Message ID | 20231129120036.3908495-1-arnd@kernel.org |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:a5a7:0:b0:403:3b70:6f57 with SMTP id d7csp285214vqn; Wed, 29 Nov 2023 04:01:32 -0800 (PST) X-Google-Smtp-Source: AGHT+IEAprmZl4KBkx8uTMXLilLBECTaUslsRYj5A7qUTuY1Nk2cCK58FOpGPZN9kDif4EaK6pTV X-Received: by 2002:a05:6e02:144d:b0:35b:483:d513 with SMTP id p13-20020a056e02144d00b0035b0483d513mr20420624ilo.27.1701259292316; Wed, 29 Nov 2023 04:01:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701259292; cv=none; d=google.com; s=arc-20160816; b=inNW8xJW8i8A+64MmYaaI4PPyLYxYPKdvGHEWr2FA/+C18Ljld7UkW4pzaFiDK9g6O CAEmUIU/jePkppnvkoQVYsy4HXIBHJnvASeRrhEBekCEmzwdcrSrwaqQg4w/j/Ks/PQC BpGWcNpn0+6r4kATMKZDysUr2lT6Ce60mW8+Cb8fUNJpaC6mQWHcxLI5USSjza899+jY Lvll5O09JS+OSiInYjOWheCXEe6tqLRrZVInJEwJCTl9KOfk1BCSWFWrnRUgqf468Fku hBkJpfOjNKSSnL1NlyNuXJSm7RlxYmdlTyyMEqM/QdADS6bJOB92BotO+WojTO7GfB8n 1U6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=NMSAy+0TIj9lcCH5lcji06jUtyv6JnfSNVCos+vU/Bw=; fh=o7Qhemlj+Jzt6xREJYbI3D+SrTCDwcwX/n+6rA3rRaM=; b=Xh9a+nGwn93NkQU9CNoCffwWbWCqJcpkzVUbXvIAjaMn0po5i01MDTlWZcSp4E4y1B c1gaAgzsEEsNYPwKoALBfNX9jCLg8b5sYQjN9S5gvl+Nh1qg2ivlbtOpmu/Aei3QLNh/ DRUeZnppwIy3v0eITAHLDwvFAtsGOWqMbBJNt6Nj+NOhIfM23eQgrYtk6tAcKMRNjMej 73g0fEM3MeWtUCrGp16rtfzb2gl/YG7URECIbryV0XansQXvuSPjoe2I5BbX3DVdl8tY Sb+6DdDSKgDVLJ/1AxJZKGJXhI0dOWDxUfW0FSg2zpIictS5GtGXmQ7z2bPcH3DhpI+r rc2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=lR8pczz+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id p21-20020a63f455000000b005898e5f41f8si14426594pgk.53.2023.11.29.04.01.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Nov 2023 04:01:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=lR8pczz+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id F141A80A21BA; Wed, 29 Nov 2023 04:00:53 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230387AbjK2MAg (ORCPT <rfc822;toshivichauhan@gmail.com> + 99 others); Wed, 29 Nov 2023 07:00:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42700 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230368AbjK2MAf (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Wed, 29 Nov 2023 07:00:35 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 36A4DD48 for <linux-kernel@vger.kernel.org>; Wed, 29 Nov 2023 04:00:42 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9C8D1C433C8; Wed, 29 Nov 2023 12:00:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701259241; bh=n2nAGxbaM4bdUExVSTPbG6T9Ltt30lIhFwcPWN7vNO8=; h=From:To:Cc:Subject:Date:From; b=lR8pczz+YIOlEBwSdhbDA/LVQ12dQ2u9nO+Hghy/NF/HjnaDVkOfmyvbPCtzx7TKg tQWbDZW02R9WyulystAPJr+vQwm9E98sAFJv5kRXaIkXd+ZnPNAWfTEfzxWLqheHuM 4XpHvHWTUBF6lNDHTpJYZlWvu2RQ8g81HvWYN5OM5uHsSub98AtYfGNS+Xi/NMqrw8 uQL/2hZv4HFjz2qVRw77alR1CqHdnpi5FHjmogBrOj/ZkN8s1SdDRdkiqmdkbp9lAQ RCXD4F6J6Oa9zxjbVD6MCca/jPDdpkpwg1QIRtnAe+2uIjEcjJXTAe1YETnOo72cB4 ySy5sSvZnSVWA== From: Arnd Bergmann <arnd@kernel.org> To: Chris Mason <clm@fb.com>, Josef Bacik <josef@toxicpanda.com>, David Sterba <dsterba@suse.com> Cc: Arnd Bergmann <arnd@arndb.de>, Linux Kernel Functional Testing <lkft@linaro.org>, Johannes Thumshirn <johannes.thumshirn@wdc.com>, Qu Wenruo <wqu@suse.com>, Anand Jain <anand.jain@oracle.com>, linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] btrfs: fix btrfs_parse_param() build failure Date: Wed, 29 Nov 2023 13:00:29 +0100 Message-Id: <20231129120036.3908495-1-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Wed, 29 Nov 2023 04:00:54 -0800 (PST) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1783899663648740168 X-GMAIL-MSGID: 1783899663648740168 |
Series |
btrfs: fix btrfs_parse_param() build failure
|
|
Commit Message
Arnd Bergmann
Nov. 29, 2023, noon UTC
From: Arnd Bergmann <arnd@arndb.de> With CONFIG_BTRFS_FS_POSIX_ACL disabled, the newly added function fails to build because of an apparent broken rebase: fs/btrfs/super.c: In function 'btrfs_parse_param': fs/btrfs/super.c:416:25: error: 'ret' undeclared (first use in this function); did you mean 'net'? 416 | ret = -EINVAL; | ^~~ Just return the error directly here instead of the incorrect unwinding. Fixes: a7293bf27082 ("btrfs: add parse_param callback for the new mount api") Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> Signed-off-by: Arnd Bergmann <arnd@arndb.de> --- fs/btrfs/super.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)
Comments
On Wed, Nov 29, 2023 at 01:00:29PM +0100, Arnd Bergmann wrote: > From: Arnd Bergmann <arnd@arndb.de> > > With CONFIG_BTRFS_FS_POSIX_ACL disabled, the newly added function fails > to build because of an apparent broken rebase: > > fs/btrfs/super.c: In function 'btrfs_parse_param': > fs/btrfs/super.c:416:25: error: 'ret' undeclared (first use in this function); did you mean 'net'? > 416 | ret = -EINVAL; > | ^~~ > > Just return the error directly here instead of the incorrect unwinding. > > Fixes: a7293bf27082 ("btrfs: add parse_param callback for the new mount api") > Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> > Signed-off-by: Arnd Bergmann <arnd@arndb.de> Should be fixed in today's for-next snapshot, thanks.
diff --git a/fs/btrfs/super.c b/fs/btrfs/super.c index 59fe4ffce6e7..022179a05d76 100644 --- a/fs/btrfs/super.c +++ b/fs/btrfs/super.c @@ -413,8 +413,7 @@ static int btrfs_parse_param(struct fs_context *fc, fc->sb_flags |= SB_POSIXACL; #else btrfs_err(NULL, "support for ACL not compiled in!"); - ret = -EINVAL; - goto out; + return -EINVAL; #endif } /*