Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1599911pxb; Tue, 8 Feb 2022 23:40:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJwngEZTurgIZJVg7JB1IIMHDqGb7iksX9f7vLYH/Vz1qIW6VjHGmqTOp0k2ctSrGCii4ZJi X-Received: by 2002:a17:902:e309:: with SMTP id q9mr887660plc.69.1644392434699; Tue, 08 Feb 2022 23:40:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644392434; cv=none; d=google.com; s=arc-20160816; b=VlF0cStdsAGZ8Jf6x8q6dpxhJl64NOLFl5IeL++sB/Ks3rVa+dLCOV9ugu9xtKQ6Ms gBq4EFNKIqpSVimrNg3sLLzncKoRv7uPrFeeHDYGxOBe1b5+u0A8crhesLpFHHVlnmfB QH9Rj60dt+ywH8RGirBG0wPE3d9MTfDR+BP3XNEYxxpVo5N2eQPEtiNLry1dFs/N934a kQTN/sxUnR5Bsutx7uBnDoFs3QpZkbXOxpqKJRycaDB76rxtImgoH8hDI43Sdj0v4pxE NqTKR9t6wlAknLV75S2L9zaeRh4s0R5LtbfpWNLOvYwwwnIMF+eCYl/T0NGp3zZpZrLx 9Gzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:references:in-reply-to:subject :cc:to:from:mime-version:content-transfer-encoding:dkim-signature :dkim-signature; bh=QcGgrQSmVUQJUmkNSf3OWYjL1dix04JBmnpiDqBdSOc=; b=Qmk1BzR5JwsnHEihn9pnn39c7y/qVmf5sfyaq7W62hdXG6UyeGLVNBXl+4tpJPmr50 HflwO3GpiPDczS9LtnAzDzHW7JlWZkqYi/bmPLftaslKFqEdvDFSTPEIDQV5FJZsDb7b +77XgwoDgJ68Fx9jk/Z+DOhfXkgiIlqrMsOYo3kDNV5yseOiyTeu4yW4E9nwxak4HUpo H59PDSlcKXHbTHsTUK6uH6FskYwprVhZMo34SxdVyFhRHoiXVtiT5m/wM/gd6Z0VcjVW NP4xY1ZfuB4yo1GO7MEASBXufiSdEbaZ1d2cWvU5IAn5WNvAgs2SzZSIgYtk5305q7Y5 bCiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=kCIQTDmm; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h2si14898646pgc.39.2022.02.08.23.40.19; Tue, 08 Feb 2022 23:40:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=kCIQTDmm; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235393AbiBHB7u (ORCPT + 99 others); Mon, 7 Feb 2022 20:59:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46490 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230489AbiBHB7u (ORCPT ); Mon, 7 Feb 2022 20:59:50 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4101CC061355 for ; Mon, 7 Feb 2022 17:59:49 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id BB39B210E9; Tue, 8 Feb 2022 01:59:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1644285587; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=QcGgrQSmVUQJUmkNSf3OWYjL1dix04JBmnpiDqBdSOc=; b=kCIQTDmmB/zugna9lkEWr/yzba1mmwQfPHcdPoLTv23zAA1JwAPNnPSAEseRbuyJlZ/+Cx c1rWEThyi4is5myepHBwMk36GvCKv38Jy8JSSLSLFBpZqP0XUpeePRvA8xSma+OP01sRbT evBABfztIHFSeRulFDG5usX/n9SeQV4= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1644285587; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=QcGgrQSmVUQJUmkNSf3OWYjL1dix04JBmnpiDqBdSOc=; b=nmRrx73xIAmk8w5KP8lzAmqwqr/ARJaJgLMTKFYu5b8bMBqJX3jA0c8weBXMXiCwfSZTkN 4ZHb0ySxTvhnSWBQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 655FB12FC5; Tue, 8 Feb 2022 01:59:44 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id YBrPCJDOAWLNSAAAMHmgww (envelope-from ); Tue, 08 Feb 2022 01:59:44 +0000 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit MIME-Version: 1.0 From: "NeilBrown" To: "Benjamin Coddington" Cc: "Linux NFS Mailing List" Subject: Re: v4 clientid uniquifiers in containers/namespaces In-reply-to: <6CEC5101-0512-4082-81F8-BDFEC5B6DF3A@redhat.com> References: <6CEC5101-0512-4082-81F8-BDFEC5B6DF3A@redhat.com> Date: Tue, 08 Feb 2022 12:59:38 +1100 Message-id: <164428557862.27779.17375354328525752842@noble.neil.brown.name> X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Sun, 06 Feb 2022, Benjamin Coddington wrote: > Hi all, > > Is anyone using a udev(-like) implementation with NETLINK_LISTEN_ALL_NSID? > It looks like that is at least necessary to allow the init namespaced udev > to receive notifications on /sys/fs/nfs/net/nfs_client/identifier, which > would be a pre-req to automatically uniquify in containers. Could you walk me through the reasoning here - or point me to where it has been discussed. It seems to me that mount.nfs is the place to set nfs_client/identifier. It can be told (via /etc/nfs.conf or /etc/nfsmount.conf) how to generate and where to store the identifier. It can check the current value and update if needed. As long as the identifier is set before the first mount, there is no rush. Why does it need to be done in response to a uevent?? Thanks, NeilBrown