Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp689368ybx; Fri, 1 Nov 2019 09:40:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqzCq02RAW0jhvLoAweYAhMb0t/TB1gtwV+X9lWMrAJ7Y4iGbZfVmZHYpzYSFBwK+qNeV/xf X-Received: by 2002:a50:ac1c:: with SMTP id v28mr13947471edc.156.1572626412093; Fri, 01 Nov 2019 09:40:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572626412; cv=none; d=google.com; s=arc-20160816; b=ZxdyevyVrdaSFYw3++cwkdIoeBS+LzqjXiMcOx+vXi86qV4EFY9X0mTMhe6C5C4YaM qRkz4oYMtcQuT1uEHc0lBgf659PC/vrx6I0IzI/kv8hX/fsqSZwHPfnEUk51Pd6bDIVm WGyEVnAVfKk6Tgkc5Ivrr/PVoixEqoHBt1wOIaevvj43fncl29Hxt6kZS+Zf02WPD9fS XJibY78Ij2NcCZsaCU82CdMlhxjVoe1AqjZepW2RW+gWdfJE2tYw6aYKibSbdmVwC3KZ 9RfSt1fz1cBml+ZiA7y5fitPBuY576ooyahdsKx4xauLL+gVvprEEhglHSbzLRIPhrPA PU4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=nid4RPwrX/tIBit9dnP7pDOTCgLlCg7ueZaZ3HHp69o=; b=CyfWXhTYUWHvdymKM4I02nEg2K8xQ17ycyuuDjSw/yrUktUrnEm8BPUMP95yhdkNEN 1csmOEBLIF/PzY6arwAAI8/fRXzr7Yt2nWFE/Zv9UjP8DOfJKGFmvLXgcckrjlM+ooGI Y6VwYSe07C40QCv9KgwoXsQQ8JR8of/+Mxn8YemV7eAAGRf/rSeb30++nK+zgwOwC4hb YlmJhnDf9+BbiCJYdrJX8ouZmJ/bpJUKwWk3pIIgw42JfhLxrOan5EkinXVWMNu9iw+P XHcaYSpLPx85GTLMdRLbZsA4t+/yYZSeg+nf+FxqzLeOTn45rXuqCI3Lnn2xTMIs/bU3 d7ww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="SFScjW5/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y10si6061365ejm.93.2019.11.01.09.39.47; Fri, 01 Nov 2019 09:40:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="SFScjW5/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728832AbfKAQg1 (ORCPT + 99 others); Fri, 1 Nov 2019 12:36:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:50828 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727483AbfKAQg0 (ORCPT ); Fri, 1 Nov 2019 12:36:26 -0400 Received: from localhost (unknown [104.132.0.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4A57D21734; Fri, 1 Nov 2019 16:36:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572626186; bh=pzuTPfxW6ChiKka7CrU44DU0IlZRj3qP8BZLIY0Klv0=; h=From:To:Cc:Subject:Date:From; b=SFScjW5/mIzRRC64s6EdyqkA2S+lEgEuoDFWJs/mH+EGfAVuXtL6+JeY4t5GMlfT5 AATXzkQNYj6vs1Oay4RTJRk7b3IT3Rc0wQb/36UueBTYR9yMzcHaiYO01WL0DOagRt x2r7KVMVtEb1k/p09P3fjKAKBbiX74cVyWKpxak0= From: Jaegeuk Kim To: linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Cc: Jaegeuk Kim Subject: [PATCH] f2fs: avoid kernel panic on corruption test Date: Fri, 1 Nov 2019 09:36:24 -0700 Message-Id: <20191101163624.7994-1-jaegeuk@kernel.org> X-Mailer: git-send-email 2.19.0.605.g01d371f741-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org xfstests/generic/475 complains kernel warn/panic while testing corrupted disk. Signed-off-by: Jaegeuk Kim --- fs/f2fs/node.c | 1 - 1 file changed, 1 deletion(-) diff --git a/fs/f2fs/node.c b/fs/f2fs/node.c index 8b66bc4c004b..06fd6d77d34b 100644 --- a/fs/f2fs/node.c +++ b/fs/f2fs/node.c @@ -2349,7 +2349,6 @@ static int __f2fs_build_free_nids(struct f2fs_sb_info *sbi, if (ret) { up_read(&nm_i->nat_tree_lock); - f2fs_bug_on(sbi, !mount); f2fs_err(sbi, "NAT is corrupt, run fsck to fix it"); return ret; } -- 2.19.0.605.g01d371f741-goog