Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.2/patches/2232054/?format=api
{ "id": 2232054, "url": "http://patchwork.ozlabs.org/api/1.2/patches/2232054/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-ext4/patch/20260502-case-sensitivity-v13-1-aa853140311f@oracle.com/", "project": { "id": 8, "url": "http://patchwork.ozlabs.org/api/1.2/projects/8/?format=api", "name": "Linux ext4 filesystem development", "link_name": "linux-ext4", "list_id": "linux-ext4.vger.kernel.org", "list_email": "linux-ext4@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260502-case-sensitivity-v13-1-aa853140311f@oracle.com>", "list_archive_url": null, "date": "2026-05-02T14:20:46", "name": "[v13,01/15] fs: Move file_kattr initialization to callers", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "8399402ad232bd593fad6e92814fdac3177491c6", "submitter": { "id": 86689, "url": "http://patchwork.ozlabs.org/api/1.2/people/86689/?format=api", "name": "Chuck Lever", "email": "cel@kernel.org" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linux-ext4/patch/20260502-case-sensitivity-v13-1-aa853140311f@oracle.com/mbox/", "series": [ { "id": 502531, "url": "http://patchwork.ozlabs.org/api/1.2/series/502531/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-ext4/list/?series=502531", "date": "2026-05-02T14:20:45", "name": "Exposing case folding behavior", "version": 13, "mbox": "http://patchwork.ozlabs.org/series/502531/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2232054/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2232054/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <SRS0=JS1B=C7=vger.kernel.org=linux-ext4+bounces-16276-patchwork-incoming=ozlabs.org@ozlabs.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-ext4@vger.kernel.org" ], "Delivered-To": [ "patchwork-incoming@legolas.ozlabs.org", "patchwork-incoming@ozlabs.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=c9dqznjq;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=ozlabs.org\n (client-ip=2404:9400:2221:ea00::3; helo=mail.ozlabs.org;\n envelope-from=srs0=js1b=c7=vger.kernel.org=linux-ext4+bounces-16276-patchwork-incoming=ozlabs.org@ozlabs.org;\n receiver=patchwork.ozlabs.org)", "gandalf.ozlabs.org;\n arc=pass smtp.remote-ip=172.232.135.74 arc.chain=subspace.kernel.org", "gandalf.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=kernel.org", "gandalf.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=c9dqznjq;\n\tdkim-atps=neutral", "gandalf.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.232.135.74; helo=sto.lore.kernel.org;\n envelope-from=linux-ext4+bounces-16276-patchwork-incoming=ozlabs.org@vger.kernel.org;\n receiver=ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"c9dqznjq\"", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201" ], "Received": [ "from mail.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g797q5BY9z1yJw\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 03 May 2026 00:21:27 +1000 (AEST)", "from mail.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3])\n\tby gandalf.ozlabs.org (Postfix) with ESMTP id 4g797q3PJFz4wTH\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 03 May 2026 00:21:27 +1000 (AEST)", "by gandalf.ozlabs.org (Postfix)\n\tid 4g797q3LBfz4wT7; Sun, 03 May 2026 00:21:27 +1000 (AEST)", "from sto.lore.kernel.org (sto.lore.kernel.org [172.232.135.74])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby gandalf.ozlabs.org (Postfix) with ESMTPS id 4g797l4x4Cz4wTH\n\tfor <patchwork-incoming@ozlabs.org>; Sun, 03 May 2026 00:21:23 +1000 (AEST)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 352E63003D1D\n\tfor <patchwork-incoming@ozlabs.org>; Sat, 2 May 2026 14:21:20 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 71CCB33AD81;\n\tSat, 2 May 2026 14:21:18 +0000 (UTC)", "from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 3150C22E3E9;\n\tSat, 2 May 2026 14:21:18 +0000 (UTC)", "by smtp.kernel.org (Postfix) with ESMTPSA id 4A6D2C2BCB3;\n\tSat, 2 May 2026 14:21:12 +0000 (UTC)" ], "ARC-Seal": [ "i=2; a=rsa-sha256; d=ozlabs.org; s=201707; t=1777731687; cv=pass;\n\tb=wTSp6jOuCEtNOMXmd7Eu9pdXIGrY2jjjqYRWu87fPocmyzo8BfhZaOJcwjfIs3qnJrn3w7eLEs9ex4XaJXzGKyjH22fmwEY4qjEmUBFOT0rRHX6a5DdMhd+sjoGV2MKN5eWWDpC6tnPJQ4W9C6rBsTRQnzfedV2A5zImSXSkz/mddDI8ng8PdfTN9I/Ux9t8V9AM/VHejD0H6LFoLggI0NPSuElaMYvAcPnKOX2KwDzZnGmT43t6hP1wg2sMCND3hykiruhxcf1xJ5eTZ1isnZHGeN9keXaHxWcUqtGXVD4loIRFhmlItmW0jfTYIq8YEUWjRxDVxI/9GhetMpbvBg==", "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777731678; cv=none;\n b=L7xgg3qxX1cgwJ7xyPbHxrstRwi9qXJJPcJARoPShv/IOrXtsfg58/uIAwTdnWj3FaYp+36DB+g70RhFIj7ZMd6zGYKzpPAKzejl03AleIJQaYJNE+tKbZrF1ClUdhi1wlk/rF62qr/w34joZLatu+xXGCZ4NCPWbRePiUeOeKE=" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; d=ozlabs.org; s=201707;\n\tt=1777731687; c=relaxed/relaxed;\n\tbh=bLYGD8UhEfZ0gI1O0q/9fKsjTL83YjgnGhMcoMvuzIo=;\n\th=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References:\n\t In-Reply-To:To:Cc;\n b=xCpIOpLHVFU6C18ls1hYzjMCHaMpM0IKjA37K8CtI5tgnuBzxt/Pcg20Z5xVufwUhC2aWNtsrfJJxGcI3XgAxfvefM1rgWt0B2L2dTkbYNkS9K92Xh7DWXhivGoSxgmt4iYhtYtFjGWhkVOhmB5MBXDu53ktzS3fRiu7AarfJf/1ztVu1SlaWnlQV3DtTCVRO5wi1r1j3d64y7xJdo+M/+t/TB2kktVqL6s+gT6hLkDA1JZRjlPG3HFDOnZYuLB9/Ei5m781HFbADIG1QIQkr1j94dHt1HXu3a8DpE12aoKCFaazNfOL/dnmQBB8tBl8EPyDcKmmoBIeebJBsRD1HA==", "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777731678; c=relaxed/simple;\n\tbh=93lkf1HBQv1pjT23tKqszLwADekuVqw95GHVpFk/qSc=;\n\th=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References:\n\t In-Reply-To:To:Cc;\n b=Hc+0kEH02tN9X/q3nnqxZhuPMl4g0JyfH3n36pvCE2qf69fDjTCsbHp6+XvGhBtfI3/qiKNkGfYSjEkFUwH4iTqetNwXX3EiA3GTQ1mNf7Jia6eU09yEgHJJmOgsStoAuRhoCiyLBplyXL6QxT11z/FawnH55NK1ZtfhTxOP2ts=" ], "ARC-Authentication-Results": [ "i=2; gandalf.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=kernel.org;\n dkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=c9dqznjq; dkim-atps=neutral;\n spf=pass (client-ip=172.232.135.74; helo=sto.lore.kernel.org;\n envelope-from=linux-ext4+bounces-16276-patchwork-incoming=ozlabs.org@vger.kernel.org;\n receiver=ozlabs.org) smtp.mailfrom=vger.kernel.org", "i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=c9dqznjq; arc=none smtp.client-ip=10.30.226.201" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1777731678;\n\tbh=93lkf1HBQv1pjT23tKqszLwADekuVqw95GHVpFk/qSc=;\n\th=From:Date:Subject:References:In-Reply-To:To:Cc:From;\n\tb=c9dqznjqT3nK0gCeQf+quqbALJ8ZkUx/FFV7TY+6LxJNYXOuPjd18CBcyRsW7f8Xo\n\t 6U0JvbsS17ncMuKHbtY6r0j1lVz72vfsVnNSyCb1BCp5hxNjNyq9+rJIkK4xWhox5X\n\t KLEoejPahTxkRDbaukchtykIpVIzsv2N87a7n+OPeo5GZPqOy72bPuTiwOOWfmvYIi\n\t qSrsD7ZJPp9sS649/dSuRGSMF0+o7yhh6/3p30Yi/6lWFkg3tA7ZRtCwsuJiq8zooe\n\t +i80WYpX1Ewa8uI54CY9/87F1WtD1c9n6rOFJgOEDK5QH+UdMJGtYjCnx/pNYz5Xad\n\t jDSjFr1aSQm9w==", "From": "Chuck Lever <cel@kernel.org>", "Date": "Sat, 02 May 2026 10:20:46 -0400", "Subject": "[PATCH v13 01/15] fs: Move file_kattr initialization to callers", "Precedence": "bulk", "X-Mailing-List": "linux-ext4@vger.kernel.org", "List-Id": "<linux-ext4.vger.kernel.org>", "List-Subscribe": "<mailto:linux-ext4+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-ext4+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "7bit", "Message-Id": "<20260502-case-sensitivity-v13-1-aa853140311f@oracle.com>", "References": "<20260502-case-sensitivity-v13-0-aa853140311f@oracle.com>", "In-Reply-To": "<20260502-case-sensitivity-v13-0-aa853140311f@oracle.com>", "To": "Al Viro <viro@zeniv.linux.org.uk>,\n Christian Brauner <brauner@kernel.org>, Jan Kara <jack@suse.cz>", "Cc": "linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org,\n linux-xfs@vger.kernel.org, linux-cifs@vger.kernel.org,\n linux-nfs@vger.kernel.org, linux-api@vger.kernel.org,\n linux-f2fs-devel@lists.sourceforge.net, hirofumi@mail.parknet.co.jp,\n linkinjeon@kernel.org, sj1557.seo@samsung.com, yuezhang.mo@sony.com,\n almaz.alexandrovich@paragon-software.com, slava@dubeyko.com,\n glaubitz@physik.fu-berlin.de, frank.li@vivo.com, tytso@mit.edu,\n adilger.kernel@dilger.ca, cem@kernel.org, sfrench@samba.org,\n pc@manguebit.org, ronniesahlberg@gmail.com, sprasad@microsoft.com,\n trondmy@kernel.org, anna@kernel.org, jaegeuk@kernel.org, chao@kernel.org,\n hansg@kernel.org, senozhatsky@chromium.org,\n Chuck Lever <chuck.lever@oracle.com>, \"Darrick J. Wong\" <djwong@kernel.org>,\n Roland Mainz <roland.mainz@nrubsig.org>", "X-Mailer": "b4 0.16-dev", "X-Developer-Signature": "v=1; a=openpgp-sha256; l=3605;\n i=chuck.lever@oracle.com; h=from:subject:message-id;\n bh=AWgZwG1E8rlvIL3m0PCLX9DfISmeBrTqPl/lfHkVgk0=;\n b=owEBbQKS/ZANAwAKATNqszNvZn+XAcsmYgBp9ghQxFmZlM8hYOkYPWqHSSZmcZJ8CLh1PP/PV\n +Mcq86IS9aJAjMEAAEKAB0WIQQosuWwEobfJDzyPv4zarMzb2Z/lwUCafYIUAAKCRAzarMzb2Z/\n l6D0D/9nv8DJn/N4olT5nofAbnfCPhd3NiX0SPC6Gijz5K/lVi+fk2ZgRC0u9rHGkFoB2v8+IPA\n IE8J75WNmzrOhZbbkEeHle4EL/+O9LZFxmCLI3NscUDjscohPfIuRiDHSuCIDdTtUvaSFcteY6Q\n lSL2D7xPQPiUS2wmlT9UFZI19hIvSAIK7NZ1/MY5O4pqKYTQTp3a+R9h4n14GJdyxuQsPepP6PE\n BrHtJdqxb8OS32B9wi7zNgIi/OkyHUYob0OJXTMESPNcM5uokgn19Z3j+3d8f/IF101sARLiR4D\n nWn2wItMJv3zHiccy609tHPxcNZm5mQyHdrBJyVL1eAi8Z5yEDoNvVNF9oqx4LnqUB1JJdboWQT\n ondxrZ3iYYdeEZtlgJpB4vyLJ6S0YSJveawbMLUcrq/N8uZAjIL2YU9uxsZU4p0obzywlqqN1rq\n jZoBk9Hkuv9rEhLudlSHA/tEKURDapop2YKRLPRtljb6bpKDZr/gnLfYb3cZTDp5dnnfPkOb9lP\n a+2ffHzokxKLL0+Lb6MDogG9EK4bSjQELufwgdCIzfFT9NJ5Fv4mcxCfJmgggaaOrQIUhxKC6cr\n aPc/Wy0JR3yXVRtVPbkCn5hTBg9u2/daaw3lEGVVHE+FDG+aWEkZdkPr4aUBVNLYy0Mab6f+9ey\n WkQt0xrO3fuUkCA==", "X-Developer-Key": "i=chuck.lever@oracle.com; a=openpgp;\n fpr=28B2E5B01286DF243CF23EFE336AB3336F667F97", "X-Spam-Status": "No, score=-1.2 required=5.0 tests=ARC_SIGNED,ARC_VALID,\n\tDKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DMARC_PASS,\n\tMAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=disabled\n\tversion=4.0.1", "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on gandalf.ozlabs.org" }, "content": "From: Chuck Lever <chuck.lever@oracle.com>\n\nfileattr_fill_xflags() and fileattr_fill_flags() memset the\nentire file_kattr struct before populating select fields, so\ncallers cannot pre-set fields in fa->fsx_xflags without having\ntheir values clobbered. Darrick Wong noted that a function\nnamed \"fill_xflags\" touching more than xflags forces callers\nto know implementation details beyond its apparent scope.\n\nDrop the memset from both fill functions and initialize at the\nentry points instead: ioctl_setflags(), ioctl_fssetxattr(),\nthe file_setattr() syscall, and xfs_ioc_fsgetxattra() now\ndeclare fa with an aggregate initializer. ioctl_getflags(),\nioctl_fsgetxattr(), and the file_getattr() syscall already\naggregate-initialize fa to pass flags_valid/fsx_valid hints\ninto vfs_fileattr_get().\n\nSubsequent patches rely on this so that ->fileattr_get()\nhandlers can set case-sensitivity flags (FS_XFLAG_CASEFOLD,\nFS_XFLAG_CASENONPRESERVING) in fa->fsx_xflags before the fill\nfunctions run.\n\nSuggested-by: Darrick J. Wong <djwong@kernel.org>\nReviewed-by: Jan Kara <jack@suse.cz>\nReviewed-by: Darrick J. Wong <djwong@kernel.org>\nReviewed-by: Roland Mainz <roland.mainz@nrubsig.org>\nSigned-off-by: Chuck Lever <chuck.lever@oracle.com>\n---\n fs/file_attr.c | 12 ++++--------\n fs/xfs/xfs_ioctl.c | 2 +-\n 2 files changed, 5 insertions(+), 9 deletions(-)", "diff": "diff --git a/fs/file_attr.c b/fs/file_attr.c\nindex da983e105d70..f429da66a317 100644\n--- a/fs/file_attr.c\n+++ b/fs/file_attr.c\n@@ -15,12 +15,10 @@\n * @fa:\t\tfileattr pointer\n * @xflags:\tFS_XFLAG_* flags\n *\n- * Set ->fsx_xflags, ->fsx_valid and ->flags (translated xflags). All\n- * other fields are zeroed.\n+ * Set ->fsx_xflags, ->fsx_valid and ->flags (translated xflags).\n */\n void fileattr_fill_xflags(struct file_kattr *fa, u32 xflags)\n {\n-\tmemset(fa, 0, sizeof(*fa));\n \tfa->fsx_valid = true;\n \tfa->fsx_xflags = xflags;\n \tif (fa->fsx_xflags & FS_XFLAG_IMMUTABLE)\n@@ -48,11 +46,9 @@ EXPORT_SYMBOL(fileattr_fill_xflags);\n * @flags:\tFS_*_FL flags\n *\n * Set ->flags, ->flags_valid and ->fsx_xflags (translated flags).\n- * All other fields are zeroed.\n */\n void fileattr_fill_flags(struct file_kattr *fa, u32 flags)\n {\n-\tmemset(fa, 0, sizeof(*fa));\n \tfa->flags_valid = true;\n \tfa->flags = flags;\n \tif (fa->flags & FS_SYNC_FL)\n@@ -325,7 +321,7 @@ int ioctl_setflags(struct file *file, unsigned int __user *argp)\n {\n \tstruct mnt_idmap *idmap = file_mnt_idmap(file);\n \tstruct dentry *dentry = file->f_path.dentry;\n-\tstruct file_kattr fa;\n+\tstruct file_kattr fa = {};\n \tunsigned int flags;\n \tint err;\n \n@@ -357,7 +353,7 @@ int ioctl_fssetxattr(struct file *file, void __user *argp)\n {\n \tstruct mnt_idmap *idmap = file_mnt_idmap(file);\n \tstruct dentry *dentry = file->f_path.dentry;\n-\tstruct file_kattr fa;\n+\tstruct file_kattr fa = {};\n \tint err;\n \n \terr = copy_fsxattr_from_user(&fa, argp);\n@@ -431,7 +427,7 @@ SYSCALL_DEFINE5(file_setattr, int, dfd, const char __user *, filename,\n \tstruct path filepath __free(path_put) = {};\n \tunsigned int lookup_flags = 0;\n \tstruct file_attr fattr;\n-\tstruct file_kattr fa;\n+\tstruct file_kattr fa = {};\n \tint error;\n \n \tBUILD_BUG_ON(sizeof(struct file_attr) < FILE_ATTR_SIZE_VER0);\ndiff --git a/fs/xfs/xfs_ioctl.c b/fs/xfs/xfs_ioctl.c\nindex 46e234863644..ed9b4846c05f 100644\n--- a/fs/xfs/xfs_ioctl.c\n+++ b/fs/xfs/xfs_ioctl.c\n@@ -517,7 +517,7 @@ xfs_ioc_fsgetxattra(\n \txfs_inode_t\t\t*ip,\n \tvoid\t\t\t__user *arg)\n {\n-\tstruct file_kattr\tfa;\n+\tstruct file_kattr\tfa = {};\n \n \txfs_ilock(ip, XFS_ILOCK_SHARED);\n \txfs_fill_fsxattr(ip, XFS_ATTR_FORK, &fa);\n", "prefixes": [ "v13", "01/15" ] }