Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp2496200lqb; Tue, 28 May 2024 01:20:36 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXK8BLX6L1dX9PtL9/X0N6qMBdF8SBLxBhVHR5uFePzfJKGT2DWOuiDHbtYWJNZ5Y7QoBk3CtcTDrDJyjGi416KmtdOjP99uUbd9bxtQg== X-Google-Smtp-Source: AGHT+IG0Y5LSRbHlDfO7fFkBwnJXBSvKxGUCL7rseLv7kCIaOkAJGuVHUsNiXYpJNg4lACDNsoUX X-Received: by 2002:a05:6358:c115:b0:186:119d:8c16 with SMTP id e5c5f4694b2df-197e546657cmr1044164355d.23.1716884436059; Tue, 28 May 2024 01:20:36 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716884436; cv=pass; d=google.com; s=arc-20160816; b=ulXHZQtNFhJjBhWpLO2gSDiWtj5Dpx/hSqbVuUMxvYMFJlz/4xbE0H2UAEatxca+X5 0uOia5Npywhq2xBkgUDC9rorhx9Br4MMOUG0YdMhFewV4bDsnD6NhD525mBP9E+WdSjo RhmADXzvB8LrRxEd2nk2Y9xnDGZ3tWqCjmhpBrhHeQ47cozjClp7ZVWGVSaJmzAVpJPK G2XPhFHmLJupnLQmn5HyBhINAQJ4Q1n2e9Pfewvi1vZKczVvX1oZ2x9DUHC1gWzvJ5Bd onsOxY/W0+wxY2OWC35Is1zSAFn4tDlljd57u5MOono6XAXvYfNZoP9ulov6f6BIimWK 9dBg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=RSJSDekXigIbicC5ZBA5n+EZzxK3aZ6nTRxksnYkJ2I=; fh=qn1thDOp7oUnXpP8lW/X1YDKTirKPzQ6NBfQwZHyQ0U=; b=QUyzh+WLlnjA37x/DVuFBGTk/HhS21TYDmo8r0iqCxxTue4Ax+54fFQ09sEeKFzXrW iSrzQSJ7pKNsv+UXTyXITehOBhkzu60q8SR6LDYKyHDSZzQRBGw+MaANgZ9lDI4Wb7ud QognMSF70zEMCWLJ9NuLXTbpXeWo8ZcXjk6TOjqUdktBOMABBM0MJH1TrReIuB9JeQVb XHog30W8Rpeqj6pJxYT94lJpas6Y8Agz7d3ror8/8+mfN1/VQnXHOMURiksnr+1QXBNP +a4r+8agwm+ktmOWjKHDFk45zWGkrY1/l0JGaaILfdY4CN2YfX3yk9MNnu3O9d+tWHsf VGow==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=mLomtxRc; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-3432-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-3432-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id 41be03b00d2f7-6822779ba71si7794336a12.364.2024.05.28.01.20.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 May 2024 01:20:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs+bounces-3432-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=mLomtxRc; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-3432-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-3432-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 49F58B21EF2 for ; Tue, 28 May 2024 08:20:33 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 601FE13B5B9; Tue, 28 May 2024 08:20:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="mLomtxRc" X-Original-To: linux-nfs@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 30B0873441; Tue, 28 May 2024 08:20:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716884428; cv=none; b=MRq4bDo2Jv/XYbrXLXKTl27dG7OkFZh819CccitKel6yR4KPy5Tm74DmBQ8g4tPojGgZgp3nHNd58Eek6/y2tC5AbnQYutJu5jXSDHtde0Duvk6wTcTQ82eCAz5FDp8/lG/YdYOMkN9/jmrfws//Vpa3rzk9l5Poa1XLi6ZiNpU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716884428; c=relaxed/simple; bh=ef2GWcgmaUf0AdMfddAKzFxmIGHc4piX3DIDo9nhUc0=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=rZsgnG+Nr52vLQ8fTkrAYwzkieikBCg+Jy6YbXS9KdQDbemP939onNCNdY+tdzTzHb0igFddxm8WBN0my9FCuGAJPxbqU4uVPY5sCD1dAym6zcYco8rAso3QoKjwn08U1c9WgsH9C5eUUXT0yF5Dd1GXYU6tiMSeM4YAxdB3Wik= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=mLomtxRc; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 94264C3277B; Tue, 28 May 2024 08:20:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1716884427; bh=ef2GWcgmaUf0AdMfddAKzFxmIGHc4piX3DIDo9nhUc0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=mLomtxRcgnHVYUBmz5vFSVIxsxx1PZp4qr26Wmz7Liw21xHXDkjzoB1HlL7xhW+be EbcV452bPfpBt3tb1DNoLXvSaCS79QpKlD7mZAJ73dayzbUgFh0mhIdMP+HFocJTE8 J/1G+tULvUsHtvprZmNiuN9rvW4wShG+a34wfgp8YkXi0rpJ82OF+CHXMUbB6fzBgR aQk5nmm1cOXlcANGqqYN3JLLklGLKPYWt7dJhYHMviF5pEJBcTiDj/tp2IlXT1PMPA z2d6WpkNmVLMZVwm0AGxC3T5Z4QbpB/IQCmo0SkE2mWMEitf4PD/Ow8u5ZzGRFIa22 oULuaZSQjSCpQ== Date: Tue, 28 May 2024 10:20:21 +0200 From: Christian Brauner To: Christoph Hellwig Cc: Jan Kara , Aleksa Sarai , Alexander Viro , Chuck Lever , Jeff Layton , Amir Goldstein , Alexander Aring , linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org Subject: Re: [PATCH RFC v2] fhandle: expose u64 mount id to name_to_handle_at(2) Message-ID: <20240528-wachdienst-weitreichend-42f8121bf764@brauner> References: <20240523-exportfs-u64-mount-id-v2-1-f9f959f17eb1@cyphar.com> <20240526.184753-detached.length.shallow.contents-jWkMukeD7VAC@cyphar.com> <20240527133430.ifjo2kksoehtuwrn@quack3> Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: > Well, how about we fix the thing for real: > > - allow file systems to provide a uniqueu identifier of at least > uuid size (16 bytes) in the superblock or through an export operation > - for non-persistent file systems allow to generate one at boot time > using the normal uuid generation helpers > - add a new flag to name_to_handle_at/open_by_handle_at to include it > in the file handle, and thus make the file handle work more like > the normal file handle > - add code to nfsd to directly make use of this > > This would solve all the problems in this proposal as well as all the > obvious ones it doesn't solve. As I've said multiple times on the thread I agree that this is what we should do next and I would be happy to take patches for this. But exposing the 64bit mount id doesn't impede or complicate that work. It's a simple and useful addition that can be done now and doesn't prevent us from doing the proposed work. Hell, if you twist my arm I'll even write the patches for this.