Re: [PATCH v5 4/9] ovl: Create ovl_casefold() to support casefolded strncmp()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Em 17/08/2025 11:33, Amir Goldstein escreveu:
On Thu, Aug 14, 2025 at 7:22 PM André Almeida <andrealmeid@xxxxxxxxxx> wrote:

To add overlayfs support casefold layers, create a new function
ovl_casefold(), to be able to do case-insensitive strncmp().

ovl_casefold() allocates a new buffer and stores the casefolded version
of the string on it. If the allocation or the casefold operation fails,
fallback to use the original string.

The case-insentive name is then used in the rb-tree search/insertion
operation. If the name is found in the rb-tree, the name can be
discarded and the buffer is freed. If the name isn't found, it's then
stored at struct ovl_cache_entry to be used later.

Signed-off-by: André Almeida <andrealmeid@xxxxxxxxxx>
---
Changes from v4:
  - Move the consumer/free buffer logic out to the caller
  - s/aux/c_name

Changes from v3:
  - Improve commit message text
  - s/OVL_NAME_LEN/NAME_MAX
  - drop #ifdef in favor of if(IS_ENABLED)
  - use new helper sb_encoding
  - merged patch "Store casefold name..." and "Create ovl_casefold()..."
  - Guard all the casefolding inside of IS_ENABLED(UNICODE)

Changes from v2:
- Refactor the patch to do a single kmalloc() per rb_tree operation
- Instead of casefolding the cache entry name everytime per strncmp(),
   casefold it once and reuse it for every strncmp().
---
  fs/overlayfs/readdir.c | 115 +++++++++++++++++++++++++++++++++++++++++--------
  1 file changed, 97 insertions(+), 18 deletions(-)

diff --git a/fs/overlayfs/readdir.c b/fs/overlayfs/readdir.c
index b65cdfce31ce27172d28d879559f1008b9c87320..803ac6a7516d0156ae7793ee1ff884dbbf2e20b0 100644
--- a/fs/overlayfs/readdir.c
+++ b/fs/overlayfs/readdir.c
@@ -27,6 +27,8 @@ struct ovl_cache_entry {
         bool is_upper;
         bool is_whiteout;
         bool check_xwhiteout;
+       const char *cf_name;
+       int cf_len;

We should also change these member names to c_name
Because they are the "compare/canonicalized" name, which
may or may not be casefolded.

         char name[];
  };

@@ -45,6 +47,7 @@ struct ovl_readdir_data {
         struct list_head *list;
         struct list_head middle;
         struct ovl_cache_entry *first_maybe_whiteout;
+       struct unicode_map *map;
         int count;
         int err;
         bool is_upper;
@@ -66,6 +69,27 @@ static struct ovl_cache_entry *ovl_cache_entry_from_node(struct rb_node *n)
         return rb_entry(n, struct ovl_cache_entry, node);
  }

+static int ovl_casefold(struct unicode_map *map, const char *str, int len, char **dst)
+{
+       const struct qstr qstr = { .name = str, .len = len };
+       int cf_len;
+
+       if (!IS_ENABLED(CONFIG_UNICODE) || !map || is_dot_dotdot(str, len))
+               return 0;
+
+       *dst = kmalloc(NAME_MAX, GFP_KERNEL);
+
+       if (dst) {
+               cf_len = utf8_casefold(map, &qstr, *dst, NAME_MAX);
+
+               if (cf_len > 0)
+                       return cf_len;
+       }
+
+       kfree(*dst);
+       return 0;
+}
+
  static bool ovl_cache_entry_find_link(const char *name, int len,
                                       struct rb_node ***link,
                                       struct rb_node **parent)
@@ -79,7 +103,7 @@ static bool ovl_cache_entry_find_link(const char *name, int len,

                 *parent = *newp;
                 tmp = ovl_cache_entry_from_node(*newp);
-               cmp = strncmp(name, tmp->name, len);
+               cmp = strncmp(name, tmp->cf_name, tmp->cf_len);
                 if (cmp > 0)
                         newp = &tmp->node.rb_right;
                 else if (cmp < 0 || len < tmp->len)

This looks like a bug - should be len < tmp->c_len

@@ -101,7 +125,7 @@ static struct ovl_cache_entry *ovl_cache_entry_find(struct rb_root *root,
         while (node) {
                 struct ovl_cache_entry *p = ovl_cache_entry_from_node(node);

-               cmp = strncmp(name, p->name, len);
+               cmp = strncmp(name, p->cf_name, p->cf_len);
                 if (cmp > 0)
                         node = p->node.rb_right;
                 else if (cmp < 0 || len < p->len)

Same here.

But it's not the only bug, because this patch regresses 3 fstests without
enabling any casefolding:


That was due to the following change:

-               cmp = strncmp(name, p->name, len);
+               cmp = strncmp(name, p->cf_name, p->cf_len);

Keeping len (instead of p->cf_len) as the third argument fixed it. I will send a v6 with that and the other changes.

overlay/038 12s ...  [14:16:39] [14:16:50]- output mismatch (see
/results/overlay/results-large/overlay/038.out.bad)
     --- tests/overlay/038.out 2025-05-25 08:52:54.000000000 +0000
     +++ /results/overlay/results-large/overlay/038.out.bad 2025-08-17
14:16:50.549367654 +0000
     @@ -1,2 +1,3 @@
      QA output created by 038
     +Merged dir: Invalid d_ino reported for ..
      Silence is golden

overlay/041 11s ...  [14:16:54] [14:17:05]- output mismatch (see
/results/overlay/results-large/overlay/041.out.bad)
     --- tests/overlay/041.out 2025-05-25 08:52:54.000000000 +0000
     +++ /results/overlay/results-large/overlay/041.out.bad 2025-08-17
14:17:05.275206922 +0000
     @@ -1,2 +1,3 @@
      QA output created by 041
     +Merged dir: Invalid d_ino reported for ..
      Silence is golden

overlay/077 19s ...  [14:17:08][  107.348626] WARNING: CPU: 3 PID:
5414 at fs/overlayfs/readdir.c:677 ovl_dir_read_impure+0x178/0x1c0
[  107.354647] ---[ end trace 0000000000000000 ]---
[  107.399525] WARNING: CPU: 2 PID: 5415 at fs/overlayfs/readdir.c:677
ovl_dir_read_impure+0x178/0x1c0
[  107.406826] ---[ end trace 0000000000000000 ]---
_check_dmesg: something found in dmesg (see
/results/overlay/results-large/overlay/077.dmesg)
  [14:17:28]- output mismatch (see
/results/overlay/results-large/overlay/077.out.bad)
     --- tests/overlay/077.out 2025-05-25 08:52:54.000000000 +0000
     +++ /results/overlay/results-large/overlay/077.out.bad 2025-08-17
14:17:28.762250671 +0000
     @@ -1,2 +1,6 @@
      QA output created by 077
     +getdents: Input/output error
     +Missing created file in impure upper dir (see
/results/overlay/results-large/overlay/077.full for details)
     +getdents: Input/output error
     +Found unlinked file in impure upper dir (see
/results/overlay/results-large/overlay/077.full for details)
      Silence is golden

Thanks,
Amir.





[Index of Archives]     [Linux Filesystems Devel]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux