Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4687236rdb; Tue, 12 Dec 2023 06:47:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IEQNHv1qzAcP5GJeN4tlHzxSWzL7yXTBzGNXarWuLWtjyU8Sxn98kEL00skcs5XciDQ5Mev X-Received: by 2002:a05:6a00:a13:b0:6cd:f3f4:56c9 with SMTP id p19-20020a056a000a1300b006cdf3f456c9mr7207789pfh.17.1702392469453; Tue, 12 Dec 2023 06:47:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702392469; cv=none; d=google.com; s=arc-20160816; b=yZzlPrVmfgVAyy0lYeaLMZVplCspdeFaIF++pp/7KxqwL7FfRZLdTjc8w9Fq3TWIou eb4p2TFJwEnCqW+DLAPYrKXl+Q8enw/pCmOfPmvUIx6KLKMsEZ+hGPqeI+SdLtLgexe/ JbbYz1JfJoByB93T5cL7rB/YDPoM5S+0A02F1K+8hAY8lNaX6T1HLAR1ZwdWtLvnt95G 3yaPzKL885z1b6dFBphuFyGM0k19baSGG46V0WUeu+UW59eNkgkbfinEK69HtvAQykMA 0a/OWcKz3GQB4Mx3S4zGsLbtjUeT9fafSlY0b+AS6S5qHJbyJEl000UKUttVx+rBZx6M AdgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=8Hgc4VpHrij9wpXpDIXTA7F+eZGvk3a4sFe7hddHELc=; fh=amlZE/0bmUZb0iruJSnjcNGDWpcpLgWng4o3VdOIeS8=; b=slVhQY/Jjzghbu6s4+ImGDSDBgv6Lpw0nEzP3u0qGAB3m10SDQ2ys2J80v1gAXFmuc 72bl8dOPqKkk9wKJz3j0dkH1zND8Vi4ycoZm9h0pn0NriVVan2lKvEujEz0+SrxscwDY iJGx2RJ9V8rGLnmFMpzNTLQN8kOhRKTF5N7tj1ZQq7rX5IMlTC9ypmPO0RDVmgMwdOig 7SwxQ+fw7dvSNCiiRwNZlxsaZ8WWbZwxiIPwtOPm/sXtARP3KJlTUa9y+53tepP56tO0 ZcTP7m3mpGGTjEfbGP4DDDlhOQvLb+WFMWngncd+Vlv0oLrtteAZBItqovqdRT2fJo+h 3V/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=isSXcxvg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id o2-20020a634e42000000b005c5e2c15169si7871447pgl.737.2023.12.12.06.47.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Dec 2023 06:47:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=isSXcxvg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 153F7807D6B8; Tue, 12 Dec 2023 06:47:47 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376947AbjLLOrN (ORCPT + 99 others); Tue, 12 Dec 2023 09:47:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48630 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376946AbjLLOq4 (ORCPT ); Tue, 12 Dec 2023 09:46:56 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EC1F81BDA for ; Tue, 12 Dec 2023 06:46:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1702392383; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=8Hgc4VpHrij9wpXpDIXTA7F+eZGvk3a4sFe7hddHELc=; b=isSXcxvge/ydM+xPKbI/T9XnOq/fMBavCgLvhH2X3u2E+VJHUvvoUNFyoOldi6wN9VaHkR TCbozbWgG7UrFQP01edUYQDhpivw7Ljn3l6ZEjwvNKHKl1voAvpDXQ4lDE0nXvZOjhRmd1 oiFoK0RlCHYZpFOLga+iTgmpKXZAAO0= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-171-NdCldNcMPbqpk2HVg85BjA-1; Tue, 12 Dec 2023 09:46:17 -0500 X-MC-Unique: NdCldNcMPbqpk2HVg85BjA-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 2738A88F2EB; Tue, 12 Dec 2023 14:46:17 +0000 (UTC) Received: from warthog.procyon.org.com (unknown [10.42.28.2]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2506C492BE6; Tue, 12 Dec 2023 14:46:16 +0000 (UTC) From: David Howells To: Markus Suvanto , Marc Dionne Cc: David Howells , linux-afs@lists.infradead.org, keyrings@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 1/3] afs: Fix the dynamic root's d_delete to always delete unused dentries Date: Tue, 12 Dec 2023 14:46:09 +0000 Message-ID: <20231212144611.3100234-2-dhowells@redhat.com> In-Reply-To: <20231212144611.3100234-1-dhowells@redhat.com> References: <20231212144611.3100234-1-dhowells@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.10 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Tue, 12 Dec 2023 06:47:47 -0800 (PST) Fix the afs dynamic root's d_delete function to always delete unused dentries rather than only deleting them if they're positive. With things as they stand upstream, negative dentries stemming from failed DNS lookups stick around preventing retries. Fixes: 66c7e1d319a5 ("afs: Split the dynroot stuff out and give it its own ops tables") Signed-off-by: David Howells cc: Marc Dionne cc: linux-afs@lists.infradead.org --- fs/afs/dynroot.c | 13 +------------ 1 file changed, 1 insertion(+), 12 deletions(-) diff --git a/fs/afs/dynroot.c b/fs/afs/dynroot.c index 1fa8cf23bd36..34474a061654 100644 --- a/fs/afs/dynroot.c +++ b/fs/afs/dynroot.c @@ -252,20 +252,9 @@ static int afs_dynroot_d_revalidate(struct dentry *dentry, unsigned int flags) return 1; } -/* - * Allow the VFS to enquire as to whether a dentry should be unhashed (mustn't - * sleep) - * - called from dput() when d_count is going to 0. - * - return 1 to request dentry be unhashed, 0 otherwise - */ -static int afs_dynroot_d_delete(const struct dentry *dentry) -{ - return d_really_is_positive(dentry); -} - const struct dentry_operations afs_dynroot_dentry_operations = { .d_revalidate = afs_dynroot_d_revalidate, - .d_delete = afs_dynroot_d_delete, + .d_delete = always_delete_dentry, .d_release = afs_d_release, .d_automount = afs_d_automount, };