Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4091535rdb; Mon, 11 Dec 2023 08:34:50 -0800 (PST) X-Google-Smtp-Source: AGHT+IF6riggn+1o/obXblsPuFtgRkXtqMgFf0KyOqrXHjzol2JrNjg9dlmHO7rG2xhUkS3uxU5f X-Received: by 2002:a17:90a:c90a:b0:286:6cc1:3f18 with SMTP id v10-20020a17090ac90a00b002866cc13f18mr3869319pjt.79.1702312490000; Mon, 11 Dec 2023 08:34:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702312489; cv=none; d=google.com; s=arc-20160816; b=bPygAVF1s/8YVwK4xesaE0lRUKnnAgpw/exI3Za9/VREEbZmLQumdhe4P/YPqexjQN cVoGlVpAyoDAGVIpM5PqbQeAQGGXOxI72jnWkaKbrM1cHrG793p3BbX6F/X80qWlUWtp ceTimtuEtT7oK/E42OG+alOddkvI/Ub8FEnS1i8adnPa0tS3VGPtrtxre4Nb4E40t77/ C1QXDYYqv7oiQFLsg722Vbc/VgoEu4Wx+FEl61CcySjldrcNaS2sQ3xKAerYmgTRD0N+ nHnYFdcoCCTo3peevjcwZatY46TGw3HaOYGtTrNgtEXML2ISs8SRCJJREV9FyxjhNyEK ViKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=8Hgc4VpHrij9wpXpDIXTA7F+eZGvk3a4sFe7hddHELc=; fh=amlZE/0bmUZb0iruJSnjcNGDWpcpLgWng4o3VdOIeS8=; b=I9skMtwLpTXdX5xFLu87FNnwsDqW2z8fglhxlnm7fdAnfCyLSUpn6BJP56gLJ1Lkq8 rNUGkatKtogYDKMRSfn6bgvWqttHB2//YXBqbAgzMO6RC2DHNo8kIAD52abYSPnUvBNG n8TfEa0EVjBjFiiNpAjzQWaoWkhPnIyDnNF5KciyhVS/szLvSystyAyfsRaUTMjY2rXU XsqjEijwdJNATg6CVSVY0nwkKR34C1uprKOITMfLyR2HPiaKTfT2E1tbe3t4EO0sb4qr NqT8h057wzYksSKriS1dXOc9cFa0irxVOEUH0NYKpO6dR/I6UuRMZ7SntXZJXWb1NL+l 1M2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="UP/HOCiP"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id u2-20020a17090282c200b001d0b4540b7esi6188185plz.314.2023.12.11.08.34.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 08:34:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="UP/HOCiP"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 6EF72809F8B3; Mon, 11 Dec 2023 08:34:47 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344883AbjLKQeZ (ORCPT + 99 others); Mon, 11 Dec 2023 11:34:25 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56426 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344868AbjLKQeV (ORCPT ); Mon, 11 Dec 2023 11:34:21 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9D6898E for ; Mon, 11 Dec 2023 08:34:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1702312466; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=8Hgc4VpHrij9wpXpDIXTA7F+eZGvk3a4sFe7hddHELc=; b=UP/HOCiPZcFGmV2irFL2fYZ3ki5G4YcW1SOdxL2EbSxNzyp03owRBxXKN2MhzuecBc+G60 HHto6QEnmVJSP9O0qrzHgWmKQXff/yA6Kgl5zJ9cMv+Buj0gyaYa1h/0dyjpnBhUAUEtSC SlkplgQZX8lwrCuwD4HvO/KYZFTfPEk= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-626-7J7Zab7gN3ihCVoCmnBD7Q-1; Mon, 11 Dec 2023 11:34:20 -0500 X-MC-Unique: 7J7Zab7gN3ihCVoCmnBD7Q-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id C69F1185A780; Mon, 11 Dec 2023 16:34:19 +0000 (UTC) Received: from warthog.procyon.org.com (unknown [10.42.28.2]) by smtp.corp.redhat.com (Postfix) with ESMTP id C3489492BE6; Mon, 11 Dec 2023 16:34:18 +0000 (UTC) From: David Howells To: Markus Suvanto , Marc Dionne Cc: David Howells , linux-afs@lists.infradead.org, keyrings@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 1/3] afs: Fix the dynamic root's d_delete to always delete unused dentries Date: Mon, 11 Dec 2023 16:34:10 +0000 Message-ID: <20231211163412.2766147-2-dhowells@redhat.com> In-Reply-To: <20231211163412.2766147-1-dhowells@redhat.com> References: <20231211163412.2766147-1-dhowells@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.10 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 11 Dec 2023 08:34:47 -0800 (PST) Fix the afs dynamic root's d_delete function to always delete unused dentries rather than only deleting them if they're positive. With things as they stand upstream, negative dentries stemming from failed DNS lookups stick around preventing retries. Fixes: 66c7e1d319a5 ("afs: Split the dynroot stuff out and give it its own ops tables") Signed-off-by: David Howells cc: Marc Dionne cc: linux-afs@lists.infradead.org --- fs/afs/dynroot.c | 13 +------------ 1 file changed, 1 insertion(+), 12 deletions(-) diff --git a/fs/afs/dynroot.c b/fs/afs/dynroot.c index 1fa8cf23bd36..34474a061654 100644 --- a/fs/afs/dynroot.c +++ b/fs/afs/dynroot.c @@ -252,20 +252,9 @@ static int afs_dynroot_d_revalidate(struct dentry *dentry, unsigned int flags) return 1; } -/* - * Allow the VFS to enquire as to whether a dentry should be unhashed (mustn't - * sleep) - * - called from dput() when d_count is going to 0. - * - return 1 to request dentry be unhashed, 0 otherwise - */ -static int afs_dynroot_d_delete(const struct dentry *dentry) -{ - return d_really_is_positive(dentry); -} - const struct dentry_operations afs_dynroot_dentry_operations = { .d_revalidate = afs_dynroot_d_revalidate, - .d_delete = afs_dynroot_d_delete, + .d_delete = always_delete_dentry, .d_release = afs_d_release, .d_automount = afs_d_automount, };