From nobody Fri Dec 19 00:51:55 2025 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 02504C4167B for ; Wed, 29 Nov 2023 12:00:48 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230378AbjK2MAi (ORCPT ); Wed, 29 Nov 2023 07:00:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42700 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230368AbjK2MAf (ORCPT ); Wed, 29 Nov 2023 07:00:35 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 36A4DD48 for ; Wed, 29 Nov 2023 04:00:42 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9C8D1C433C8; Wed, 29 Nov 2023 12:00:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701259241; bh=n2nAGxbaM4bdUExVSTPbG6T9Ltt30lIhFwcPWN7vNO8=; h=From:To:Cc:Subject:Date:From; b=lR8pczz+YIOlEBwSdhbDA/LVQ12dQ2u9nO+Hghy/NF/HjnaDVkOfmyvbPCtzx7TKg tQWbDZW02R9WyulystAPJr+vQwm9E98sAFJv5kRXaIkXd+ZnPNAWfTEfzxWLqheHuM 4XpHvHWTUBF6lNDHTpJYZlWvu2RQ8g81HvWYN5OM5uHsSub98AtYfGNS+Xi/NMqrw8 uQL/2hZv4HFjz2qVRw77alR1CqHdnpi5FHjmogBrOj/ZkN8s1SdDRdkiqmdkbp9lAQ RCXD4F6J6Oa9zxjbVD6MCca/jPDdpkpwg1QIRtnAe+2uIjEcjJXTAe1YETnOo72cB4 ySy5sSvZnSVWA== From: Arnd Bergmann To: Chris Mason , Josef Bacik , David Sterba Cc: Arnd Bergmann , Linux Kernel Functional Testing , Johannes Thumshirn , Qu Wenruo , Anand Jain , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] btrfs: fix btrfs_parse_param() build failure Date: Wed, 29 Nov 2023 13:00:29 +0100 Message-Id: <20231129120036.3908495-1-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" From: Arnd Bergmann With CONFIG_BTRFS_FS_POSIX_ACL disabled, the newly added function fails to build because of an apparent broken rebase: fs/btrfs/super.c: In function 'btrfs_parse_param': fs/btrfs/super.c:416:25: error: 'ret' undeclared (first use in this functio= n); did you mean 'net'? 416 | ret =3D -EINVAL; | ^~~ Just return the error directly here instead of the incorrect unwinding. Fixes: a7293bf27082 ("btrfs: add parse_param callback for the new mount api= ") Reported-by: Linux Kernel Functional Testing Signed-off-by: Arnd Bergmann --- fs/btrfs/super.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/fs/btrfs/super.c b/fs/btrfs/super.c index 59fe4ffce6e7..022179a05d76 100644 --- a/fs/btrfs/super.c +++ b/fs/btrfs/super.c @@ -413,8 +413,7 @@ static int btrfs_parse_param(struct fs_context *fc, fc->sb_flags |=3D SB_POSIXACL; #else btrfs_err(NULL, "support for ACL not compiled in!"); - ret =3D -EINVAL; - goto out; + return -EINVAL; #endif } /* --=20 2.39.2