Received: by 2002:a05:7412:1e0b:b0:fc:a2b0:25d7 with SMTP id kr11csp1203050rdb; Fri, 16 Feb 2024 08:13:01 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWFpiDl3hlDxIjse+NLqurIAdKNQ0XXuGtnEt4pJwy0XnU9XMMDsd3Xdo33Lbu616NQEdVTgWDcZxKLCNaj7t8PCnKj9seN1WwiQrBLRQ== X-Google-Smtp-Source: AGHT+IEuj6v2VrlZPKOI98LmN52uxkVSP1SZJddzE9EcOA+39LLu82UXzwNE043L5ugd6SkZWKn4 X-Received: by 2002:a17:902:eb8e:b0:1db:a53c:e5d4 with SMTP id q14-20020a170902eb8e00b001dba53ce5d4mr3173243plg.60.1708099981677; Fri, 16 Feb 2024 08:13:01 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708099981; cv=pass; d=google.com; s=arc-20160816; b=Zzx9Vq1DxHL3Lz2uX/SGMVaXEJUXg4CUeQa8OldE5rgt/TP1nz8pDm10nrOFOndDLL imwJMlQF/c4wbgCH5t5PgwyennCFCywJZZb8uWlldcPB+r3z3aAPlV3wiofr7tSno9Cx a4EnOmN8VCdvGu3gUywG9Oe3p/8ig18cBg7+nAbH3WwgI2SvTR/TvvGbQf7O9hUyIK/s /sh4Vj9mZYOwdWvCz9MY9SXkQID5Gnt4E/rigihhfj9MiG/4wet6A7AwX4PNtSyZcZvp D234QUwYYf9u47jCe0oQgVk5L3/G2TA3HocpDtMgl8Cqc6KKKtsANnPhQplMCkhk2dyE htZA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:message-id:date:references:organization:in-reply-to :subject:cc:to:from:dkim-signature:dkim-signature:dkim-signature :dkim-signature; bh=Pi8lq9P+ufiU0YNIcnckIE4t9aHDgpwD+S7gt0Xq2s4=; fh=jnsjUAmjZWbeZE/H1AAeh+vTEwvsR9nMcBiAwgkpPss=; b=d8ISIaIbpsvGZX9Ac0+LbhFUBjjc7H2LXxkiijWQzXHI5s/cmih8DiQcIdSJdA78bR iDl1w/D3O/d2l8By5GvF/WIiYUt5VY/0IE58ETRXfQn/hOfrBvXrN7PTny0pUt6/cl6m PSWxboF+p0PmGKdM+uQPnGKqF7ha85buXAB/VYvGXyVZR7zQ6CXj6BqUgnzQ/GrwOfb/ 1UF0F1f4J1DQQvcbxb5M4HaAUwf8gdM/fEExFYF0y12YEomb6JYZFTdGet8Yr4XEsy4m XVc0+uz+9GTDryyLp0Yd/cVorXc0c/CYnKfyDVJlt2P/hsez0XMzLf0sS717R7flRMrn jMQw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=cmjAfG3u; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=UNdzAoQf; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=sarZ3cqX; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; arc=pass (i=1 spf=pass spfdomain=suse.de dkim=pass dkdomain=suse.de dkim=pass dkdomain=suse.de dmarc=pass fromdomain=suse.de); spf=pass (google.com: domain of linux-ext4+bounces-1255-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-ext4+bounces-1255-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id h18-20020a170902f55200b001d91df66e24si75446plf.164.2024.02.16.08.13.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Feb 2024 08:13:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4+bounces-1255-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=cmjAfG3u; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=UNdzAoQf; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=sarZ3cqX; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; arc=pass (i=1 spf=pass spfdomain=suse.de dkim=pass dkdomain=suse.de dkim=pass dkdomain=suse.de dmarc=pass fromdomain=suse.de); spf=pass (google.com: domain of linux-ext4+bounces-1255-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-ext4+bounces-1255-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 4CE912841D0 for ; Fri, 16 Feb 2024 16:13:01 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 74B6312FB34; Fri, 16 Feb 2024 16:12:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b="cmjAfG3u"; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b="UNdzAoQf"; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b="sarZ3cqX"; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b="IsUGT/in" X-Original-To: linux-ext4@vger.kernel.org Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E6AF312C809; Fri, 16 Feb 2024 16:12:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=195.135.223.130 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708099973; cv=none; b=BwG0BfiCuO9WLUUudgNFAdITFd8Z5qZJSbGHxl+liORhI2yO98+a2brbhtkcVgzg+zSh7nwKVrkxZhvT5qbFICRFgdwXHX8ZIePl7veZnoeyMwyWU2IYYXNwvPljo6yyhVBNx4l1/KOZkMZe8XTLGjRZlJvxeP62zVtN5XTMNEc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708099973; c=relaxed/simple; bh=WPIDtCNbeVHUsJf0cC6yrergjz3xGHCU54yzOmDaAyc=; h=From:To:Cc:Subject:In-Reply-To:References:Date:Message-ID: MIME-Version:Content-Type; b=APIc3upEfN/C7D0doN0psw1fZ07epiYW+1JeL9gBHOUIxFHCZ/c8hLVv5mYoFwnP+MOh17CYVJ+dR7SfY6+lJcIpEnJkHZZSwUY8Z0yA7JJdyTqx8goL6XVQ0mBGhsagyN2FFrRmT4EmL16IRoQ7AWSSkfOljUTHeZ1GOXoOJSg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=suse.de; spf=pass smtp.mailfrom=suse.de; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b=cmjAfG3u; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b=UNdzAoQf; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b=sarZ3cqX; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b=IsUGT/in; arc=none smtp.client-ip=195.135.223.130 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=suse.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.de Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 04DBF21EEA; Fri, 16 Feb 2024 16:12:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1708099969; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Pi8lq9P+ufiU0YNIcnckIE4t9aHDgpwD+S7gt0Xq2s4=; b=cmjAfG3uCC0B6no8s5ahqc0GqQwbgBLS2EGp2wLZETvfD0cUAU/0zzPPj1E4MCUh24mySu aDo200WwtaLp910GBLSi5TWn+iVDRPkczpOQv36l07N/RQcZPrqtJmcD3mN++65oCC6Tth Ou51/4OBZ18I60osPmsZpknDk0ldQ4M= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1708099969; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Pi8lq9P+ufiU0YNIcnckIE4t9aHDgpwD+S7gt0Xq2s4=; b=UNdzAoQfC/VU4ARaHWRQuekDZJDf0iw5JMlz1yNJjdfak51TioV4KeQqCAslZBjOGeNLyj y8/MsARRjGfvNZCg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1708099967; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Pi8lq9P+ufiU0YNIcnckIE4t9aHDgpwD+S7gt0Xq2s4=; b=sarZ3cqXpjCZrzZ23HlNVm1ClShtyUcmnuwYxvbs1l3X9YSU9hlt8EeAPZCjd3ZnSADAwm 0qyzw1UDXbODTV0gxooMv3T3ykLxOkrtq353Ecpzf58b1v/j7sm1dmxAxk99ND1r96IGet fR5OsDED6qFW7/gjvrBMu2Ug+7vnWIY= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1708099967; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Pi8lq9P+ufiU0YNIcnckIE4t9aHDgpwD+S7gt0Xq2s4=; b=IsUGT/inEDt8w5Z61VyEU4xzBI6VXq02w2tTaI6lApYrYQJGevjuqb6Run8B6jSB+Rl59g ca4Q7pudp7yjfEBQ== Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id BCF8D13A39; Fri, 16 Feb 2024 16:12:46 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id yfX+KH6Jz2U9TAAAD6G6ig (envelope-from ); Fri, 16 Feb 2024 16:12:46 +0000 From: Gabriel Krisman Bertazi To: Eugen Hristev Cc: tytso@mit.edu, adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org, jaegeuk@kernel.org, chao@kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, kernel@collabora.com, viro@zeniv.linux.org.uk, brauner@kernel.org, jack@suse.cz, Gabriel Krisman Bertazi Subject: Re: [PATCH v10 3/8] libfs: Introduce case-insensitive string comparison helper In-Reply-To: <20240215042654.359210-4-eugen.hristev@collabora.com> (Eugen Hristev's message of "Thu, 15 Feb 2024 06:26:49 +0200") Organization: SUSE References: <20240215042654.359210-1-eugen.hristev@collabora.com> <20240215042654.359210-4-eugen.hristev@collabora.com> Date: Fri, 16 Feb 2024 11:12:37 -0500 Message-ID: <87zfw0bd6y.fsf@mailhost.krisman.be> User-Agent: Gnus/5.13 (Gnus v5.13) Precedence: bulk X-Mailing-List: linux-ext4@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain Authentication-Results: smtp-out1.suse.de; dkim=pass header.d=suse.de header.s=susede2_rsa header.b=sarZ3cqX; dkim=pass header.d=suse.de header.s=susede2_ed25519 header.b="IsUGT/in" X-Spamd-Result: default: False [-3.31 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; HAS_ORG_HEADER(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_SIGNED(0.00)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519]; DKIM_TRACE(0.00)[suse.de:+]; MX_GOOD(-0.01)[]; RCPT_COUNT_TWELVE(0.00)[14]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-3.00)[100.00%] X-Rspamd-Server: rspamd1.dmz-prg2.suse.org X-Rspamd-Queue-Id: 04DBF21EEA X-Spam-Level: X-Spam-Score: -3.31 X-Spam-Flag: NO Eugen Hristev writes: > From: Gabriel Krisman Bertazi > > generic_ci_match can be used by case-insensitive filesystems to compare > strings under lookup with dirents in a case-insensitive way. This > function is currently reimplemented by each filesystem supporting > casefolding, so this reduces code duplication in filesystem-specific > code. > > Signed-off-by: Gabriel Krisman Bertazi > [eugen.hristev@collabora.com: rework to first test the exact match] > Signed-off-by: Eugen Hristev > --- > fs/libfs.c | 80 ++++++++++++++++++++++++++++++++++++++++++++++ > include/linux/fs.h | 4 +++ > 2 files changed, 84 insertions(+) > > diff --git a/fs/libfs.c b/fs/libfs.c > index bb18884ff20e..82871fa1b066 100644 > --- a/fs/libfs.c > +++ b/fs/libfs.c > @@ -1773,6 +1773,86 @@ static const struct dentry_operations generic_ci_dentry_ops = { > .d_hash = generic_ci_d_hash, > .d_compare = generic_ci_d_compare, > }; > + > +/** > + * generic_ci_match() - Match a name (case-insensitively) with a dirent. > + * This is a filesystem helper for comparison with directory entries. > + * generic_ci_d_compare should be used in VFS' ->d_compare instead. > + * > + * @parent: Inode of the parent of the dirent under comparison > + * @name: name under lookup. > + * @folded_name: Optional pre-folded name under lookup > + * @de_name: Dirent name. > + * @de_name_len: dirent name length. > + * > + * Since this need a respin, mind dropping the extra empty line here? > + * Test whether a case-insensitive directory entry matches the filename > + * being searched. If @folded_name is provided, it is used instead of > + * recalculating the casefold of @name. > + * > + * Return: > 0 if the directory entry matches, 0 if it doesn't match, or > + * < 0 on error. > + */ > +int generic_ci_match(const struct inode *parent, > + const struct qstr *name, > + const struct qstr *folded_name, > + const u8 *de_name, u32 de_name_len) > +{ > + const struct super_block *sb = parent->i_sb; > + const struct unicode_map *um = sb->s_encoding; > + struct fscrypt_str decrypted_name = FSTR_INIT(NULL, de_name_len); > + struct qstr dirent = QSTR_INIT(de_name, de_name_len); > + int res; > + > + if (IS_ENCRYPTED(parent)) { > + const struct fscrypt_str encrypted_name = > + FSTR_INIT((u8 *) de_name, de_name_len); > + > + if (WARN_ON_ONCE(!fscrypt_has_encryption_key(parent))) > + return -EINVAL; > + > + decrypted_name.name = kmalloc(de_name_len, GFP_KERNEL); > + if (!decrypted_name.name) > + return -ENOMEM; > + res = fscrypt_fname_disk_to_usr(parent, 0, 0, &encrypted_name, > + &decrypted_name); > + if (res < 0) > + goto out; > + dirent.name = decrypted_name.name; > + dirent.len = decrypted_name.len; > + } > + > + /* > + * Attempt a case-sensitive match first. It is cheaper and > + * should cover most lookups, including all the sane > + * applications that expect a case-sensitive filesystem. > + * > + * This comparison is safe under RCU because the caller > + * guarantees the consistency between str and len. See > + * __d_lookup_rcu_op_compare() for details. > + */ This paragraph doesn't really make sense here. It is originally from the d_compare hook, which can be called under RCU, but there is no RCU here. Also, here we are comparing the dirent with the name-under-lookup, name which is already safe. > + if (folded_name->name) { > + if (dirent.len == folded_name->len && > + !memcmp(folded_name->name, dirent.name, dirent.len)) { > + res = 1; > + goto out; > + } > + res = !utf8_strncasecmp_folded(um, folded_name, &dirent); Hmm, second thought on this. This will ignore errors from utf8_strncasecmp*, which CAN happen for the first time here, if the dirent itself is corrupted on disk (exactly why we have patch 6). Yes, ext4_match will drop the error, but we want to propagate it from here, such that the warning on patch 6 can trigger. This is why I did that match dance on the original submission. Sorry for suggesting it. We really want to get the error from utf8 and propagate it if it is negative. basically: res > 0: match res == 0: no match. res < 0: propagate error and let the caller handle it > + } else { > + if (dirent.len == name->len && > + !memcmp(name->name, dirent.name, dirent.len) && > + (!sb_has_strict_encoding(sb) || !utf8_validate(um, name))) { > + res = 1; > + goto out; > + } > + res = !utf8_strncasecmp(um, name, &dirent); > + } > + > +out: > + kfree(decrypted_name.name); > + return res; > +} > +EXPORT_SYMBOL(generic_ci_match); > #endif > > #ifdef CONFIG_FS_ENCRYPTION > diff --git a/include/linux/fs.h b/include/linux/fs.h > index 820b93b2917f..7af691ff8d44 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -3296,6 +3296,10 @@ extern int generic_file_fsync(struct file *, loff_t, loff_t, int); > extern int generic_check_addressable(unsigned, u64); > > extern void generic_set_encrypted_ci_d_ops(struct dentry *dentry); > +extern int generic_ci_match(const struct inode *parent, > + const struct qstr *name, > + const struct qstr *folded_name, > + const u8 *de_name, u32 de_name_len); > > static inline bool sb_has_encoding(const struct super_block *sb) > { -- Gabriel Krisman Bertazi