Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp4521596rdh; Wed, 29 Nov 2023 04:01:33 -0800 (PST) X-Google-Smtp-Source: AGHT+IGHBCDLbQEpby0PVYC0ep+v6LEcxGHvHplS3TPXxtYkVxzchPgw1/BhApwr9INBc2+DM8SF X-Received: by 2002:a05:6871:4509:b0:1fa:a9ef:386c with SMTP id nj9-20020a056871450900b001faa9ef386cmr1103511oab.48.1701259293673; Wed, 29 Nov 2023 04:01:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701259293; cv=none; d=google.com; s=arc-20160816; b=QqKi3M6m7nwu4+HhRL6bg7oAWpjMQWat1CrHdEwdivu22890wzvzvgzNL5N4BImplI Tnwq6xkvfvxO7gXEaBHkwMeRBtCNGb/JOUPVmH+ZI/9Y9QR9C4TA2xlrF+LZMBx4jmij beP3bGLNHD/+I4fcGu3TVg7xJyKTxv3FlTK+A1uZiBGO+EzmiunjHkTJHVwYliqEyRFm K48+8DhDX7mX8OF6Mq8gRosD3HSZDpMjt50PAIHSRrzrf+zRvIR9sg20qcKMg8+QVHSm hSHOONUP66XBQgoYY+sw2HHar6AUvMv/va+eEIumICEz6PKtNETYGq6T81hlKDEmSwpM /ysw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=NMSAy+0TIj9lcCH5lcji06jUtyv6JnfSNVCos+vU/Bw=; fh=o7Qhemlj+Jzt6xREJYbI3D+SrTCDwcwX/n+6rA3rRaM=; b=Xh9a+nGwn93NkQU9CNoCffwWbWCqJcpkzVUbXvIAjaMn0po5i01MDTlWZcSp4E4y1B c1gaAgzsEEsNYPwKoALBfNX9jCLg8b5sYQjN9S5gvl+Nh1qg2ivlbtOpmu/Aei3QLNh/ DRUeZnppwIy3v0eITAHLDwvFAtsGOWqMbBJNt6Nj+NOhIfM23eQgrYtk6tAcKMRNjMej 73g0fEM3MeWtUCrGp16rtfzb2gl/YG7URECIbryV0XansQXvuSPjoe2I5BbX3DVdl8tY Sb+6DdDSKgDVLJ/1AxJZKGJXhI0dOWDxUfW0FSg2zpIictS5GtGXmQ7z2bPcH3DhpI+r rc2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=lR8pczz+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [23.128.96.34]) by mx.google.com with ESMTPS id oi10-20020a0568702e0a00b001faa731856bsi262622oab.295.2023.11.29.04.01.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Nov 2023 04:01:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) client-ip=23.128.96.34; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=lR8pczz+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 51D0780A1A46; Wed, 29 Nov 2023 04:01:02 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230387AbjK2MAg (ORCPT + 99 others); Wed, 29 Nov 2023 07:00:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42700 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230368AbjK2MAf (ORCPT ); Wed, 29 Nov 2023 07:00:35 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 36A4DD48 for ; Wed, 29 Nov 2023 04:00:42 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9C8D1C433C8; Wed, 29 Nov 2023 12:00:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701259241; bh=n2nAGxbaM4bdUExVSTPbG6T9Ltt30lIhFwcPWN7vNO8=; h=From:To:Cc:Subject:Date:From; b=lR8pczz+YIOlEBwSdhbDA/LVQ12dQ2u9nO+Hghy/NF/HjnaDVkOfmyvbPCtzx7TKg tQWbDZW02R9WyulystAPJr+vQwm9E98sAFJv5kRXaIkXd+ZnPNAWfTEfzxWLqheHuM 4XpHvHWTUBF6lNDHTpJYZlWvu2RQ8g81HvWYN5OM5uHsSub98AtYfGNS+Xi/NMqrw8 uQL/2hZv4HFjz2qVRw77alR1CqHdnpi5FHjmogBrOj/ZkN8s1SdDRdkiqmdkbp9lAQ RCXD4F6J6Oa9zxjbVD6MCca/jPDdpkpwg1QIRtnAe+2uIjEcjJXTAe1YETnOo72cB4 ySy5sSvZnSVWA== From: Arnd Bergmann To: Chris Mason , Josef Bacik , David Sterba Cc: Arnd Bergmann , Linux Kernel Functional Testing , Johannes Thumshirn , Qu Wenruo , Anand Jain , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] btrfs: fix btrfs_parse_param() build failure Date: Wed, 29 Nov 2023 13:00:29 +0100 Message-Id: <20231129120036.3908495-1-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Wed, 29 Nov 2023 04:01:02 -0800 (PST) From: Arnd Bergmann With CONFIG_BTRFS_FS_POSIX_ACL disabled, the newly added function fails to build because of an apparent broken rebase: fs/btrfs/super.c: In function 'btrfs_parse_param': fs/btrfs/super.c:416:25: error: 'ret' undeclared (first use in this function); did you mean 'net'? 416 | ret = -EINVAL; | ^~~ Just return the error directly here instead of the incorrect unwinding. Fixes: a7293bf27082 ("btrfs: add parse_param callback for the new mount api") Reported-by: Linux Kernel Functional Testing Signed-off-by: Arnd Bergmann --- fs/btrfs/super.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/fs/btrfs/super.c b/fs/btrfs/super.c index 59fe4ffce6e7..022179a05d76 100644 --- a/fs/btrfs/super.c +++ b/fs/btrfs/super.c @@ -413,8 +413,7 @@ static int btrfs_parse_param(struct fs_context *fc, fc->sb_flags |= SB_POSIXACL; #else btrfs_err(NULL, "support for ACL not compiled in!"); - ret = -EINVAL; - goto out; + return -EINVAL; #endif } /* -- 2.39.2