Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp8423712ybl; Thu, 16 Jan 2020 16:35:43 -0800 (PST) X-Google-Smtp-Source: APXvYqwEndBSj5jm3IF+1OsYNTaSvEjCfl89eA3eaNaUBsOrRwOfXZWi5d2RLv4QIWxzzD7gyHM0 X-Received: by 2002:a9d:4f0a:: with SMTP id d10mr4277473otl.85.1579221343525; Thu, 16 Jan 2020 16:35:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579221343; cv=none; d=google.com; s=arc-20160816; b=yZxdBBqIGo85eo/0PrRHjuDX+qw7lxspcNKizIKSyCriLiS/uPlU2SJNaeqAWMJmfE 9iAmWVIk2vGserpN9FYfNzLzu8yyMqipnozfOBrTjqk0JUsQkE3P4XF8vBvp2wGY0vI6 Fm4p9VDK2tmF1TFYOUyGlzdCdLG58ehPrttWO1q7zbtxe4tHz8PSwCilKhvkLJsrMhvt c/vs6WjiHW4F4bjZE7Ya5np9DeKQ4kED5Y+R6DYONwMkZ/qaXAWKGDVli0TUxKq/NR0C CUjl5+RXdn3Kydaqq69d0iUHRGhwjgn83GUK6gXWtVEOQXijnt5gSRc5pFlPWLSD2Aky 9pKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NCi7JiDqITkpzu7l2KaqjBjZ8PhEcOhytJiGvcdTQFg=; b=BcTnY4Us2/AvJXtvLGT71Q+8FWMi0KkH6jiKOLBGnd/sIyRVdXZcTb/tilu8UZpg3U VWuW4glLWcRWd6XL169Tg3Cm/29nAI0pM1Hx7/Frv2mu3CIJjdxCk9LRDM3Rn9FPo/Bw NQsqdQU+v5HZ20aS2wPBteCJD4uq/Lpj9c1mNlH7hd7Oe1R1eGXwxqhJrg7qTKtg08+w GpMtPhEoDCtHYGqbJPDwtWEym1MlPpZRCpYnbaJ3b0j2f0cTD4mCyqGm64NbhEodiVTc 4Iqi/lEJ+LfOXPVfF1yK+zD2E+muA774cpZurFW1JxpBQAzRQ6k0NLkQAmgpdHfnsiXl cUUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dcanvigV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w2si13147716oib.252.2020.01.16.16.35.30; Thu, 16 Jan 2020 16:35:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dcanvigV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731411AbgAPXX3 (ORCPT + 99 others); Thu, 16 Jan 2020 18:23:29 -0500 Received: from mail.kernel.org ([198.145.29.99]:51750 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733076AbgAPXX0 (ORCPT ); Thu, 16 Jan 2020 18:23:26 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3BFBD2077C; Thu, 16 Jan 2020 23:23:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579217005; bh=+p1YLwzGBH163D86Ax4uYWKPreijFjfAo+qlgz/VETI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dcanvigVRdQZitTfdXSG4zBpZQs+/lv1SjwpecTPPlo3xu3yUfseppsKuGCenIaOS yNszDSYV/F4QloXf2ZBVWlccQdJV7CfYw6CsL0LptD7PX50pQyNBcpdtWucI4yTxqY iz5Lpu5UjCTqM9/KoSo28aMZNIRBVttDO+yRCHX8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Howells , Linus Torvalds Subject: [PATCH 5.4 083/203] afs: Fix afs_lookup() to not clobber the version on a new dentry Date: Fri, 17 Jan 2020 00:16:40 +0100 Message-Id: <20200116231752.393959400@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200116231745.218684830@linuxfoundation.org> References: <20200116231745.218684830@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Howells commit f52b83b0b1c40ada38df917973ab719a4a753951 upstream. Fix afs_lookup() to not clobber the version set on a new dentry by afs_do_lookup() - especially as it's using the wrong version of the version (we need to use the one given to us by whatever op the dir contents correspond to rather than what's in the afs_vnode). Fixes: 9dd0b82ef530 ("afs: Fix missing dentry data version updating") Signed-off-by: David Howells Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/afs/dir.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) --- a/fs/afs/dir.c +++ b/fs/afs/dir.c @@ -952,12 +952,8 @@ static struct dentry *afs_lookup(struct afs_stat_v(dvnode, n_lookup); inode = afs_do_lookup(dir, dentry, key); key_put(key); - if (inode == ERR_PTR(-ENOENT)) { + if (inode == ERR_PTR(-ENOENT)) inode = afs_try_auto_mntpt(dentry, dir); - } else { - dentry->d_fsdata = - (void *)(unsigned long)dvnode->status.data_version; - } if (!IS_ERR_OR_NULL(inode)) fid = AFS_FS_I(inode)->fid;