Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp9595874ybi; Wed, 24 Jul 2019 06:49:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqyfOfDixqFTxmM9tGqLcJDAWlnjI49qfcl8low2SLRi2GdakqH6HykEoIbervt+4AsYa8VY X-Received: by 2002:a62:e801:: with SMTP id c1mr11540094pfi.41.1563976188342; Wed, 24 Jul 2019 06:49:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563976188; cv=none; d=google.com; s=arc-20160816; b=td/gfh4iwAvOHaQBQE2n4CmliVF4aRQdnDVZWW4Xd4/xTKHdgAP+RMvoW6Q/gkvQj0 QT32794NV6f5MbFjxpxWrA2QXZqhQafGY7Oyqi902DqjeSlvwpRkv8GRNpkq2WHaUbHY B/9e8Ebk+K22WQvcmZ8xkUehdQOhKF/lXymBxKrseVIrlxGpN5RQMLME0pNEjD+8Ydmr eg93pBX99gPrwZDkBamKY2BW0ox9ELfVbg9CsIgYGViXr41p4w+5FtLer/Q948BczHG/ 8n1dGg+nBJhiGmSaTPY3B3j5Io2lsyMzid9/4Y5qo9sgtRnTgz2XinFNKieeuvf+2pI+ Wiyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=piElPLxQgUqfyz8593QkGYW61pfvkeuiOfxhv+hVgoM=; b=sctB9I5OaPKFh+VWDM3fMxht1vX5slgTQQHSvAU3o8hRFvEd67XOcmuwzYQRIpPN9L K8H77ZMd1f/fMYkeovb33GBnhS0oHyKBq2ZVlwik3xqXb3KLpLtUCXKPU5S9afDF3/X/ tBrSLZkEXGLGTjQZdzLnlCpS0r+K35oybjdZb3658/iatkFBc5ocG47vlFYo9jj1Ux7G 08+UJKvOowxj0/WVbMOeOwgaRtpClCYbV5Fm2v6FEWvsKPZBbk7sPdBDEHUUa6RqXVuP RiPnfcKsf7qqN5uL5zRRQf9VlWbppxOuUTk3EtYcBKM5aihAvONCrgBsUdO5+cOH9CDZ ZE7A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 72si13850643plc.415.2019.07.24.06.49.32; Wed, 24 Jul 2019 06:49:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728451AbfGXNIL (ORCPT + 99 others); Wed, 24 Jul 2019 09:08:11 -0400 Received: from hermes.aosc.io ([199.195.250.187]:51800 "EHLO hermes.aosc.io" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726681AbfGXNIL (ORCPT ); Wed, 24 Jul 2019 09:08:11 -0400 Received: from localhost (localhost [127.0.0.1]) (Authenticated sender: icenowy@aosc.io) by hermes.aosc.io (Postfix) with ESMTPSA id 3227C6DF8F; Wed, 24 Jul 2019 13:08:07 +0000 (UTC) From: Icenowy Zheng To: Jaegeuk Kim , Chao Yu Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, Icenowy Zheng Subject: [PATCH] f2fs: use EINVAL for invalid superblock Date: Wed, 24 Jul 2019 21:06:56 +0800 Message-Id: <20190724130656.29436-1-icenowy@aosc.io> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The kernel mount_block_root() function expects -EACESS or -EINVAL for a unmountable filesystem when trying to mount the root with different filesystem types. However, in 5.3-rc1 the behavior when F2FS code cannot find valid block changed to return -EFSCORRUPTED(-EUCLEAN), and this error code makes mount_block_root() fail when trying to probe F2FS. As invalid superblocks mean the filesystem cannot be recognized as F2FS (it might be another FS), returning -EINVAL seems more reasonable, and other filesystems also do this. Change back the return value to -EINVAL when no valid superblocks are found. Fixes: 10f966bbf521 ("f2fs: use generic EFSBADCRC/EFSCORRUPTED") Signed-off-by: Icenowy Zheng --- This commit fixes a regression introduced in v5.3-rc1, which leads to btrfs / cannot be mounted if no initrd is used and both f2fs and btrfs are built-in. fs/f2fs/super.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index 6de6cda44031..949309b9f1b8 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -2873,7 +2873,7 @@ static int read_raw_super_block(struct f2fs_sb_info *sbi, if (sanity_check_raw_super(sbi, bh)) { f2fs_err(sbi, "Can't find valid F2FS filesystem in %dth superblock", block + 1); - err = -EFSCORRUPTED; + err = -EINVAL; brelse(bh); continue; } -- 2.21.0