2022-08-19 5:35 GMT+09:00, Al Viro <viro@xxxxxxxxxxxxxxxxxx>: > On Thu, Aug 18, 2022 at 03:08:36PM +0900, Namjae Jeon wrote: >> 2022-08-18 11:59 GMT+09:00, Al Viro <viro@xxxxxxxxxxxxxxxxxx>: >> > Signed-off-by: Al Viro <viro@xxxxxxxxxxxxxxxxxx> >> > --- >> > fs/ksmbd/vfs.c | 4 ++-- >> > 1 file changed, 2 insertions(+), 2 deletions(-) >> > >> > diff --git a/fs/ksmbd/vfs.c b/fs/ksmbd/vfs.c >> > index 78d01033604c..a0fafba8b5d0 100644 >> > --- a/fs/ksmbd/vfs.c >> > +++ b/fs/ksmbd/vfs.c >> > @@ -1743,11 +1743,11 @@ int ksmbd_vfs_copy_file_ranges(struct >> > ksmbd_work >> > *work, >> > *total_size_written = 0; >> > >> > if (!(src_fp->daccess & (FILE_READ_DATA_LE | FILE_EXECUTE_LE))) { >> > - pr_err("no right to read(%pd)\n", src_fp->filp->f_path.dentry); >> > + pr_err("no right to read(%pf)\n", src_fp->filp); >> Isn't this probably %pD? > > *blink* > > It certainly is; thanks for catching that braino... While we are at it, > there's several more places of the same form these days, so fixed and > updated variant follows: Thanks for updating the patch! > > ksmbd: don't open-code %pD > > a bunch of places used %pd with file->f_path.dentry; shorter (and saner) > way to spell that is %pD with file... > > Signed-off-by: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Acked-by: Namjae Jeon <linkinjeon@xxxxxxxxxx> Thanks! > --- > > diff --git a/fs/ksmbd/smb2pdu.c b/fs/ksmbd/smb2pdu.c > index 0e1924a6476d..bed670410c37 100644 > --- a/fs/ksmbd/smb2pdu.c > +++ b/fs/ksmbd/smb2pdu.c > @@ -3897,8 +3897,7 @@ int smb2_query_dir(struct ksmbd_work *work) > inode_permission(file_mnt_user_ns(dir_fp->filp), > file_inode(dir_fp->filp), > MAY_READ | MAY_EXEC)) { > - pr_err("no right to enumerate directory (%pd)\n", > - dir_fp->filp->f_path.dentry); > + pr_err("no right to enumerate directory (%pD)\n", dir_fp->filp); > rc = -EACCES; > goto err_out2; > } > @@ -6269,8 +6268,8 @@ int smb2_read(struct ksmbd_work *work) > goto out; > } > > - ksmbd_debug(SMB, "filename %pd, offset %lld, len %zu\n", > - fp->filp->f_path.dentry, offset, length); > + ksmbd_debug(SMB, "filename %pD, offset %lld, len %zu\n", > + fp->filp, offset, length); > > work->aux_payload_buf = kvmalloc(length, GFP_KERNEL | __GFP_ZERO); > if (!work->aux_payload_buf) { > @@ -6534,8 +6533,8 @@ int smb2_write(struct ksmbd_work *work) > data_buf = (char *)(((char *)&req->hdr.ProtocolId) + > le16_to_cpu(req->DataOffset)); > > - ksmbd_debug(SMB, "filename %pd, offset %lld, len %zu\n", > - fp->filp->f_path.dentry, offset, length); > + ksmbd_debug(SMB, "filename %pD, offset %lld, len %zu\n", > + fp->filp, offset, length); > err = ksmbd_vfs_write(work, fp, data_buf, length, &offset, > writethrough, &nbytes); > if (err < 0) > diff --git a/fs/ksmbd/vfs.c b/fs/ksmbd/vfs.c > index 78d01033604c..0c04a59cbe60 100644 > --- a/fs/ksmbd/vfs.c > +++ b/fs/ksmbd/vfs.c > @@ -377,8 +377,7 @@ int ksmbd_vfs_read(struct ksmbd_work *work, struct > ksmbd_file *fp, size_t count, > > if (work->conn->connection_type) { > if (!(fp->daccess & (FILE_READ_DATA_LE | FILE_EXECUTE_LE))) { > - pr_err("no right to read(%pd)\n", > - fp->filp->f_path.dentry); > + pr_err("no right to read(%pD)\n", fp->filp); > return -EACCES; > } > } > @@ -487,8 +486,7 @@ int ksmbd_vfs_write(struct ksmbd_work *work, struct > ksmbd_file *fp, > > if (work->conn->connection_type) { > if (!(fp->daccess & FILE_WRITE_DATA_LE)) { > - pr_err("no right to write(%pd)\n", > - fp->filp->f_path.dentry); > + pr_err("no right to write(%pD)\n", fp->filp); > err = -EACCES; > goto out; > } > @@ -527,8 +525,8 @@ int ksmbd_vfs_write(struct ksmbd_work *work, struct > ksmbd_file *fp, > if (sync) { > err = vfs_fsync_range(filp, offset, offset + *written, 0); > if (err < 0) > - pr_err("fsync failed for filename = %pd, err = %d\n", > - fp->filp->f_path.dentry, err); > + pr_err("fsync failed for filename = %pD, err = %d\n", > + fp->filp, err); > } > > out: > @@ -1743,11 +1741,11 @@ int ksmbd_vfs_copy_file_ranges(struct ksmbd_work > *work, > *total_size_written = 0; > > if (!(src_fp->daccess & (FILE_READ_DATA_LE | FILE_EXECUTE_LE))) { > - pr_err("no right to read(%pd)\n", src_fp->filp->f_path.dentry); > + pr_err("no right to read(%pD)\n", src_fp->filp); > return -EACCES; > } > if (!(dst_fp->daccess & (FILE_WRITE_DATA_LE | FILE_APPEND_DATA_LE))) { > - pr_err("no right to write(%pd)\n", dst_fp->filp->f_path.dentry); > + pr_err("no right to write(%pD)\n", dst_fp->filp); > return -EACCES; > } > >