{"id":2229326,"url":"http://patchwork.ozlabs.org/api/1.1/patches/2229326/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-ext4/patch/b18811c1a8dedca0c8035dbd4da5b96d6cc456fa.1777357321.git.asj@kernel.org/","project":{"id":8,"url":"http://patchwork.ozlabs.org/api/1.1/projects/8/?format=json","name":"Linux ext4 filesystem development","link_name":"linux-ext4","list_id":"linux-ext4.vger.kernel.org","list_email":"linux-ext4@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null},"msgid":"<b18811c1a8dedca0c8035dbd4da5b96d6cc456fa.1777357321.git.asj@kernel.org>","date":"2026-04-28T06:42:58","name":"[v4,8/9] fstests: verify exportfs file handles on cloned filesystems","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"abbf649c5af1528c7e6f1c794833e3f3a5520556","submitter":{"id":92722,"url":"http://patchwork.ozlabs.org/api/1.1/people/92722/?format=json","name":"Anand Jain","email":"asj@kernel.org"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/linux-ext4/patch/b18811c1a8dedca0c8035dbd4da5b96d6cc456fa.1777357321.git.asj@kernel.org/mbox/","series":[{"id":501769,"url":"http://patchwork.ozlabs.org/api/1.1/series/501769/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-ext4/list/?series=501769","date":"2026-04-28T06:42:52","name":"fstests: add test coverage for cloned filesystem ids","version":4,"mbox":"http://patchwork.ozlabs.org/series/501769/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2229326/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2229326/checks/","tags":{},"headers":{"Return-Path":"\n <SRS0=A4C9=C3=vger.kernel.org=linux-ext4+bounces-16143-patchwork-incoming=ozlabs.org@ozlabs.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-ext4@vger.kernel.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","patchwork-incoming@ozlabs.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=PIdcSzJa;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=ozlabs.org\n (client-ip=2404:9400:2221:ea00::3; helo=mail.ozlabs.org;\n envelope-from=srs0=a4c9=c3=vger.kernel.org=linux-ext4+bounces-16143-patchwork-incoming=ozlabs.org@ozlabs.org;\n receiver=patchwork.ozlabs.org)","gandalf.ozlabs.org;\n arc=pass smtp.remote-ip=172.234.253.10 arc.chain=subspace.kernel.org","gandalf.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=kernel.org","gandalf.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=PIdcSzJa;\n\tdkim-atps=neutral","gandalf.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-ext4+bounces-16143-patchwork-incoming=ozlabs.org@vger.kernel.org;\n receiver=ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"PIdcSzJa\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from mail.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4WGH2Kp6z1yHv\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 16:47:51 +1000 (AEST)","from mail.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3])\n\tby gandalf.ozlabs.org (Postfix) with ESMTP id 4g4WGH1mnGz4wJW\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 16:47:51 +1000 (AEST)","by gandalf.ozlabs.org (Postfix)\n\tid 4g4WGH1jxSz4wK5; Tue, 28 Apr 2026 16:47:51 +1000 (AEST)","from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby gandalf.ozlabs.org (Postfix) with ESMTPS id 4g4WGD06bZz4wJW\n\tfor <patchwork-incoming@ozlabs.org>; Tue, 28 Apr 2026 16:47:48 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 77EAD30A812A\n\tfor <patchwork-incoming@ozlabs.org>; Tue, 28 Apr 2026 06:43:31 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 0C32F355F57;\n\tTue, 28 Apr 2026 06:43:30 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id BF1F534D901;\n\tTue, 28 Apr 2026 06:43:29 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 02409C2BCB7;\n\tTue, 28 Apr 2026 06:43:27 +0000 (UTC)"],"ARC-Seal":["i=2; a=rsa-sha256; d=ozlabs.org; s=201707; t=1777358871; cv=pass;\n\tb=hLIJGi5TGqwvEXZi2UrsuWj3Geqnx9KWBsWbelpiXRWn0DackRumaxxCrLWTnhSytwcl+/KtDHdUpVNnInHRiGGKqJ4ws24Cq3kMt/Y42efcYllnAfDQynyda+tEeZNpkdnXjTkzh8/5MmUtBJHt0/3zMHTp2YJrsrSOI61edpjlsvEYSPqirS3Celdt2n7alApOn2xSLcYKZ4v3vuvYXegLCgtBLMV/I89WGiJDINWGIGMi092tY25fENKGnPFGGHCrjxSkxzSofiKSRK9tkDWCPM6jWorxLcQFV+VYEPvxE5mG0WoF8rNz8QyGPdbdfPbLlY5Q7yq07sFRdmauVQ==","i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777358609; cv=none;\n b=JbA9K4dG2PyuK8SogT6oB3zjoeiK5ahUjOTYdsaC3xmq8KFQGyKdvimvcvNa+9a+gZVVracokxmlDIJ5yUymFBDTtLcGvuKlCdOAoz3GtGYuUe5bMbd7+qtEVWshiqH0bH+uCyvwPpaR0BI7KP+1s3WWZCViDGDvgkNfwN1jzGw="],"ARC-Message-Signature":["i=2; a=rsa-sha256; d=ozlabs.org; s=201707;\n\tt=1777358871; c=relaxed/relaxed;\n\tbh=bNkRcVo5sV9htfKfRcXEn6CqlV/SMdBn2+ivACnAaP4=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version;\n b=mFHLZZqGK/7wcAdSy1VSmJY3I4vXqkbnh+rmYTmBGLT7303EfdS4dFZh8cZjb9qoLApSMvultHnv/LpKFxkTCeaBARGXnLQkHQguW0tuk+93t0WnkgH7mpLYaZVeIO6PdpCiHnPBfsPQ1Y5M9SYLjlGm3x8h1W7mzhvSADlrCk4KlIbXow42wTvqQRolyKt91gsBtEbR/GBJk8kkcMzw6Ea3USfr6fg6lOyHMtFO+wsxKKtfWmCjQ4oM3jIHc3uGBj9k8IPfhtSc0O0+Y+/qmh9LYZQojZT44jcERteOt3DMQ8ygsQ0LPvT5ZGcDSpjF0/r7uSK27DblT2RWtqg53A==","i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777358609; c=relaxed/simple;\n\tbh=MU0+wWD5RZ6FgcZ3PtZtBCvGmv1SZt87kcHtgv2OsQU=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version;\n b=ZbjllGR3QMTmGRCftjhfr1pJtt5jutRnjNcXLbdOvClhZQqC0n9+CrR3GKihfQ5KdSiToh7LG1GALN9JON6LnDlK/GQ9BB5A8GcXHLUKP/xVe9w6wjteg1F6L+tEC6L8nJqAeWTY03k7ZR23rPoc18fvGX2NSYpqYvNlFJiTieg="],"ARC-Authentication-Results":["i=2; gandalf.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=kernel.org;\n dkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=PIdcSzJa; dkim-atps=neutral;\n spf=pass (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-ext4+bounces-16143-patchwork-incoming=ozlabs.org@vger.kernel.org;\n receiver=ozlabs.org) smtp.mailfrom=vger.kernel.org","i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=PIdcSzJa; arc=none smtp.client-ip=10.30.226.201"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1777358609;\n\tbh=MU0+wWD5RZ6FgcZ3PtZtBCvGmv1SZt87kcHtgv2OsQU=;\n\th=From:To:Cc:Subject:Date:In-Reply-To:References:From;\n\tb=PIdcSzJa5Go2gNn2MzNLJW1WNXRIC9PJEsKa/mJHX25Gx3wkNrCGrmeZOykMZ3MKw\n\t /TMT26Ng3cxlVgTloh0TgHhzYVhS1VQWL9aGs7ANl6TFxibd1kH2vEIxDuT8i5O1Hz\n\t 0ZRWX8Z3zQc9k0AvCkTArQ71HEKMgPUhEjhJPWDfSt22pNlNFLlIH2iLnqcE5DftCR\n\t OK0taxybljbhh5IEFH8kVKB7t3zrZXVeK+BbCt/z43HYc9QqOuuTWeY6q++eaOHuMa\n\t LdhCpbgn3cLi9aBmPynYCmbPvSvwEhdXP7Pi/conATZkPTUymlLfBYCUJOywiUASqb\n\t sGATI2OIxLXHA==","From":"Anand Jain <asj@kernel.org>","To":"fstests@vger.kernel.org","Cc":"linux-btrfs@vger.kernel.org,\n\tlinux-ext4@vger.kernel.org,\n\tlinux-xfs@vger.kernel.org,\n\tlinux-f2fs@vger.kernel.org,\n\tamir73il@gmail.com,\n\tzlang@redhat.com,\n\thch@infradead.org","Subject":"[PATCH v4 8/9] fstests: verify exportfs file handles on cloned\n filesystems","Date":"Tue, 28 Apr 2026 14:42:58 +0800","Message-ID":"\n <b18811c1a8dedca0c8035dbd4da5b96d6cc456fa.1777357321.git.asj@kernel.org>","X-Mailer":"git-send-email 2.43.0","In-Reply-To":"<cover.1777357320.git.asj@kernel.org>","References":"<cover.1777357320.git.asj@kernel.org>","Precedence":"bulk","X-Mailing-List":"linux-ext4@vger.kernel.org","List-Id":"<linux-ext4.vger.kernel.org>","List-Subscribe":"<mailto:linux-ext4+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-ext4+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","X-Spam-Status":"No, score=-1.2 required=5.0 tests=ARC_SIGNED,ARC_VALID,\n\tDKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DMARC_PASS,\n\tMAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=disabled\n\tversion=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on gandalf.ozlabs.org"},"content":"Ensure that exportfs can correctly decode file handles on a cloned\nfilesystem across a mount cycle, by file handles generated on a\ncloned device remain valid after mount cycle.\n\nSigned-off-by: Anand Jain <asj@kernel.org>\n---\n tests/generic/805     | 73 +++++++++++++++++++++++++++++++++++++++++++\n tests/generic/805.out |  2 ++\n 2 files changed, 75 insertions(+)\n create mode 100644 tests/generic/805\n create mode 100644 tests/generic/805.out","diff":"diff --git a/tests/generic/805 b/tests/generic/805\nnew file mode 100644\nindex 000000000000..98e7172e141f\n--- /dev/null\n+++ b/tests/generic/805\n@@ -0,0 +1,73 @@\n+#! /bin/bash\n+# SPDX-License-Identifier: GPL-2.0\n+# Copyright (c) 2026 Anand Jain <asj@kernel.org>.  All Rights Reserved.\n+#\n+# FS QA Test No. 805\n+\n+. ./common/preamble\n+\n+_begin_fstest auto quick exportfs clone\n+\n+_require_test\n+_require_block_device $TEST_DEV\n+_require_exportfs\n+_require_loop\n+_require_test_program \"open_by_handle\"\n+\n+_cleanup()\n+{\n+\tcd /\n+\trm -r -f $tmp.*\n+\t_unmount $mnt1 2>/dev/null\n+\t_unmount $mnt2 2>/dev/null\n+\t_loop_image_destroy \"${devs[@]}\" 2> /dev/null\n+}\n+\n+# Create test dir and test files, encode file handles and store to tmp file\n+create_test_files()\n+{\n+\trm -rf $testdir\n+\tmkdir -p $testdir\n+\t$here/src/open_by_handle -cwp -o $tmp.handles_file $testdir $NUMFILES\n+}\n+\n+# Decode file handles loaded from tmp file\n+test_file_handles()\n+{\n+\tlocal opt=$1\n+\tlocal when=$2\n+\n+\techo test_file_handles after $when\n+\t$here/src/open_by_handle $opt -i $tmp.handles_file $mnt2 $NUMFILES\n+}\n+\n+devs=()\n+_loop_image_create_clone devs\n+mkdir -p $TEST_DIR/$seq\n+mnt1=$TEST_DIR/$seq/mnt1\n+mnt2=$TEST_DIR/$seq/mnt2\n+mkdir -p $mnt1\n+mkdir -p $mnt2\n+\n+_mount $(_common_dev_mount_options) $(_clone_mount_option) ${devs[0]} $mnt1 || \\\n+\t\t\t\t\t\t_fail \"Failed to mount dev1\"\n+_mount $(_common_dev_mount_options) $(_clone_mount_option) ${devs[1]} $mnt2 || \\\n+\t\t\t\t\t\t_fail \"Failed to mount dev2\"\n+\n+NUMFILES=1\n+testdir=$mnt2/testdir\n+\n+# Decode file handles of files/dir after cycle mount\n+create_test_files\n+\n+_unmount $mnt1\n+_unmount $mnt2\n+_mount $(_common_dev_mount_options) $(_clone_mount_option) ${devs[1]} $mnt2 || \\\n+\t\t\t\t\t\t_fail \"Failed to mount dev2\"\n+_mount $(_common_dev_mount_options) $(_clone_mount_option) ${devs[0]} $mnt1 || \\\n+\t\t\t\t\t\t_fail \"Failed to mount dev1\"\n+\n+test_file_handles -rp \"cycle mount\"\n+\n+status=0\n+exit\ndiff --git a/tests/generic/805.out b/tests/generic/805.out\nnew file mode 100644\nindex 000000000000..29b11ec77ffb\n--- /dev/null\n+++ b/tests/generic/805.out\n@@ -0,0 +1,2 @@\n+QA output created by 805\n+test_file_handles after cycle mount\n","prefixes":["v4","8/9"]}