Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3063382ybt; Mon, 29 Jun 2020 14:18:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz/2rdblhq4bRMojyniaMl8D+lahtdVBrGuQOB8e9yOnHmt0eSYd54enxTPt342Ju4/PATG X-Received: by 2002:a05:6402:30b2:: with SMTP id df18mr19794256edb.229.1593465509083; Mon, 29 Jun 2020 14:18:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593465509; cv=none; d=google.com; s=arc-20160816; b=Esvexf/ca8on4WhK8ED2OTVStPB0p57stETbwAsQZaW7nGUt+uCCziX8hDcMHIqXL2 8f6kh9yR8CorBDvlJbnqnkNLiCpZN3DhO6US4rG2tiliuMDgzMtITiE7MygDBddf/sXl NC+pAsp/FNRo8RFdw3f+8TaHfZmhqHlT+86jNaSpby6dNzYnc9BNeKDGzaQyMgDjU6bb Ka4Ci8BBaTB69sKIAhoVuuRiNkiHRablcVQGXrf3zn1K0QFE0btKH813tDBAaJfYagwe 7EeIa+sU2qmXLtCaq9U6pq8CgyrfeTYHOZ/HAVUoSseBAfpLcms5JchDLK9FPycJEX2h oXDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=J1vIurvLUZf3rwI77GocRdp83wgboLf/XhTN8+laGBY=; b=vqRquqzAAmmq4EZsXCj1AEZ91BWb8qqRgU6o08GJoQb/Btf99LSfKpkkNMUVe0KltS RNuDhkRtqq2uW8pvaUzSwYCTlGZvzefHo4kMFxT39g6eSXvByv4wRlQ/212Rl+xWp+lb Pvt4lV98nf2mldEmttwBwRj20R2x1VuizYN/qFfwlcEu1x5fIEwf1tmnkXhG6Yhnig7g d1x6SvJjGJ7xx2lzTlMnUDCs2djL+9TVnPNjnvBEGC1/St0CwOJ2HqbXphVxy46129dw BKKIj9lsK2bHejGxIt3sPnAU5X4TCkLKaQqwX6C3hUYXI8bwEXaAZNn7u1pkvfelrfgn D5Qw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CDIFyAmk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f12si533654ejw.135.2020.06.29.14.18.06; Mon, 29 Jun 2020 14:18:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CDIFyAmk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390718AbgF2VQe (ORCPT + 99 others); Mon, 29 Jun 2020 17:16:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:42396 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729937AbgF2SzO (ORCPT ); Mon, 29 Jun 2020 14:55:14 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9412225570; Mon, 29 Jun 2020 15:55:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593446135; bh=ev3tY2CXJphDAahwpY5uBObKAQpI/8IoFnLN4/nbqUQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CDIFyAmksxkd2ZY7s6th01T3ig1nrq0UdSmIfFaAImM3UUe8xMK43SUfvaCmg9T6p i7rQyFw8bmLeGdW5pVASu9lPOJAyKMp5iHPUZxFiDRb4EjquMTLFXBwiM0ZkB6/ovX 2NEsp6JRiSZ3j6OZmJzknqt6TSgq4tVLDAoO7e3g= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Junxiao Bi , Joseph Qi , Mark Fasheh , Joel Becker , Changwei Ge , Gang He , Jun Piao , Andrew Morton , Linus Torvalds , Greg Kroah-Hartman Subject: [PATCH 4.4 124/135] ocfs2: fix value of OCFS2_INVALID_SLOT Date: Mon, 29 Jun 2020 11:52:58 -0400 Message-Id: <20200629155309.2495516-125-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629155309.2495516-1-sashal@kernel.org> References: <20200629155309.2495516-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.229-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.229-rc1 X-KernelTest-Deadline: 2020-07-01T15:53+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Junxiao Bi commit 9277f8334ffc719fe922d776444d6e4e884dbf30 upstream. In the ocfs2 disk layout, slot number is 16 bits, but in ocfs2 implementation, slot number is 32 bits. Usually this will not cause any issue, because slot number is converted from u16 to u32, but OCFS2_INVALID_SLOT was defined as -1, when an invalid slot number from disk was obtained, its value was (u16)-1, and it was converted to u32. Then the following checking in get_local_system_inode will be always skipped: static struct inode **get_local_system_inode(struct ocfs2_super *osb, int type, u32 slot) { BUG_ON(slot == OCFS2_INVALID_SLOT); ... } Link: http://lkml.kernel.org/r/20200616183829.87211-5-junxiao.bi@oracle.com Signed-off-by: Junxiao Bi Reviewed-by: Joseph Qi Cc: Mark Fasheh Cc: Joel Becker Cc: Changwei Ge Cc: Gang He Cc: Jun Piao Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/ocfs2/ocfs2_fs.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/ocfs2/ocfs2_fs.h b/fs/ocfs2/ocfs2_fs.h index 88c1bd3898faf..5617ec167a9d7 100644 --- a/fs/ocfs2/ocfs2_fs.h +++ b/fs/ocfs2/ocfs2_fs.h @@ -304,7 +304,7 @@ #define OCFS2_MAX_SLOTS 255 /* Slot map indicator for an empty slot */ -#define OCFS2_INVALID_SLOT -1 +#define OCFS2_INVALID_SLOT ((u16)-1) #define OCFS2_VOL_UUID_LEN 16 #define OCFS2_MAX_VOL_LABEL_LEN 64 -- 2.25.1