1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef _BCACHEFS_STR_HASH_H
3 #define _BCACHEFS_STR_HASH_H
5 #include "btree_iter.h"
6 #include "btree_update.h"
13 #include <linux/crc32c.h>
14 #include <crypto/hash.h>
15 #include <crypto/sha.h>
17 struct bch_hash_info {
21 SIPHASH_KEY siphash_key;
25 static inline struct bch_hash_info
26 bch2_hash_info_init(struct bch_fs *c,
27 const struct bch_inode_unpacked *bi)
30 struct bch_hash_info info = {
31 .type = (bi->bi_flags >> INODE_STR_HASH_OFFSET) &
32 ~(~0U << INODE_STR_HASH_BITS)
36 case BCH_STR_HASH_CRC32C:
37 case BCH_STR_HASH_CRC64:
38 info.crc_key = bi->bi_hash_seed;
40 case BCH_STR_HASH_SIPHASH: {
41 SHASH_DESC_ON_STACK(desc, c->sha256);
42 u8 digest[SHA256_DIGEST_SIZE];
44 desc->tfm = c->sha256;
46 crypto_shash_digest(desc, (void *) &bi->bi_hash_seed,
47 sizeof(bi->bi_hash_seed), digest);
48 memcpy(&info.siphash_key, digest, sizeof(info.siphash_key));
58 struct bch_str_hash_ctx {
66 static inline void bch2_str_hash_init(struct bch_str_hash_ctx *ctx,
67 const struct bch_hash_info *info)
70 case BCH_STR_HASH_CRC32C:
71 ctx->crc32c = crc32c(~0, &info->crc_key, sizeof(info->crc_key));
73 case BCH_STR_HASH_CRC64:
74 ctx->crc64 = crc64_be(~0, &info->crc_key, sizeof(info->crc_key));
76 case BCH_STR_HASH_SIPHASH:
77 SipHash24_Init(&ctx->siphash, &info->siphash_key);
84 static inline void bch2_str_hash_update(struct bch_str_hash_ctx *ctx,
85 const struct bch_hash_info *info,
86 const void *data, size_t len)
89 case BCH_STR_HASH_CRC32C:
90 ctx->crc32c = crc32c(ctx->crc32c, data, len);
92 case BCH_STR_HASH_CRC64:
93 ctx->crc64 = crc64_be(ctx->crc64, data, len);
95 case BCH_STR_HASH_SIPHASH:
96 SipHash24_Update(&ctx->siphash, data, len);
103 static inline u64 bch2_str_hash_end(struct bch_str_hash_ctx *ctx,
104 const struct bch_hash_info *info)
106 switch (info->type) {
107 case BCH_STR_HASH_CRC32C:
109 case BCH_STR_HASH_CRC64:
110 return ctx->crc64 >> 1;
111 case BCH_STR_HASH_SIPHASH:
112 return SipHash24_End(&ctx->siphash) >> 1;
118 struct bch_hash_desc {
119 enum btree_id btree_id;
122 u64 (*hash_key)(const struct bch_hash_info *, const void *);
123 u64 (*hash_bkey)(const struct bch_hash_info *, struct bkey_s_c);
124 bool (*cmp_key)(struct bkey_s_c, const void *);
125 bool (*cmp_bkey)(struct bkey_s_c, struct bkey_s_c);
128 static __always_inline struct btree_iter *
129 bch2_hash_lookup(struct btree_trans *trans,
130 const struct bch_hash_desc desc,
131 const struct bch_hash_info *info,
132 u64 inode, const void *key,
135 struct btree_iter *iter;
139 for_each_btree_key(trans, iter, desc.btree_id,
140 POS(inode, desc.hash_key(info, key)),
141 BTREE_ITER_SLOTS|flags, k, ret) {
142 if (iter->pos.inode != inode)
145 if (k.k->type == desc.key_type) {
146 if (!desc.cmp_key(k, key))
148 } else if (k.k->type == KEY_TYPE_whiteout) {
151 /* hole, not found */
156 return ERR_PTR(ret ?: -ENOENT);
159 static __always_inline struct btree_iter *
160 bch2_hash_hole(struct btree_trans *trans,
161 const struct bch_hash_desc desc,
162 const struct bch_hash_info *info,
163 u64 inode, const void *key)
165 struct btree_iter *iter;
169 for_each_btree_key(trans, iter, desc.btree_id,
170 POS(inode, desc.hash_key(info, key)),
171 BTREE_ITER_SLOTS|BTREE_ITER_INTENT, k, ret) {
172 if (iter->pos.inode != inode)
175 if (k.k->type != desc.key_type)
179 return ERR_PTR(ret ?: -ENOSPC);
182 static __always_inline
183 int bch2_hash_needs_whiteout(struct btree_trans *trans,
184 const struct bch_hash_desc desc,
185 const struct bch_hash_info *info,
186 struct btree_iter *start)
188 struct btree_iter *iter;
192 iter = bch2_trans_copy_iter(trans, start);
194 return PTR_ERR(iter);
196 bch2_btree_iter_next_slot(iter);
198 for_each_btree_key_continue(iter, BTREE_ITER_SLOTS, k, ret) {
199 if (k.k->type != desc.key_type &&
200 k.k->type != KEY_TYPE_whiteout)
203 if (k.k->type == desc.key_type &&
204 desc.hash_bkey(info, k) <= start->pos.offset) {
205 iter->flags |= BTREE_ITER_KEEP_UNTIL_COMMIT;
211 bch2_trans_iter_put(trans, iter);
215 static __always_inline
216 int bch2_hash_set(struct btree_trans *trans,
217 const struct bch_hash_desc desc,
218 const struct bch_hash_info *info,
219 u64 inode, struct bkey_i *insert, int flags)
221 struct btree_iter *iter, *slot = NULL;
226 for_each_btree_key(trans, iter, desc.btree_id,
227 POS(inode, desc.hash_bkey(info, bkey_i_to_s_c(insert))),
228 BTREE_ITER_SLOTS|BTREE_ITER_INTENT, k, ret) {
229 if (iter->pos.inode != inode)
232 if (k.k->type == desc.key_type) {
233 if (!desc.cmp_bkey(k, bkey_i_to_s_c(insert)))
236 /* hash collision: */
241 !(flags & BCH_HASH_SET_MUST_REPLACE)) {
242 slot = bch2_trans_copy_iter(trans, iter);
244 return PTR_ERR(slot);
247 if (k.k->type != KEY_TYPE_whiteout)
255 bch2_trans_iter_put(trans, slot);
256 bch2_trans_iter_put(trans, iter);
263 if (!found && (flags & BCH_HASH_SET_MUST_REPLACE)) {
265 } else if (found && (flags & BCH_HASH_SET_MUST_CREATE)) {
271 insert->k.p = iter->pos;
272 bch2_trans_update(trans, iter, insert);
278 static __always_inline
279 int bch2_hash_delete_at(struct btree_trans *trans,
280 const struct bch_hash_desc desc,
281 const struct bch_hash_info *info,
282 struct btree_iter *iter)
284 struct bkey_i *delete;
287 ret = bch2_hash_needs_whiteout(trans, desc, info, iter);
291 delete = bch2_trans_kmalloc(trans, sizeof(*delete));
293 return PTR_ERR(delete);
295 bkey_init(&delete->k);
296 delete->k.p = iter->pos;
297 delete->k.type = ret ? KEY_TYPE_whiteout : KEY_TYPE_deleted;
299 bch2_trans_update(trans, iter, delete);
303 static __always_inline
304 int bch2_hash_delete(struct btree_trans *trans,
305 const struct bch_hash_desc desc,
306 const struct bch_hash_info *info,
307 u64 inode, const void *key)
309 struct btree_iter *iter;
311 iter = bch2_hash_lookup(trans, desc, info, inode, key,
314 return PTR_ERR(iter);
316 return bch2_hash_delete_at(trans, desc, info, iter);
319 #endif /* _BCACHEFS_STR_HASH_H */