Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4255483rdb; Mon, 11 Dec 2023 13:34:11 -0800 (PST) X-Google-Smtp-Source: AGHT+IEhZ0Zi7f5MbQLNvLHODmgpzfr10fmW0rZl6uvNSqcHJKMo40+BW7yHMCnMk4FeF8K5yfuF X-Received: by 2002:a05:6a20:bc88:b0:18f:97c:4f71 with SMTP id fx8-20020a056a20bc8800b0018f097c4f71mr2304794pzb.125.1702330451043; Mon, 11 Dec 2023 13:34:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702330451; cv=none; d=google.com; s=arc-20160816; b=1DLx8qcVKYvEOOGxDp5lcC4zmitBiETyhKIOfRZjHODgStBm5E9fdoiKPQZ0ALp2et RhNeY+hkvplLHKRQ2ZvpDgxwNrO2UZaPKtTE6xeHVLQurcQtmvpsAr94qRgBOZ96EsWC HmfIQ2ft2vCYlf49Kor+ui/Mz9IIsAzJhfIU64p1gm13SR7/hCZzjye0aaI78y+5qatB 9CtJfh3wNJEWtlV97eXfSmAHvOzhoPX2hfgvU3/4M+NrLhl+E0DPyTMGyVD1pM0Jsz36 tKBON0EMM3NzgdGmjqVexurf3R9PXLAOckDt49fdq/e7PFZdDy83EHdEhQmkK63DpZ4C /baQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=GuWoYoYO6sRvbnyCheKJ1TTzWhOsQ+JdBJa00C2vjxk=; fh=/3yIvuKV70AUPqc8aK4sOENPMdXBB7LbRTymueLu+hU=; b=A4Vhn51fVxlOVj3dWQcfJAH3Os6HCC/UFIH9mZLIStO/i0OihoDmjcqq6RDkV4tbEy a6sG2niYZOBcTNcZyJLMFsmuyE2p54kbeVdDy05J0Ca7RNdpOZxbiE8rXkLRR4arz0Bz 9M2MixwCFIcghIylgkWOyu5NTiazKtvHpgE6yRIi4cH9qjgJu5MwJdHsrBxpN6mKSv6L VcMrCAvdBZEqSFSYCmHyjubsyQ1VeHAbbU2Ok7jAZoAJ9ONH8G1LuZ+Vakm+5wFykYBP G2fYmDnwiKpcHIDdjHZWm9u4Zx+NmSo0jFx91tCdIfCnnvhdKCavc1A5lRuRDZhI4KJO WOjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=CZYtVsFi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id p9-20020a17090a868900b00286f3b1d40csi5206081pjn.132.2023.12.11.13.34.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 13:34:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=CZYtVsFi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 91E80808985E; Mon, 11 Dec 2023 13:34:08 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345294AbjLKVdy (ORCPT + 99 others); Mon, 11 Dec 2023 16:33:54 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45676 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345220AbjLKVdt (ORCPT ); Mon, 11 Dec 2023 16:33:49 -0500 Received: from mail-lj1-x22b.google.com (mail-lj1-x22b.google.com [IPv6:2a00:1450:4864:20::22b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2A211D6; Mon, 11 Dec 2023 13:33:55 -0800 (PST) Received: by mail-lj1-x22b.google.com with SMTP id 38308e7fff4ca-2c9f4bb2e5eso68866241fa.1; Mon, 11 Dec 2023 13:33:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1702330433; x=1702935233; darn=vger.kernel.org; h=mime-version:user-agent:content-transfer-encoding:references :in-reply-to:date:cc:to:from:subject:message-id:from:to:cc:subject :date:message-id:reply-to; bh=GuWoYoYO6sRvbnyCheKJ1TTzWhOsQ+JdBJa00C2vjxk=; b=CZYtVsFi+JyBpuscYTBSuhqjX40IWbdxFFBk4X/EthfZWpOwivjKIOfoiTeczw4Teg ZObOC3Y5VKcJ37XrWIB9V5ewc4EK2GqQ/P949Uxwzx6D4vUNumN5GZKtiPHysYuWPy9s MwTc9e25HqZlrHCwkjfhhsM3QkZbUz6xG7BG7HCGBJwUBs44Ku25TCYArPRclHybV9jO 4KlmRtFhXO2l88WmCsBsbf2YhmrID14lWrmVwLKPTwVZ6oqjwCxf5o4hUPeSGtVqictk rQ02E7AesVQCbpt9MP+jLQD7HMY9zivNenq8dCpWkJM2U1vy0brjkIzfKRiM7s4RoBeX pC5A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702330433; x=1702935233; h=mime-version:user-agent:content-transfer-encoding:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=GuWoYoYO6sRvbnyCheKJ1TTzWhOsQ+JdBJa00C2vjxk=; b=vJOKD9xZU2D2oI4NrANvbmkrmk48l0Eu8wbtyC4/KvyVgW5Weiy4S2z47QVtpGoGgQ 1ZUX54Fs9s3oRk9HYi8eERFlvgunC0CHVA/CyTBh4RNuDNKsz+a4zsejm0LRkv9HgJYZ cg+YHhc8tnRQp+F+Z+K/wLmhdt6aCHd7yvSMfzzDkKBSY+b34s4R91PaOKRr24jQLdw4 rj9Ney12QrNiiEO2zQ9uGru+E2MiemPZzF//+6cGU46xUQq5Sylzxpl9uqsjdymuCwXl KtJHx3N2fqxIAQFFgJvsXuCuM5Sm8zQE/lmRQ/h0J2x7seU/nM1iXC3T3zO7GpntG8Ep oB/g== X-Gm-Message-State: AOJu0YxK4PtFK+ngWeKlhPZaS+BpB+OAAxS0c98jwGiXNwDX6+jrhPze KE8FysVWLyiPrL7ytqluwqNe+Desu5aRpA== X-Received: by 2002:a2e:a311:0:b0:2ca:7218:1963 with SMTP id l17-20020a2ea311000000b002ca72181963mr2088622lje.54.1702330433050; Mon, 11 Dec 2023 13:33:53 -0800 (PST) Received: from t470.station.com (37-33-94-228.bb.dnainternet.fi. [37.33.94.228]) by smtp.gmail.com with ESMTPSA id f6-20020a2eb5a6000000b002ca0ed22a22sm1279130ljn.63.2023.12.11.13.33.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 13:33:52 -0800 (PST) Message-ID: <59be73c8346ca0c0d6feddcdb56b043cfa0aea4d.camel@gmail.com> Subject: Re: [PATCH 0/3] afs: Fix dynamic root interaction with failing DNS lookups From: markus.suvanto@gmail.com To: David Howells , Marc Dionne Cc: linux-afs@lists.infradead.org, keyrings@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Date: Mon, 11 Dec 2023 23:33:50 +0200 In-Reply-To: <20231211163412.2766147-1-dhowells@redhat.com> References: <20231211163412.2766147-1-dhowells@redhat.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.50.1 MIME-Version: 1.0 X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Mon, 11 Dec 2023 13:34:08 -0800 (PST) ma, 2023-12-11 kello 16:34 +0000, David Howells kirjoitti: > Hi Markus, Marc, >=20 > Here's a set of fixes to improve the interaction of arbitrary lookups in > the AFS dynamic root that hit DNS lookup failures: >=20 > (1) Always delete unused (particularly negative) dentries as soon as > possible so that they don't prevent future lookups from retrying. >=20 > (2) Fix the handling of new-style negative DNS lookups in ->lookup() to > make them return ENOENT so that userspace doesn't get confused when > stat succeeds but the following open on the looked up file then fail= s. >=20 > (3) Fix key handling so that DNS lookup results are reclaimed as soon as > they expire rather than sitting round either forever or for an > additional 5 mins beyond a set expiry time returning EKEYEXPIRED. >=20 > The patches can be found here: >=20 > https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/lo= g/?h=3Dafs-fixes >=20 I tested this patches 6.7.0-rc4-gdfbc00cb940b It seems that not existing directory will remove my valid rxprc key. Reproduce: 1) kinit .... 2) aklog.... 3) keyctl show=20 Session Keyring 347100937 --alswrv 1001 65534 keyring: _uid_ses.1001 1062692655 --alswrv 1001 65534 \_ keyring: _uid.1001 698363997 --als-rv 1001 100 \_ rxrpc: afs@station.com klist=20 Ticket cache: KEYRING:persistent:1001:1001 Default principal: ..... ... 4) ls /afs/notfound 5) keyctl show =20 Session Keyring 709308533 --alswrv 1001 65534 keyring: _uid_ses.1001 385820479 --alswrv 1001 65534 \_ keyring: _uid.1001 klist klist: Credentials cache keyring 'persistent:1001:1001' not found -Markus