Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp2929331iog; Mon, 20 Jun 2022 07:42:10 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uJCTKB88NUlkCOCuKFvjoqTLekqEXFMDfPF8/79lNmjK+LBt8dncxmesj4qc7GeMc8pjdJ X-Received: by 2002:a17:90b:1d06:b0:1e6:7a84:3c6e with SMTP id on6-20020a17090b1d0600b001e67a843c6emr27677404pjb.202.1655736129940; Mon, 20 Jun 2022 07:42:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655736129; cv=none; d=google.com; s=arc-20160816; b=siyBjYXkf5rshb3HX5xKuaZudQnpcidjWiVuV/swCgD8moJaAlmSZuH9H6+MKF5UTX nL5Wc/bA2ZbRGsJ6cn8U7IYwMu4DjvirL297P00uGOr49U1KeynWzgPiT7QWdMLcNT52 mr+efJAAInfyA4a/gXUszoNNd+g8E24JnWwpr004COO+I0mGaUTeUGk5+g4dP+VhronZ D0ciZDIil+wsiOd8/z/dgJmUFaczbX28i+Pa4A9iJAgOh5R57R3HoQxyq0hdr3Z1qszA JqDrw/HxQxjMrzMgk2SHFcNH1eomqHUOZM43cI42lcxTT/sHrm0IlM/iA0MqjfqlAndT T5Ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fxRuHbPFJShRLfJtYAvnB2jjDVpiifZoVV1c5P+xlpA=; b=V6yVrofA/xnnTEc1C9Bllh0UAUs3GefCJq9QBo5b1NLL3Kt2TiTHyZy7EGcSovMASW 1rGL6iUGyrxyMWG3XvnfdrWqk0g6kstXFGldAk68md+yMOyRAVhrj4+NUlVm+eJbogOi PiBr6uo+wktX8q/WTUMBH576VReAP4j/PpUvZTLjNfCbtfXixLOoSDGDA1tWQL1yAnnu +ItXcHyhLEDwJKN/AXvh9KNNdSqQkKHL8Q/e57VCzaxMXUYExuS6lM0bzl5wjXeZodfe URg61osN2+BTGiex8DM3rNYw8QaRP4jeT725cV0e1Yj9K3eUImiVxgWRchrjz9sSYxhj ypXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r8-20020a63fc48000000b00408cc6905ecsi16170042pgk.519.2022.06.20.07.41.58; Mon, 20 Jun 2022 07:42:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240320AbiFTMTu (ORCPT + 99 others); Mon, 20 Jun 2022 08:19:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240101AbiFTMTt (ORCPT ); Mon, 20 Jun 2022 08:19:49 -0400 Received: from out30-57.freemail.mail.aliyun.com (out30-57.freemail.mail.aliyun.com [115.124.30.57]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5ABDF63FF for ; Mon, 20 Jun 2022 05:19:48 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R901e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046050;MF=hsiangkao@linux.alibaba.com;NM=1;PH=DS;RN=5;SR=0;TI=SMTPD_---0VGx.DGq_1655727584; Received: from B-P7TQMD6M-0146.local(mailfrom:hsiangkao@linux.alibaba.com fp:SMTPD_---0VGx.DGq_1655727584) by smtp.aliyun-inc.com; Mon, 20 Jun 2022 20:19:45 +0800 Date: Mon, 20 Jun 2022 20:19:44 +0800 From: Gao Xiang To: hongnanLi Cc: Chao Yu , linux-erofs@lists.ozlabs.org, xiang@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] erofs: update ctx->pos for every emitted dirent Message-ID: References: <20220527072536.68516-1-hongnan.li@linux.alibaba.com> <20220609034006.76649-1-hongnan.li@linux.alibaba.com> <0c139517-e976-5017-8e7a-d34c38f0f6bb@kernel.org> <70fe93a3-7af5-b563-dcb7-3f7be81348ed@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <70fe93a3-7af5-b563-dcb7-3f7be81348ed@linux.alibaba.com> X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Hongnan, On Mon, Jun 20, 2022 at 05:37:07PM +0800, hongnanLi wrote: > on 2022/6/19 8:19, Chao Yu wrote: > > On 2022/6/9 11:40, Hongnan Li wrote: > > > erofs_readdir update ctx->pos after filling a batch of dentries > > > and it may cause dir/files duplication for NFS readdirplus which > > > depends on ctx->pos to fill dir correctly. So update ctx->pos for > > > every emitted dirent in erofs_fill_dentries to fix it. > > > > > > Fixes: 3e917cc305c6 ("erofs: make filesystem exportable") > > > Signed-off-by: Hongnan Li > > > --- > > >   fs/erofs/dir.c | 20 ++++++++++---------- > > >   1 file changed, 10 insertions(+), 10 deletions(-) > > > > > > diff --git a/fs/erofs/dir.c b/fs/erofs/dir.c > > > index 18e59821c597..94ef5287237a 100644 > > > --- a/fs/erofs/dir.c > > > +++ b/fs/erofs/dir.c > > > @@ -22,10 +22,9 @@ static void debug_one_dentry(unsigned char > > > d_type, const char *de_name, > > >   } > > >   static int erofs_fill_dentries(struct inode *dir, struct > > > dir_context *ctx, > > > -                   void *dentry_blk, unsigned int *ofs, > > > +                   void *dentry_blk, struct erofs_dirent *de, > > >                      unsigned int nameoff, unsigned int maxsize) > > >   { > > > -    struct erofs_dirent *de = dentry_blk + *ofs; > > >       const struct erofs_dirent *end = dentry_blk + nameoff; > > >       while (de < end) { > > > @@ -59,9 +58,8 @@ static int erofs_fill_dentries(struct inode *dir, > > > struct dir_context *ctx, > > >               /* stopped by some reason */ > > >               return 1; > > >           ++de; > > > -        *ofs += sizeof(struct erofs_dirent); > > > +        ctx->pos += sizeof(struct erofs_dirent); > > >       } > > > -    *ofs = maxsize; > > >       return 0; > > >   } > > > @@ -95,7 +93,7 @@ static int erofs_readdir(struct file *f, struct > > > dir_context *ctx) > > >                     "invalid de[0].nameoff %u @ nid %llu", > > >                     nameoff, EROFS_I(dir)->nid); > > >               err = -EFSCORRUPTED; > > > -            goto skip_this; > > > +            break; > > >           } > > >           maxsize = min_t(unsigned int, > > > @@ -106,17 +104,19 @@ static int erofs_readdir(struct file *f, > > > struct dir_context *ctx) > > >               initial = false; > > >               ofs = roundup(ofs, sizeof(struct erofs_dirent)); > > > -            if (ofs >= nameoff) > > > +            if (ofs >= nameoff) { > > > +                ctx->pos = blknr_to_addr(i) + ofs; > > >                   goto skip_this; > > > +            } > > >           } > > > -        err = erofs_fill_dentries(dir, ctx, de, &ofs, > > > -                      nameoff, maxsize); > > > -skip_this: > > >           ctx->pos = blknr_to_addr(i) + ofs; > > > > Why updating ctx->pos before erofs_fill_dentries()? > > > > Thanks, > > It’s to ensure the ctx->pos is correct and up to date in > erofs_fill_dentries() so that we can update ctx->pos instead of ofs for > every emitted dirent. > How about this, since blknr_to_addr(i) + maxsize should be the start of the next dir block. if (initial) { ofs = roundup(ofs, sizeof(struct erofs_dirent)); ctx->pos = blknr_to_addr(i) + ofs; if (ofs >= nameoff) goto skip_this; } err = erofs_fill_dentries(dir, ctx, de, (void *)de + ofs, nameoff, maxsize); if (err) break; ctx->pos = blknr_to_addr(i) + maxsize; Thanks, Gao Xiang