Received: by 2002:a05:7412:bbc7:b0:fc:a2b0:25d7 with SMTP id kh7csp3274649rdb; Tue, 6 Feb 2024 12:19:24 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWfUoOlu2R0B+NL4D+JOfwB9Lp/8e2i9S15UPXUEkjZNxRKEbpF6Xq3vUtLUsiqynakxM2lCzfBHmXZ4x4q1nd8ZQvIXt9/tNVH38VU0g== X-Google-Smtp-Source: AGHT+IEAktYvqgJux7b23E4YbP8mzVsEIZXt49rrSKftQdRuSWWoyQd80i43lcaGXZKwcn8c8Kc6 X-Received: by 2002:a05:6808:188c:b0:3bf:e656:916f with SMTP id bi12-20020a056808188c00b003bfe656916fmr1982566oib.10.1707250764274; Tue, 06 Feb 2024 12:19:24 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707250764; cv=pass; d=google.com; s=arc-20160816; b=05i5msEavJWEj/njkEhjIcH3ZXpHWNW3NPAjmQGAR/S72xIzhhpoulotWtp8zLzHMu 9lN+6k4cmUxPbGdYZ5NOyZbc0iXIFLTH2Vq/hiyRplywyOcqtEbDPFvtV/pB+JcHUNnn NL5cGThVSJPVm7U1OJaiVTIT20Id+RHGBdJaHcTK2vfqCZWCNfArWI1G9xWfXKIRtY1+ xYNZ4VVDobmaGGq8PKZXb/pjFYczkHbDNVS0IV+F89iliQeOKCLgaUfh6ETy1WzCXb+s ZoW0BLTE5ceQX/G43UDZ7D0bzIFsYKKpInNJZU3Yq4M+7NyzEP8o7LyTe4PWhpl+Zjyl GyvQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=/Tm3QJ8ktnoQXwinKZstJfbJd1PnNWgD9rX0cMudv04=; fh=txdpzj+PQ8Twqdt298LrObfOMi6pk1CcJCyQ7LIbwx4=; b=TQkFomhaWF7E0aeeLmGq2DL4p5EN/Kd2YQqbULjr6H4EGDneGoIb8K8OtrXhDZs1yU m9kjTARZm/nmtbwjQihKvWNHIApKGnslyDXsW9NDu9LnYIW0bW8acc72sasVW2immDuW qlJnBYyM8kOc5mJqxqvGP974F60s+KMcrn4j4ZDfMsOqy3q1/cJjuE1dpiDNdmDkUdrb et8BPBvBDB62g/IJ3o5dK3RjfQglBUTBqq3/bghLmlW1YJIkuR8cYAPOlMRjwIbTf9y2 seKRTMbm/uUnPh38Q/C86Zycmce+KXsLBC1XyptqBwDrf5R/e9zUfQkwF3fye+YFsGsg 7LRg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=bSIpDTWc; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-55581-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-55581-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev X-Forwarded-Encrypted: i=1; AJvYcCUiGkIUAVltcw342Zurd6xuFLnv4XsG4F3BqDE1WoEwzKtOKHbenWDYjF66eKr3EJ/Y76wXN4kmJIG6BHPuxgLhQyLFL3PB8OqJfcRZaw== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id pj4-20020a05620a1d8400b0078403334a55si2979962qkn.133.2024.02.06.12.19.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 06 Feb 2024 12:19:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-55581-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=bSIpDTWc; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-55581-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-55581-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id E44B51C229B5 for ; Tue, 6 Feb 2024 20:19:23 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id BCC8018054; Tue, 6 Feb 2024 20:19:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="bSIpDTWc" Received: from out-180.mta0.migadu.com (out-180.mta0.migadu.com [91.218.175.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A340517BA0 for ; Tue, 6 Feb 2024 20:19:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.180 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707250751; cv=none; b=bN5hbhyBR1RC6jTvywx6ESfGWLOo5oSc5JzneWa8GQGUj73gNDj8fxLWy8+m7sHA85i2Y5SXw0r4tpUwoAWFrvoaw8DGgzy2ChRLf6+BVyWcV5QpwywZBVA5pOrd/K2OLmQYwaRD4LaLUAPerMjt8zxW9wFNySA9G+cDrhT3Z0Y= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707250751; c=relaxed/simple; bh=CvqiEYInYd5a5l6jtW2YD1didNCDQzJwxx0JM3XNOpI=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=BwB1PBrU3PBdlEBZFb2qV++/oxe9J0cqGvFgcPuoL52wf1NExScKNyz/L9UMvv6CaSQ1/Vol44el5g3v9hs4QM8gOFnwmA05GYio6JoPDYv5xgoFVgBoAC4g1IFU6egfmIslhNedFeZBOu9BKYNddbjI/p3PE8H9YbSsCiHcxQc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=bSIpDTWc; arc=none smtp.client-ip=91.218.175.180 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1707250747; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=/Tm3QJ8ktnoQXwinKZstJfbJd1PnNWgD9rX0cMudv04=; b=bSIpDTWcgiVydgYV6QG8ktqF9gSZ203W29s/MfAwSIZ8zMQ6TjGTpkO1EYtb1Q13YoRrMI w1JM6fJGXavHELNfuC+9/f5A/cuSw00qaTkCbtW9iE8v8CoEr6D9MHipb0hI4EQC/YGFuq Cu1uAayTOJ9Eq5NhFjrfGq87EkaCc9o= From: Kent Overstreet To: brauner@kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Kent Overstreet Subject: [PATCH v2 0/7] filesystem visibililty ioctls Date: Tue, 6 Feb 2024 15:18:48 -0500 Message-ID: <20240206201858.952303-1-kent.overstreet@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT previous: https://lore.kernel.org/linux-fsdevel/20240206-aufwuchs-atomkraftgegner-dc53ce1e435f@brauner/T/ Changes since v1: - super_set_uuid() helper, per Dave - nix FS_IOC_SETUUID - Al raised this and I'm in 100% agreement, changing a UUID on an existing filesystem is a rare operation that should only be done when the filesystem is offline; we'd need to audit/fix a bunch of stuff if we wanted to support this - fix iocl numberisng, no longer using btrfs's space - flags argument in struct fsuuid2 is gone; since we're no longer setting this is no longer needed. As discussed previously, this interface is only for exporting the public, user-changable UUID (and there's now a comment saying that this exports the same UUID that libblkid reports, per Darrick). Darrick also noticed that fscrypt (!) is using sb->s_uuid, which looks busted - they want to be using the "this can never change" UUID, but that is not an item for this patchset. - FS_IOC_GETSYSFSNAME -> FS_IOC_GETSYSFSPATH, per Darrick (the commit messages didn't get updated, whoops); and there's now a comment to reflect that this patch is also for finding filesystem info under debugfs, if present. Christain, if nothing else comes up, are you ready to take this? Cheers, Kent Kent Overstreet (7): fs: super_set_uuid() overlayfs: Convert to super_set_uuid() fs: FS_IOC_GETUUID fat: Hook up sb->s_uuid fs: FS_IOC_GETSYSFSNAME xfs: add support for FS_IOC_GETSYSFSNAME bcachefs: add support for FS_IOC_GETSYSFSNAME fs/bcachefs/fs.c | 3 ++- fs/ext4/super.c | 2 +- fs/f2fs/super.c | 2 +- fs/fat/inode.c | 3 +++ fs/gfs2/ops_fstype.c | 2 +- fs/ioctl.c | 33 +++++++++++++++++++++++++++++++++ fs/kernfs/mount.c | 4 +++- fs/ocfs2/super.c | 4 ++-- fs/overlayfs/util.c | 14 +++++++++----- fs/ubifs/super.c | 2 +- fs/xfs/xfs_mount.c | 4 +++- include/linux/fs.h | 10 ++++++++++ include/uapi/linux/fs.h | 27 +++++++++++++++++++++++++++ mm/shmem.c | 4 +++- 14 files changed, 99 insertions(+), 15 deletions(-) -- 2.43.0