From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D2839FD8FCF for ; Thu, 26 Feb 2026 15:56:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:Cc:To:In-Reply-To:References:Message-Id :MIME-Version:Subject:Date:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=+zmGXs/TJAGSuhlyLOHVbdfLVR2ry/FIKU3sZkl1CNQ=; b=hxkrtTfv4zyHfy gdH9hwAXQClAjDKmez9JrBqepIyzWxs9MfsG2Bdkysf/fhf3wFsBzYZVaYF/JxT4iocPdtsrFuh7j 7o6EKNZA6ZHzu1RPZAz2b+KSgW0b1DbEeWgHFvvJW0V09wUPTiwqMyS66qEanXBjXIRhOLlIkB2Kj DzcCctICNfECshh3X9tocmmlKqLE7gd3L9V/EMR+9U2EhmvjYAx8to+Mz03mEVWaMRhVHQ1bpEQ3g fGehRb0yKYFraPlz+nwYcDukoCKLfC7hgK1Ifa5RkvQAhwYYGhB8XTPV0WRMPDhHlqselnIabo48g R5cwCjxJ1VvV4IqztdSg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux)) id 1vvdjJ-00000006ZLh-2BSU; Thu, 26 Feb 2026 15:56:45 +0000 Received: from sea.source.kernel.org ([2600:3c0a:e001:78e:0:1991:8:25]) by bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux)) id 1vvdjG-00000006ZK8-3TuG; Thu, 26 Feb 2026 15:56:44 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by sea.source.kernel.org (Postfix) with ESMTP id 20EF644522; Thu, 26 Feb 2026 15:56:42 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8BD31C2BC86; Thu, 26 Feb 2026 15:56:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772121402; bh=p4gAehVmKV9HRwKOVD7lkA3H4G5n6gGJrLiMZGfJlk8=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=GJUXRCbNue8c5nQUmOYnprKKGdq7est6xgtINLJuUUXA4AxOjErZBX1aak75+Z21b sxiP1Rl7ai+UG33KyVcwcRkjZXWRDBruS7v9OzV8IuEOOSF3c8s1CXc28CbGsrZGtE xD0keh/3myZHJQB64m40mvnfyBsaLRvn1Dnmw9dC0BDswBoq55OK9GwHazx35/BTvI AWKEnc6brxgFFmMt17kKJI6KCK6v1ivCu24aRSOj8nQK8WkEfm+jfEukffTvGE03Ll nJ1uNR5hOO0JnT6KLr0xHOiP1dSY5HMiZwyXHC/GMlpwNre1sCDIp3ELyKlr7lS7OX qCy5Ft/TOotVw== From: Jeff Layton Date: Thu, 26 Feb 2026 10:55:04 -0500 Subject: [PATCH 02/61] vfs: change i_ino from unsigned long to u64 MIME-Version: 1.0 Message-Id: <20260226-iino-u64-v1-2-ccceff366db9@kernel.org> References: <20260226-iino-u64-v1-0-ccceff366db9@kernel.org> In-Reply-To: <20260226-iino-u64-v1-0-ccceff366db9@kernel.org> To: Alexander Viro , Christian Brauner , Jan Kara , Steven Rostedt , Masami Hiramatsu , Mathieu Desnoyers , Dan Williams , Matthew Wilcox , Eric Biggers , "Theodore Y. Ts'o" , Muchun Song , Oscar Salvador , David Hildenbrand , David Howells , Paulo Alcantara , Andreas Dilger , Jan Kara , Jaegeuk Kim , Chao Yu , Trond Myklebust , Anna Schumaker , Chuck Lever , NeilBrown , Olga Kornievskaia , Dai Ngo , Tom Talpey , Steve French , Ronnie Sahlberg , Shyam Prasad N , Bharath SM , Alexander Aring , Ryusuke Konishi , Viacheslav Dubeyko , Eric Van Hensbergen , Latchesar Ionkov , Dominique Martinet , Christian Schoenebeck , David Sterba , Marc Dionne , Ian Kent , Luis de Bethencourt , Salah Triki , "Tigran A. Aivazian" , Ilya Dryomov , Alex Markuze , Jan Harkes , coda@cs.cmu.edu, Nicolas Pitre , Tyler Hicks , Amir Goldstein , Christoph Hellwig , John Paul Adrian Glaubitz , Yangtao Li , Mikulas Patocka , David Woodhouse , Richard Weinberger , Dave Kleikamp , Konstantin Komarov , Mark Fasheh , Joel Becker , Joseph Qi , Mike Marshall , Martin Brandenburg , Miklos Szeredi , Anders Larsen , Zhihao Cheng , Damien Le Moal , Naohiro Aota , Johannes Thumshirn , John Johansen , Paul Moore , James Morris , "Serge E. Hallyn" , Mimi Zohar , Roberto Sassu , Dmitry Kasatkin , Eric Snowberg , Fan Wu , Stephen Smalley , Ondrej Mosnacek , Casey Schaufler , Alex Deucher , =?utf-8?q?Christian_K=C3=B6nig?= , David Airlie , Simona Vetter , Sumit Semwal , Eric Dumazet , Kuniyuki Iwashima , Paolo Abeni , Willem de Bruijn , "David S. Miller" , Jakub Kicinski , Simon Horman , Oleg Nesterov , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Namhyung Kim , Mark Rutland , Alexander Shishkin , Jiri Olsa , Ian Rogers , Adrian Hunter , James Clark , "Darrick J. Wong" , Martin Schiller Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, nvdimm@lists.linux.dev, fsverity@lists.linux.dev, linux-mm@kvack.org, netfs@lists.linux.dev, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-nfs@vger.kernel.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, linux-nilfs@vger.kernel.org, v9fs@lists.linux.dev, linux-afs@lists.infradead.org, autofs@vger.kernel.org, ceph-devel@vger.kernel.org, codalist@coda.cs.cmu.edu, ecryptfs@vger.kernel.org, linux-mtd@lists.infradead.org, jfs-discussion@lists.sourceforge.net, ntfs3@lists.linux.dev, ocfs2-devel@lists.linux.dev, devel@lists.orangefs.org, linux-unionfs@vger.kernel.org, apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org, linux-integrity@vger.kernel.org, selinux@vger.kernel.org, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, linaro-mm-sig@lists.linaro.org, netdev@vger.kernel.org, linux-perf-users@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-xfs@vger.kernel.org, linux-hams@vger.kernel.org, linux-x25@vger.kernel.org, Jeff Layton X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=openpgp-sha256; l=1326; i=jlayton@kernel.org; h=from:subject:message-id; bh=p4gAehVmKV9HRwKOVD7lkA3H4G5n6gGJrLiMZGfJlk8=; b=owEBbQKS/ZANAwAKAQAOaEEZVoIVAcsmYgBpoG0E7jdzVUiTIZmlR2CbMineoxpzqpeIgZghk w9xgP6zhVKJAjMEAAEKAB0WIQRLwNeyRHGyoYTq9dMADmhBGVaCFQUCaaBtBAAKCRAADmhBGVaC FddWEAC/pE+Y3T6Sy6mzHZaq/ChUkWFVvyHrvP0hJug6Uo8Izaru5rInGMeAdUWp/Kq9GEBWDYd /VRX/PMYewqA9ZBE6BfIe3k9MHRxDbRdJ1DDUZrgrfwTjQ+V1qQZjA25e6SflJIsWyPi2tIsTOj 3pc9wz4+v+SFEPDSSvdwlwsd1DUeBkbZ9w7suFRGOI7I5VdslhapmQuqz7wOaIsILumdQIA5V18 1sA/ljkjTWvu3wRqnx2/HZwqH6Hk3vCl4jTwXTKMOtbHBRhN9T7nWQg2XKX323R54BIRKKDDoa+ FIms6yXt07D0pcD8Qxe3ynSsIZZlM+CHi2etoc3KcSBOQZ4qUUhKeekchWa5rXdnUR5dHCAccjC cGFjJLxuGTBREkSYZVk1Dw+nJZVJqCzjeRLtOkDP7QdcQn2UFWnPuuDiiRSlDo11QXWh1cUNOJu umuHhAch0IS0VZ4zXX3Pm4XqH49/QnNNEPW3I5F+ezC07rpVel7oHK+Wg95LWew1niKhvVTTbtA 3n0H6Vm80X1OlmZWH4V1WeUN48P2H4agTQxObtRr48n07+hmCldNwwwi3o5mArzoh58n1cVbutF bCbB2Iwu/fQevOiKPcQuu76biljIvPYmgGX+lQ30ipMaGmAOibaungypM5v6ep1tOUtQApiOanC dYao6xjrL9V2c3w== X-Developer-Key: i=jlayton@kernel.org; a=openpgp; fpr=4BC0D7B24471B2A184EAF5D3000E684119568215 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20260226_075642_922442_03BADB2F X-CRM114-Status: GOOD ( 14.34 ) X-BeenThere: linux-mtd@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Linux MTD discussion mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-mtd" Errors-To: linux-mtd-bounces+linux-mtd=archiver.kernel.org@lists.infradead.org Change the type of i_ino in struct inode from unsigned long to u64. On 64-bit architectures, unsigned long is already 64 bits, so this is effectively a type alias change with no runtime impact. On 32-bit architectures, this widens i_ino from 32 to 64 bits, allowing filesystems like NFS, CIFS, XFS, Ceph, and FUSE to store their native 64-bit inode numbers without folding/hashing. The VFS already handles 64-bit inode numbers in kstat.ino (u64) and statx.stx_ino (__u64). The existing overflow checks in cp_new_stat(), cp_old_stat(), and cp_compat_stat() handle narrowing to 32-bit st_ino with -EOVERFLOW, so userspace ABI is preserved. struct inode will grow by 4 bytes on 32-bit architectures. Signed-off-by: Jeff Layton --- include/linux/fs.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/fs.h b/include/linux/fs.h index dfa1f475b1c480c503ab6f00e891aa9b051607fa..097443bf12e289c347651e5f3da5b67eb6b53121 100644 --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -783,7 +783,7 @@ struct inode { #endif /* Stat data, not accessed from path walking */ - unsigned long i_ino; + u64 i_ino; /* * Filesystems may only read i_nlink directly. They shall use the * following functions for modification: -- 2.53.0 ______________________________________________________ Linux MTD discussion mailing list http://lists.infradead.org/mailman/listinfo/linux-mtd/