Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp993217pxj; Fri, 11 Jun 2021 17:58:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwcuaeIhJ0RFVSSfqI7Qu4WIXFWXJKhqdwWm4YkKz/5b3u2WEnns+CzhvLx5pR2s6meuKbA X-Received: by 2002:a17:906:3485:: with SMTP id g5mr5865356ejb.174.1623459533035; Fri, 11 Jun 2021 17:58:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623459533; cv=none; d=google.com; s=arc-20160816; b=wjkh2PnI6PmTYE2ZGMwJwUASWHbswsSliJdhLhCDa24xXWlZ7HUD0iNzanHTsy7UCO OCGKt64L+v4wn+XzxqEqAhDvU1bZfzThiI0m3jT7+td2lSwMd6LaLmwmuAsOtHH1eNqZ JUlNsZSwWBaamGEq/3thUdnKeZwUaLyNlQBHR79hKL3L72FzjBS9OShonbtwHi9027AQ 6NE9GSm+2BjvBCtPoE8y/SiEwFQT0BN5j0wLMKe22eNo0cCB/ArgmeXczSs1npvc0W62 O6RBIS1BTD2SklGkLvyAED9PtfTGQDLNWY8gMajcEUHKMjYfgmWF66lWaYcFK3X9KN2F tHtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=7c261jymtK7gGyx4YS1HmcOschUjLUmG8HqKVhD1+1w=; b=KL0oS9qV9YnZ6SmXs3BnWDw+E5UY5HS30e9Wv7kvtKSF5dtFaqxXjG1p+tqxfZFnmK /g4Ub0HGue4viFIbgeq9yJvgW2mCvzr5tSz4vSYjYSIWMpXpHFjl7uL1KJv02Jo0Q3pe JsD0HR++/nIxIJXH+utMKtuiAdX4Ai9CbjSS09PY8Esx+Tnvt//OHM6vbHSWZb2eoa2z Sn+5cAfNm9UIeNRYJfMAGSlx+cBK42F3A8uxYU0GEHO1u5i/0XccTTzkW0cFUNr9+nJ+ EuEhSEbRudjcpJdwryxbH+GGhxLVMOZiJIkZG3I/V8kykU4KFDY69uUGRl4kuKKQ6Wyi 5oeQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h14si6473992edr.451.2021.06.11.17.58.29; Fri, 11 Jun 2021 17:58:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230201AbhFLAJc (ORCPT + 99 others); Fri, 11 Jun 2021 20:09:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40690 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229584AbhFLAJc (ORCPT ); Fri, 11 Jun 2021 20:09:32 -0400 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B58B1C061574; Fri, 11 Jun 2021 17:07:33 -0700 (PDT) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1lrrBG-0078iT-5C; Sat, 12 Jun 2021 00:07:18 +0000 Date: Sat, 12 Jun 2021 00:07:18 +0000 From: Al Viro To: Ian Kent Cc: Greg Kroah-Hartman , Tejun Heo , Eric Sandeen , Fox Chen , Brice Goglin , Rick Lindsley , David Howells , Miklos Szeredi , Marcelo Tosatti , "Eric W. Biederman" , Carlos Maiolino , linux-fsdevel , Kernel Mailing List Subject: Re: [PATCH v6 3/7] kernfs: use VFS negative dentry caching Message-ID: References: <162322846765.361452.17051755721944717990.stgit@web.messagingengine.com> <162322862726.361452.10114120072438540655.stgit@web.messagingengine.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <162322862726.361452.10114120072438540655.stgit@web.messagingengine.com> Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 09, 2021 at 04:50:27PM +0800, Ian Kent wrote: > + if (d_really_is_negative(dentry)) { > + struct dentry *d_parent = dget_parent(dentry); > + struct kernfs_node *parent; What the hell is dget_parent() for? You don't do anything blocking here, so why not simply grab dentry->d_lock - that'll stabilize the value of ->d_parent just fine. Just don't forget to drop the lock before returning and that's it... > + /* If the kernfs parent node has changed discard and > + * proceed to ->lookup. > + */ > + parent = kernfs_dentry_node(d_parent); > + if (parent) { > + if (kernfs_dir_changed(parent, dentry)) { > + dput(d_parent); > + return 0; > + } > + } > + dput(d_parent); > + > + /* The kernfs node doesn't exist, leave the dentry > + * negative and return success. > + */ > + return 1; > + }