From patchwork Sun Nov 17 21:32:04 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13877965 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 329321DA60D for ; Sun, 17 Nov 2024 21:32:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1731879143; cv=none; b=g4FVHl9R/inr9paatYF+22c0JzkU2p9bxLhB9byD19yjDLathMiAvw2EzB+9yzD4L39g5vljiyOpfdmdFv87DfiXJICnk/wQ+bQDGPiYRWpNqnK+k+UeIKORoRe4GvDYqqwBh7FLw07fpE2gCRN1P4bLX+0mV9izVfFEOpL8Nhs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1731879143; c=relaxed/simple; bh=auLBAMGSZHiKlVkZKnG1xgpLktKCy7bf3uvnYdjQUyw=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=u1kUozGx1LzmPLlg85d9cefxUbYtWvsKRKVwfAalLrcRe+csrAjPhKsBn0zzm3Z7L70e0/A3DjqX+iEWcRyWh/k/b+XSORMwNhzbw9OdOAa34xLKA14ZMEvABPzjJHhVWfSIbP5tfyDEv67lZvT3Zo9IYsgZBIuEL6HcraVMwSo= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ktQOITeW; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ktQOITeW" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 411A5C4CED7; Sun, 17 Nov 2024 21:32:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1731879142; bh=auLBAMGSZHiKlVkZKnG1xgpLktKCy7bf3uvnYdjQUyw=; h=From:To:Cc:Subject:Date:From; b=ktQOITeWiAO6ZOstz30br39ce7fBKKN1HueKrEuyVfS89bQTG6f9pNLbY7Z5m30DP 3AsgTouvG9jGPY6sjtZhMx6/oTmWNY9x6gcZSvkZpQPTAq/TB7YgbWJPyPPGs3eknc U0x3gtdVVHKkNMTg5Jadajc9af+Uov6v9HmNmtYIj40rLkoQD7ZAPBVREQqiHodiSv gB5ujBZcA18+0zgcadQ3CD/Tyqu2tMGVN5rkx1D8WSHF1uyCpHE5MfUHTkpMvwrrH8 IyCRPoV7uCNewkAIQnOOAe3aYtO8BIS6A1IXddB3nNHDXs1CA2xrtRSukNs0wzAkNN HtqM+nO5i5UhQ== From: cel@kernel.org To: , , Hugh Dickens Cc: yukuai3@huawei.com, yangerkun@huaweicloud.com, Chuck Lever Subject: [RFC PATCH 0/2] Improve simple directory offset wrap behavior Date: Sun, 17 Nov 2024 16:32:04 -0500 Message-ID: <20241117213206.1636438-1-cel@kernel.org> X-Mailer: git-send-email 2.47.0 Precedence: bulk X-Mailing-List: linux-fsdevel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Chuck Lever This series attempts to narrow some gaps in the current tmpfs directory offset mechanism, based on misbehaviors reported by Yu Kuai and Yang Erkun . It does not fully close the window on bad behavior, as noted in the patch description of 2/2. Perhaps discussion and review can identify improvements that further clean up the corner cases. The new mechanism attempts to re-use existing fields in struct dentry rather than adding new fields, and is meant to be back ported to LTS once it is merged upstream. The patches currently pass xfstests, in particular generic/736. The series has been pushed to: https://git.kernel.org/pub/scm/linux/kernel/git/cel/linux.git/log/?h=nfsd-testing Chuck Lever (2): libfs: Return ENOSPC when the directory offset range is exhausted libfs: Improve behavior when directory offset values wrap fs/libfs.c | 40 ++++++++++++++++++++-------------------- 1 file changed, 20 insertions(+), 20 deletions(-)