Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3033809ybt; Mon, 29 Jun 2020 13:28:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwt/48dg2QiO+6RzIlHVN41tMjpYRPform1XKUQPT50tKnGwndd8HcSb1qml60CjySsGevC X-Received: by 2002:a17:906:c083:: with SMTP id f3mr9865789ejz.530.1593462504507; Mon, 29 Jun 2020 13:28:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593462504; cv=none; d=google.com; s=arc-20160816; b=XK30XfSHsLTU1QauBN7zzy9P18imLlQa2gx7Fq2iuFEkAtsMcOZ/K/cdHIlrmWtXEb ZRLaGZxdiCF5h3SSSNB9roGKwyewGexT6w2vTJCw2DGHc7AMl3cBZJHVadyye0H/aM7O lVSk5ZL2OOPmVGs9DzbxjEyrGMzS6wGFI9b5E0sUVb75MKSc7MmCwUboPtjOQtZ06/wp RMY3PiuJ6KwKEXrd8SL+A0q2jLvWjL3PLutbrjHLdgXfIwU2qvQjVsLUohIvwdzkyNPM MjkbqiOAdi2SESrh1Uc5FGJbrARRS/KcP1RxZff8hHQZZ6+GUwI48886LAf8Tx2ARCi7 utYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=DU5vesa9x0ktiTowGbNnwlEfy9HJ8P/MFK9LcUBNdS4=; b=IoyL/FSV6ndR8hFJWCvI03evOLSTrDcvgBYmzbz2xPTte5voa95IELO/hdxkRU0dDm 1Zbu/BIbho6Tlxduz/6/kea7u+qf5k/La7P9g3yJVAJapGVqklSDY+uxU4aB05SvlfDf 99wJc7/ZMSVaucthF/CjKhr2M4Yi3kw1kXFRc6R/ik611sV/csMm0JssMs3qUQeiS3TU o+qchnZfRAVQ4D/YLmJYiGv2Pg4iOJzjKPLOaLWM2GGiCw7nuGcngD7eNX6YkDKDHLQ1 XLZktMa9MuhvsIr9Y7hGFpqJjIeFxk2OtWo9K1nsKEt38Cm19F0PySO3VzUjQ3lL/X9M 6loA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZI9V3WS5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gy14si326016ejb.313.2020.06.29.13.28.01; Mon, 29 Jun 2020 13:28:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZI9V3WS5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732551AbgF2UYV (ORCPT + 99 others); Mon, 29 Jun 2020 16:24:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:37038 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732549AbgF2TZ2 (ORCPT ); Mon, 29 Jun 2020 15:25:28 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5B51C25334; Mon, 29 Jun 2020 15:39:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593445173; bh=FMapCmLQRxuzVHtsvICUMvntIMnbv6WNgbDo+FCNfWc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZI9V3WS5pb78AkQ9J1cAtp+skO3DIcTWxvyre5jVrwXKjfNk+yiA8QkUKrX2zirVg m6hQi1B89fiZi2Bp4q7QDAs6BE/6sI2oFRj4avcfMCYGF2I4tPbbhTgbcn8u00xj28 0StGM6T4+lcVcd8ois7MOjctRkvlred8ABF2Iw0Y= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Junxiao Bi , Joseph Qi , Mark Fasheh , Joel Becker , Changwei Ge , Gang He , Jun Piao , Andrew Morton , Linus Torvalds , Greg Kroah-Hartman Subject: [PATCH 4.14 66/78] ocfs2: fix value of OCFS2_INVALID_SLOT Date: Mon, 29 Jun 2020 11:37:54 -0400 Message-Id: <20200629153806.2494953-67-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629153806.2494953-1-sashal@kernel.org> References: <20200629153806.2494953-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.186-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.14.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.14.186-rc1 X-KernelTest-Deadline: 2020-07-01T15:38+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Junxiao Bi commit 9277f8334ffc719fe922d776444d6e4e884dbf30 upstream. In the ocfs2 disk layout, slot number is 16 bits, but in ocfs2 implementation, slot number is 32 bits. Usually this will not cause any issue, because slot number is converted from u16 to u32, but OCFS2_INVALID_SLOT was defined as -1, when an invalid slot number from disk was obtained, its value was (u16)-1, and it was converted to u32. Then the following checking in get_local_system_inode will be always skipped: static struct inode **get_local_system_inode(struct ocfs2_super *osb, int type, u32 slot) { BUG_ON(slot == OCFS2_INVALID_SLOT); ... } Link: http://lkml.kernel.org/r/20200616183829.87211-5-junxiao.bi@oracle.com Signed-off-by: Junxiao Bi Reviewed-by: Joseph Qi Cc: Mark Fasheh Cc: Joel Becker Cc: Changwei Ge Cc: Gang He Cc: Jun Piao Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/ocfs2/ocfs2_fs.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/ocfs2/ocfs2_fs.h b/fs/ocfs2/ocfs2_fs.h index 7a3866d7fc36c..0773c774e2bfe 100644 --- a/fs/ocfs2/ocfs2_fs.h +++ b/fs/ocfs2/ocfs2_fs.h @@ -303,7 +303,7 @@ #define OCFS2_MAX_SLOTS 255 /* Slot map indicator for an empty slot */ -#define OCFS2_INVALID_SLOT -1 +#define OCFS2_INVALID_SLOT ((u16)-1) #define OCFS2_VOL_UUID_LEN 16 #define OCFS2_MAX_VOL_LABEL_LEN 64 -- 2.25.1