ b/e2fsck/e2fsck.h @@ -177,6 +177,7 @@ struct resource_track { #define E2F_OPT_ICOUNT_FULLMAP 0x20000 /* use an array for inode counts */ #define E2F_OPT_UNSHARE_BLOCKS 0x40000 #define E2F_OPT_CLEAR_UNINIT 0x80000 /* Hack to clear the uninit bit */ +#define E2F_OPT_CHECK_ENCODING 0x100000 /* Force verification of encoded filenames */ /* * E2fsck flags diff --git a/e2fsck/pass2.c b/e2fsck/pass2.c index da00e244..a50a8331 100644 --- a/e2fsck/pass2.c +++ b/e2fsck/pass2.c @@ -1049,9 +1049,10 @@ static int check_dir_block(ext2_filsys fs, ctx = cd->ctx; /* We only want filename encoding verification on strict - * mode. */ + * mode or if explicitly requested by user. */ if (ext2fs_test_inode_bitmap2(ctx->inode_casefold_map, ino) && - (ctx->fs->super->s_encoding_flags & EXT4_ENC_STRICT_MODE_FL)) + ((ctx->fs->super->s_encoding_flags & EXT4_ENC_STRICT_MODE_FL) || + (ctx->options & E2F_OPT_CHECK_ENCODING))) cf_dir = 1; if (ctx->flags & E2F_FLAG_RUN_RETURN) diff --git a/e2fsck/unix.c b/e2fsck/unix.c index 1cb51672..0a9012e5 100644 --- a/e2fsck/unix.c +++ b/e2fsck/unix.c @@ -753,6 +753,9 @@ static void parse_extended_opts(e2fsck_t ctx, const char *opts) ctx->options |= E2F_OPT_UNSHARE_BLOCKS; ctx->options |= E2F_OPT_FORCE; continue; + } else if (strcmp(token, "check_encoding") == 0) { + ctx->options |= E2F_OPT_CHECK_ENCODING; + continue; #ifdef CONFIG_DEVELOPER_FEATURES } else if (strcmp(token, "clear_all_uninit_bits") == 0) { ctx->options |= E2F_OPT_CLEAR_UNINIT; @@ -784,6 +787,7 @@ static void parse_extended_opts(e2fsck_t ctx, const char *opts) fputs("\tbmap2extent\n", stderr); fputs("\tunshare_blocks\n", stderr); fputs("\tfixes_only\n", stderr); + fputs("\tcheck_encoding\n", stderr); fputc('\n', stderr); exit(1); } -- 2.28.0