Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp678128iob; Wed, 18 May 2022 10:25:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxAeXk2hLRfnbv+wLf7AFzXJAatWoQWNF+Q8eQ/+ZfKWzzuF6QKUXXrCjzWb2UPMKo7cpMN X-Received: by 2002:a05:6a00:1488:b0:510:4e64:fb80 with SMTP id v8-20020a056a00148800b005104e64fb80mr437116pfu.58.1652894719585; Wed, 18 May 2022 10:25:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652894719; cv=none; d=google.com; s=arc-20160816; b=pARm1QNv7fCKywRKUchHuAlP+PLG9pnR4rZD8B3VHbOd52bddZIjmUXjEAocEXvO7e RfNuG97J7k86iC/p+X4975E7RhZBeqFBPoCiXBNnVs2Wv/cpGJNQ3EucNPPrr/LttTm8 1cbEwuM1fwhNa1LWmh6l5UwY/LwZteb4z5sGbAqkzbJNiq8Zuoo2XtJAtSA5zgdN4YXH epi3WcS12s5dZeDDIaMPRn7c+1imjLYJWVLBvgve6aI+kja4p9fyBOJstHmix5n3wLHz QWJqV6dcMKsbbQtr9Jex6cUbTNcLe+DW8ltAFzqDsk2hjmAWLX4GXRL43k9Q6U7bqAiN bUnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=gpCsJK9wOtNB6bS+HHCCl5o7lQX31fmAZLxMm0OimIU=; b=aEbrkcUReX2PCKiNEK/5YlPw7TduI7DDoX67/TdXVl7T7DKbvPCrSzZYFUbrWUosjM 1MsIam7hMIb3NdyLP9Gmufbzzn2zXtrYlyUvDegUN0zMuGQefTzd7T6o3ZL0vrFhTgfW HZ28ko/eO/z0jTGWhHnHSqkRL/XFW58nsZDeLiWUqrk5g09WUC4N9b6H28/8bn5NuAG8 MqO8cFQ4oAeexRqsF7dmygixwo/OvcybnuN56wNFK6GqgP3mt7Z3dOOUkBWy/4Y4s6Yg cEHcOdpDEVC00fs7xH9xmZqPHMjToujLxpmb2+SadhjCrWKflG+QOcWHOEf0+yT4w6Ma Gh1A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=hkUkmUTm; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id b25-20020a62a119000000b0051076cfcf29si3514556pff.153.2022.05.18.10.25.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 May 2022 10:25:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=hkUkmUTm; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 33D0A1A8E37; Wed, 18 May 2022 10:24:09 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240988AbiERRYD (ORCPT + 99 others); Wed, 18 May 2022 13:24:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45088 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240986AbiERRYC (ORCPT ); Wed, 18 May 2022 13:24:02 -0400 Received: from bhuna.collabora.co.uk (bhuna.collabora.co.uk [46.235.227.227]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 52E401A6AFA for ; Wed, 18 May 2022 10:24:00 -0700 (PDT) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: krisman) with ESMTPSA id E37DD1F44D9A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1652894639; bh=ruPToYEgp6g7sDo/nSU7KXe3XEWzDURTbemIq7tTpNc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hkUkmUTm3BFI2Pw+FTGWsKoOvSylRSsLWit44bSAU5c5VxWzly+weC2C1beZuj7hJ RkNe4awSDj0++RsM3JXbb1Hp72/zgWku1wH0S4cy4KLXWhbU/yKaFGYfSORnYNcQOJ hjjzfG5ZqxHEmlS60JQfzftSgz2+bzdBtqC8pk2aZ75AWb0b8vS5Xf29NWi5P642yO mVWLhY+ZlGcvFQ/5XNGl98XZWPvY5Hjolsi6gdBYXf64OVnfG4IR2VfbuLsL1u524O AewHkTcZWR5CRZWzV4PsQS2P6QQz6BEVcRvceyAs5foBTs0bWGDQQmRGqUdqeW3KxU Zu7jUXy0Tz6bw== From: Gabriel Krisman Bertazi To: tytso@mit.edu, adilger.kernel@dilger.ca, jaegeuk@kernel.org, ebiggers@kernel.org Cc: linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, Gabriel Krisman Bertazi , kernel@collabora.com Subject: [PATCH v5 8/8] f2fs: Move CONFIG_UNICODE defguards into the code flow Date: Wed, 18 May 2022 13:23:20 -0400 Message-Id: <20220518172320.333617-9-krisman@collabora.com> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220518172320.333617-1-krisman@collabora.com> References: <20220518172320.333617-1-krisman@collabora.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Instead of a bunch of ifdefs, make the unicode built checks part of the code flow where possible, as requested by Torvalds. Signed-off-by: Gabriel Krisman Bertazi --- Changes since v4: - Drop stub removal for !CONFIG_UNICODE case (eric) --- fs/f2fs/namei.c | 11 +++++------ fs/f2fs/super.c | 8 ++++---- 2 files changed, 9 insertions(+), 10 deletions(-) diff --git a/fs/f2fs/namei.c b/fs/f2fs/namei.c index 5f213f05556d..8567a9045df1 100644 --- a/fs/f2fs/namei.c +++ b/fs/f2fs/namei.c @@ -561,8 +561,7 @@ static struct dentry *f2fs_lookup(struct inode *dir, struct dentry *dentry, goto out_iput; } out_splice: -#if IS_ENABLED(CONFIG_UNICODE) - if (!inode && IS_CASEFOLDED(dir)) { + if (IS_ENABLED(CONFIG_UNICODE) && !inode && IS_CASEFOLDED(dir)) { /* Eventually we want to call d_add_ci(dentry, NULL) * for negative dentries in the encoding case as * well. For now, prevent the negative dentry @@ -571,7 +570,7 @@ static struct dentry *f2fs_lookup(struct inode *dir, struct dentry *dentry, trace_f2fs_lookup_end(dir, dentry, ino, err); return NULL; } -#endif + new = d_splice_alias(inode, dentry); err = PTR_ERR_OR_ZERO(new); trace_f2fs_lookup_end(dir, dentry, ino, !new ? -ENOENT : err); @@ -622,16 +621,16 @@ static int f2fs_unlink(struct inode *dir, struct dentry *dentry) goto fail; } f2fs_delete_entry(de, page, dir, inode); -#if IS_ENABLED(CONFIG_UNICODE) + /* VFS negative dentries are incompatible with Encoding and * Case-insensitiveness. Eventually we'll want avoid * invalidating the dentries here, alongside with returning the * negative dentries at f2fs_lookup(), when it is better * supported by the VFS for the CI case. */ - if (IS_CASEFOLDED(dir)) + if (IS_ENABLED(CONFIG_UNICODE) && IS_CASEFOLDED(dir)) d_invalidate(dentry); -#endif + f2fs_unlock_op(sbi); if (IS_DIRSYNC(dir)) diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index baefd398ec1a..b17bd7a70d53 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -283,7 +283,7 @@ struct kmem_cache *f2fs_cf_name_slab; static int __init f2fs_create_casefold_cache(void) { f2fs_cf_name_slab = f2fs_kmem_cache_create("f2fs_casefolded_name", - F2FS_NAME_LEN); + F2FS_NAME_LEN); if (!f2fs_cf_name_slab) return -ENOMEM; return 0; @@ -1259,13 +1259,13 @@ static int parse_options(struct super_block *sb, char *options, bool is_remount) return -EINVAL; } #endif -#if !IS_ENABLED(CONFIG_UNICODE) - if (f2fs_sb_has_casefold(sbi)) { + + if (!IS_ENABLED(CONFIG_UNICODE) && f2fs_sb_has_casefold(sbi)) { f2fs_err(sbi, "Filesystem with casefold feature cannot be mounted without CONFIG_UNICODE"); return -EINVAL; } -#endif + /* * The BLKZONED feature indicates that the drive was formatted with * zone alignment optimization. This is optional for host-aware -- 2.36.1