From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C9954CD37A7 for ; Tue, 3 Sep 2024 16:08:55 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 46A558D01A1; Tue, 3 Sep 2024 12:08:55 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 41AE08D016E; Tue, 3 Sep 2024 12:08:55 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 295528D01A1; Tue, 3 Sep 2024 12:08:55 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 04FFE8D016E for ; Tue, 3 Sep 2024 12:08:54 -0400 (EDT) Received: from smtpin14.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 6CF2716065A for ; Tue, 3 Sep 2024 16:08:54 +0000 (UTC) X-FDA: 82523910588.14.3803E34 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.223.131]) by imf27.hostedemail.com (Postfix) with ESMTP id 112634001D for ; Tue, 3 Sep 2024 16:08:51 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=suse.de header.s=susede2_rsa header.b=Yjho3fbp; dkim=pass header.d=suse.de header.s=susede2_ed25519 header.b=zyRKotJ9; dkim=pass header.d=suse.de header.s=susede2_rsa header.b=Yjho3fbp; dkim=pass header.d=suse.de header.s=susede2_ed25519 header.b=zyRKotJ9; dmarc=pass (policy=none) header.from=suse.de; spf=pass (imf27.hostedemail.com: domain of krisman@suse.de designates 195.135.223.131 as permitted sender) smtp.mailfrom=krisman@suse.de ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1725379626; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=AoFSrWjdDNy22qcLidqFmCW1sMDZc4/A6zH8LeBwn6k=; b=aCn6kt1iFXjI1UEQomjtaMFWPHlS6kDF/g6FchrMZgHIduBfxvAtxpAQus3l6+Ytgodo0f Fe3vvW+1Mzc6pZlfgmwn/6xt1I3bMaHLBp+SIsh1FHePYTvFR8+JHMEEjYEJYPwqO6sO9P JDs2pVI5aeAvrvAA+Ojc0ZyZe5YctvE= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1725379626; a=rsa-sha256; cv=none; b=unuKqkX++2Okw6+UPOFMdeac5Cwl5c9wGbT7M6UWx8A1WJAr1PwkifPGarBvJFHCs/bhww mbFKfx9+Q8PITeDBwFFCd0PSWVIT2kXCZ40CPcyU9RtEDS1T2Ts02o2gqmCWr+fI4dafnK vawjauOwZTE9sL0LG5KeHuyNQUbeeHs= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=pass header.d=suse.de header.s=susede2_rsa header.b=Yjho3fbp; dkim=pass header.d=suse.de header.s=susede2_ed25519 header.b=zyRKotJ9; dkim=pass header.d=suse.de header.s=susede2_rsa header.b=Yjho3fbp; dkim=pass header.d=suse.de header.s=susede2_ed25519 header.b=zyRKotJ9; dmarc=pass (policy=none) header.from=suse.de; spf=pass (imf27.hostedemail.com: domain of krisman@suse.de designates 195.135.223.131 as permitted sender) smtp.mailfrom=krisman@suse.de Received: from imap1.dmz-prg2.suse.org (unknown [10.150.64.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 861F01F397; Tue, 3 Sep 2024 16:08:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1725379730; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AoFSrWjdDNy22qcLidqFmCW1sMDZc4/A6zH8LeBwn6k=; b=Yjho3fbpkR4IMGgIED7Wouh0+C2fmvIbh0q/cF7h4fBuh1aRQkT07PlSUZKTbA/GK93vPC +H13hk6ZBVtD2YY59UoKnKcmNSmQkICqqwX+14Q3NGczb2IJF1hzDTeDyHSMnlTeRLJVgj 1NK0+u1tptSZw//ePc5B9ubNyHrXTlI= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1725379730; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AoFSrWjdDNy22qcLidqFmCW1sMDZc4/A6zH8LeBwn6k=; b=zyRKotJ99/NKMgexny5KAWN2jJD5EQjT7CfPtJjxyzhdiOrPSVMZ8Lirlsu1b0srlHiUEt d5MKIzrNruTNNMDw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1725379730; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AoFSrWjdDNy22qcLidqFmCW1sMDZc4/A6zH8LeBwn6k=; b=Yjho3fbpkR4IMGgIED7Wouh0+C2fmvIbh0q/cF7h4fBuh1aRQkT07PlSUZKTbA/GK93vPC +H13hk6ZBVtD2YY59UoKnKcmNSmQkICqqwX+14Q3NGczb2IJF1hzDTeDyHSMnlTeRLJVgj 1NK0+u1tptSZw//ePc5B9ubNyHrXTlI= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1725379730; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AoFSrWjdDNy22qcLidqFmCW1sMDZc4/A6zH8LeBwn6k=; b=zyRKotJ99/NKMgexny5KAWN2jJD5EQjT7CfPtJjxyzhdiOrPSVMZ8Lirlsu1b0srlHiUEt d5MKIzrNruTNNMDw== Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 455E713A52; Tue, 3 Sep 2024 16:08:50 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id aaYIC5I012ZUewAAD6G6ig (envelope-from ); Tue, 03 Sep 2024 16:08:50 +0000 From: Gabriel Krisman Bertazi To: =?utf-8?Q?Andr=C3=A9?= Almeida Cc: Hugh Dickins , Andrew Morton , Alexander Viro , Christian Brauner , Jan Kara , krisman@kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, kernel-dev@igalia.com, Daniel Rosenberg , smcv@collabora.com, Christoph Hellwig Subject: Re: [PATCH v2 5/8] tmpfs: Add casefold lookup support In-Reply-To: <20240902225511.757831-6-andrealmeid@igalia.com> (=?utf-8?Q?=22Andr=C3=A9?= Almeida"'s message of "Mon, 2 Sep 2024 19:55:07 -0300") References: <20240902225511.757831-1-andrealmeid@igalia.com> <20240902225511.757831-6-andrealmeid@igalia.com> Date: Tue, 03 Sep 2024 12:08:41 -0400 Message-ID: <87plpkhg8m.fsf@mailhost.krisman.be> User-Agent: Gnus/5.13 (Gnus v5.13) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 112634001D X-Stat-Signature: f7p6as636mri6eprh81ejf96cpw3x74w X-Rspam-User: X-HE-Tag: 1725379731-787238 X-HE-Meta: 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 CJrYrMVc kZdF6q5/Y3312f7WcNgNwHOKfVKfrM9WfVNv+qShVRra2KUe0Q3sNvKW+FZy7UoFiwAppE7G6deciv+PUyZq1P/WblseicE/xpwW1QVtY/gl0cWCM/Ud661B4mHY0f2PqQ6kNDF0pwWReA3wQI5u3fhE09vt7jQH9fLCgLFZDh5u0URxr9dZen/CSz21Fxo9hzoCgPrt4yDftEJ5849mVXi2G+TIBw/j3bdZWNPlGhVwaxSDuQRVdUs2kWfrlz4uo/E4365sH+TrSE1pnq4qApinZl3q6zhBazWx1dw6mVH0MTGlVDZFbxuFAMSHC8UuflQvO X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Andr=C3=A9 Almeida writes: > Enable casefold lookup in tmpfs, based on the enconding defined by > userspace. That means that instead of comparing byte per byte a file > name, it compares to a case-insensitive equivalent of the Unicode > string. > > * Dcache handling > > There's a special need when dealing with case-insensitive dentries. > First of all, we currently invalidated every negative casefold dentries. > That happens because currently VFS code has no proper support to deal > with that, giving that it could incorrectly reuse a previous filename > for a new file that has a casefold match. For instance, this could > happen: > > $ mkdir DIR > $ rm -r DIR > $ mkdir dir > $ ls > DIR/ > > And would be perceived as inconsistency from userspace point of view, > because even that we match files in a case-insensitive manner, we still > honor whatever is the initial filename. > > Along with that, tmpfs stores only the first equivalent name dentry used > in the dcache, preventing duplications of dentries in the dcache. The > d_compare() version for casefold files uses a normalized string, so the > filename under lookup will be compared to another normalized string for > the existing file, achieving a casefolded lookup. > > * Enabling casefold via mount options > > Most filesystems have their data stored in disk, so casefold option need > to be enabled when building a filesystem on a device (via mkfs). > However, as tmpfs is a RAM backed filesystem, there's no disk > information and thus no mkfs to store information about casefold. > > For tmpfs, create casefold options for mounting. Userspace can then > enable casefold support for a mount point using: > > $ mount -t tmpfs -o casefold=3Dutf8-12.1.0 fs_name mount_dir/ > > Userspace must set what Unicode standard is aiming to. The available > options depends on what the kernel Unicode subsystem supports. > > And for strict encoding: > > $ mount -t tmpfs -o casefold=3Dutf8-12.1.0,strict_encoding fs_name mount_= dir/ > > Strict encoding means that tmpfs will refuse to create invalid UTF-8 > sequences. When this option is not enabled, any invalid sequence will be > treated as an opaque byte sequence, ignoring the encoding thus not being > able to be looked up in a case-insensitive way. > > Signed-off-by: Andr=C3=A9 Almeida > --- > mm/shmem.c | 115 +++++++++++++++++++++++++++++++++++++++++++++++++++-- > 1 file changed, 111 insertions(+), 4 deletions(-) > > diff --git a/mm/shmem.c b/mm/shmem.c > index 5a77acf6ac6a..0f918010bc54 100644 > --- a/mm/shmem.c > +++ b/mm/shmem.c > @@ -40,6 +40,8 @@ > #include > #include > #include > +#include > +#include > #include "swap.h" >=20=20 > static struct vfsmount *shm_mnt __ro_after_init; > @@ -123,6 +125,8 @@ struct shmem_options { > bool noswap; > unsigned short quota_types; > struct shmem_quota_limits qlimits; > + struct unicode_map *encoding; > + bool strict_encoding; > #define SHMEM_SEEN_BLOCKS 1 > #define SHMEM_SEEN_INODES 2 > #define SHMEM_SEEN_HUGE 4 > @@ -3427,6 +3431,11 @@ shmem_mknod(struct mnt_idmap *idmap, struct inode = *dir, > if (IS_ERR(inode)) > return PTR_ERR(inode); >=20=20 > +#if IS_ENABLED(CONFIG_UNICODE) > + if (!utf8_check_strict_name(dir, &dentry->d_name)) > + return -EINVAL; > +#endif Please, fold it into the code when possible: if (IS_ENABLED(CONFIG_UNICODE) && IS_CASEFOLDED(dir)) > + > error =3D simple_acl_create(dir, inode); > if (error) > goto out_iput; > @@ -3442,7 +3451,12 @@ shmem_mknod(struct mnt_idmap *idmap, struct inode = *dir, > dir->i_size +=3D BOGO_DIRENT_SIZE; > inode_set_mtime_to_ts(dir, inode_set_ctime_current(dir)); > inode_inc_iversion(dir); > - d_instantiate(dentry, inode); > + > + if (IS_CASEFOLDED(dir)) If you have if (IS_ENABLED(CONFIG_UNICODE) && IS_CASEFOLDED(dir)) It can be optimized out when CONFIG_UNICODE=3Dn. > + d_add(dentry, inode); > + else > + d_instantiate(dentry, inode); > dget(dentry); /* Extra count - pin the dentry in core */ > return error; >=20=20 > @@ -3533,7 +3547,10 @@ static int shmem_link(struct dentry *old_dentry, s= truct inode *dir, > inc_nlink(inode); > ihold(inode); /* New dentry reference */ > dget(dentry); /* Extra pinning count for the created dentry */ > - d_instantiate(dentry, inode); > + if (IS_CASEFOLDED(dir)) > + d_add(dentry, inode); > + else > + d_instantiate(dentry, inode); > out: > return ret; > } > @@ -3553,6 +3570,14 @@ static int shmem_unlink(struct inode *dir, struct = dentry *dentry) > inode_inc_iversion(dir); > drop_nlink(inode); > dput(dentry); /* Undo the count from "create" - does all the work */ > + > + /* > + * For now, VFS can't deal with case-insensitive negative dentries, so > + * we invalidate them > + */ > + if (IS_CASEFOLDED(dir)) > + d_invalidate(dentry); > + likewise and also below. > return 0; > } >=20=20 > @@ -3697,7 +3722,10 @@ static int shmem_symlink(struct mnt_idmap *idmap, = struct inode *dir, > dir->i_size +=3D BOGO_DIRENT_SIZE; > inode_set_mtime_to_ts(dir, inode_set_ctime_current(dir)); > inode_inc_iversion(dir); > - d_instantiate(dentry, inode); > + if (IS_CASEFOLDED(dir)) > + d_add(dentry, inode); > + else > + d_instantiate(dentry, inode); > dget(dentry); > return 0; >=20=20 > @@ -4050,6 +4078,8 @@ enum shmem_param { > Opt_usrquota_inode_hardlimit, > Opt_grpquota_block_hardlimit, > Opt_grpquota_inode_hardlimit, > + Opt_casefold, > + Opt_strict_encoding, > }; >=20=20 > static const struct constant_table shmem_param_enums_huge[] =3D { > @@ -4081,9 +4111,47 @@ const struct fs_parameter_spec shmem_fs_parameters= [] =3D { > fsparam_string("grpquota_block_hardlimit", Opt_grpquota_block_hardlimit= ), > fsparam_string("grpquota_inode_hardlimit", Opt_grpquota_inode_hardlimit= ), > #endif > + fsparam_string("casefold", Opt_casefold), > + fsparam_flag ("strict_encoding", Opt_strict_encoding), > {} > }; >=20=20 > +#if IS_ENABLED(CONFIG_UNICODE) > +static int shmem_parse_opt_casefold(struct fs_context *fc, struct fs_par= ameter *param) > +{ > + struct shmem_options *ctx =3D fc->fs_private; > + unsigned int maj =3D 0, min =3D 0, rev =3D 0, version_number; > + char version[10]; > + int ret; > + struct unicode_map *encoding; > + > + if (strncmp(param->string, "utf8-", 5)) > + return invalfc(fc, "Only utf8 encondings are supported"); > + ret =3D strscpy(version, param->string + 5, sizeof(version)); the extra buffer and the copy seem unnecessary. It won't live past this function anyway. Can you just pass the offseted param->string to utf8_parse_version? > + if (ret < 0) > + return invalfc(fc, "Invalid enconding argument: %s", > + param->string); enconding=3D>encoding > + > + ret =3D utf8_parse_version(version, &maj, &min, &rev); > + if (ret) > + return invalfc(fc, "Invalid utf8 version: %s", version); > + version_number =3D UNICODE_AGE(maj, min, rev); > + encoding =3D utf8_load(version_number); utf8_load(UNICODE_AGE(maj, min, rev)); and drop version_number. > + if (IS_ERR(encoding)) > + return invalfc(fc, "Invalid utf8 version: %s", version); > + pr_info("tmpfs: Using encoding provided by mount options: %s\n", > + param->string); > + ctx->encoding =3D encoding; > + > + return 0; > +} > +#else > +static int shmem_parse_opt_casefold(struct fs_context *fc, struct fs_par= ameter *param) > +{ > + return invalfc(fc, "tmpfs: No kernel support for casefold filesystems\n= "); > +} > +#endif > + > static int shmem_parse_one(struct fs_context *fc, struct fs_parameter *p= aram) > { > struct shmem_options *ctx =3D fc->fs_private; > @@ -4242,6 +4310,11 @@ static int shmem_parse_one(struct fs_context *fc, = struct fs_parameter *param) > "Group quota inode hardlimit too large."); > ctx->qlimits.grpquota_ihardlimit =3D size; > break; > + case Opt_casefold: > + return shmem_parse_opt_casefold(fc, param); > + case Opt_strict_encoding: > + ctx->strict_encoding =3D true; > + break; > } > return 0; >=20=20 > @@ -4471,6 +4544,11 @@ static void shmem_put_super(struct super_block *sb) > { > struct shmem_sb_info *sbinfo =3D SHMEM_SB(sb); >=20=20 > +#if IS_ENABLED(CONFIG_UNICODE) > + if (sb->s_encoding) > + utf8_unload(sb->s_encoding); > +#endif > + > #ifdef CONFIG_TMPFS_QUOTA > shmem_disable_quotas(sb); > #endif > @@ -4515,6 +4593,16 @@ static int shmem_fill_super(struct super_block *sb= , struct fs_context *fc) > } > sb->s_export_op =3D &shmem_export_ops; > sb->s_flags |=3D SB_NOSEC | SB_I_VERSION; > + > +#if IS_ENABLED(CONFIG_UNICODE) > + if (ctx->encoding) { > + sb->s_encoding =3D ctx->encoding; > + generic_set_sb_d_ops(sb); > + if (ctx->strict_encoding) > + sb->s_encoding_flags =3D SB_ENC_STRICT_MODE_FL; > + } > +#endif > + > #else > sb->s_flags |=3D SB_NOUSER; > #endif > @@ -4704,11 +4792,28 @@ static const struct inode_operations shmem_inode_= operations =3D { > #endif > }; >=20=20 > +static struct dentry *shmem_lookup(struct inode *dir, struct dentry *den= try, unsigned int flags) > +{ > + if (dentry->d_name.len > NAME_MAX) > + return ERR_PTR(-ENAMETOOLONG); > + > + /* > + * For now, VFS can't deal with case-insensitive negative dentries, so > + * we prevent them from being created > + */ > + if (IS_CASEFOLDED(dir)) > + return NULL; > + > + d_add(dentry, NULL); > + > + return NULL; > +} > + > static const struct inode_operations shmem_dir_inode_operations =3D { > #ifdef CONFIG_TMPFS > .getattr =3D shmem_getattr, > .create =3D shmem_create, > - .lookup =3D simple_lookup, > + .lookup =3D shmem_lookup, simple_lookup sets the dentry operations to enable a custom d_delete, but this disables that. Without it, negative dentries will linger after the filesystem is gone. We want to preserve the current behavior both for normal and casefolding directories. You need a new flavor of generic_ci_dentry_ops with that hook for casefolding shmem, as well as ensure &simple_dentry_operations is still set for every dentry in non-casefolding volumes. > .link =3D shmem_link, > .unlink =3D shmem_unlink, > .symlink =3D shmem_symlink, > @@ -4791,6 +4896,8 @@ int shmem_init_fs_context(struct fs_context *fc) > ctx->uid =3D current_fsuid(); > ctx->gid =3D current_fsgid(); >=20=20 > + ctx->encoding =3D NULL; > + > fc->fs_private =3D ctx; > fc->ops =3D &shmem_fs_context_ops; > return 0; --=20 Gabriel Krisman Bertazi