Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3085164ybt; Mon, 29 Jun 2020 14:59:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz9iBadkJoUTFCXI8yh3llqKjM4r01LQDpo2V8FDu3QUnDlz6m6OSJ59ZSm7eyFwXNMODdW X-Received: by 2002:a05:6402:ca1:: with SMTP id cn1mr8472231edb.223.1593467961431; Mon, 29 Jun 2020 14:59:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593467961; cv=none; d=google.com; s=arc-20160816; b=A4gamWqfXcJxYrssz6S25R6hgGlnCPaeV4U0fwi/or5ZHV1aFl+J18h//UJbD3h8M/ 7A9XDSw+lrm2empQVrad++1bKWu/EG2z2rgGo7a6umXdIdZLrny0jmfjBGr5V3C9ltZT +Rof1W/ypHxbKDBGb+xe+HTMK1ylI5JbSEvgeM+n54C4eUPKjZ2ePMR30USUho05+Y1t SdRD6hIM4bioRC67e3p9umtDX2Na56+6UVLlVC7hkHBjKlSoEmRicvNLMcfMDBju98Vj 6h5VHWggiqS8KCoYFbReLraSpL/7o+vH98ldZOEj5CNhagWXmhjItMbwq+8uFwdRVifs hRDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=TBXKuPIxdj0d6UOfIGo/H0pCBsMMcM9obsQzTQ65BGQ=; b=mg9gYB1oKa5rp+G1p4dZNDuNk07uVc/E9X5LLAYr32idcNNKDnSWpH2TD+Cy1TaVR9 suEC0kPDFZacRioDYUQ+y7f7KTKoNZEE5wlOMFbgR8geLZsQ0xtCPApLdf0+zueeZ6cd RadcPO8V73YSb2IVEVtotwjYqNHJ2JRfGTyunwv7YZ4pNefLkPdkKXQzuBP6IKR71XqG FzAn+lYiAbv+Xrs3w3cvFzLrKowRue0FFckA7FBrJYJLJHc3dF5jliHmKi/PpZo8oR1V yC+h3cmyp5CiANMy6n1KddPgyh39NSMvzKupHIDBlMU24rf66qnUGCD4v98TgKAtie6s WRnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bbfqA9+k; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e22si580183ejb.66.2020.06.29.14.58.57; Mon, 29 Jun 2020 14:59:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bbfqA9+k; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404750AbgF2V5w (ORCPT + 99 others); Mon, 29 Jun 2020 17:57:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:56908 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726474AbgF2Sf2 (ORCPT ); Mon, 29 Jun 2020 14:35:28 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F26EC247BC; Mon, 29 Jun 2020 15:22:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593444125; bh=r4QEAZcLXSee9W0SJRyW4M1JONUB5ZKKnsKkupAdYmU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bbfqA9+k8O/fV6U+BydpMaoyPI0avD0LBR4T1v4CU4Ir84nUkuFjstA4agpn2D4Oj koUG1+OCzsPAD14gnPcBMVFxljxbkLPQauxHQve2VwMhBKN/33hCw8pZw57jWg6SGH KcZm3557iwdh2tZi6YVcquX71rrCbR+vVotnfr4A= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Junxiao Bi , Joseph Qi , Mark Fasheh , Joel Becker , Changwei Ge , Gang He , Jun Piao , Andrew Morton , Linus Torvalds , Greg Kroah-Hartman Subject: [PATCH 5.7 233/265] ocfs2: fix value of OCFS2_INVALID_SLOT Date: Mon, 29 Jun 2020 11:17:46 -0400 Message-Id: <20200629151818.2493727-234-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629151818.2493727-1-sashal@kernel.org> References: <20200629151818.2493727-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.7-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.7.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.7.7-rc1 X-KernelTest-Deadline: 2020-07-01T15:14+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Junxiao Bi commit 9277f8334ffc719fe922d776444d6e4e884dbf30 upstream. In the ocfs2 disk layout, slot number is 16 bits, but in ocfs2 implementation, slot number is 32 bits. Usually this will not cause any issue, because slot number is converted from u16 to u32, but OCFS2_INVALID_SLOT was defined as -1, when an invalid slot number from disk was obtained, its value was (u16)-1, and it was converted to u32. Then the following checking in get_local_system_inode will be always skipped: static struct inode **get_local_system_inode(struct ocfs2_super *osb, int type, u32 slot) { BUG_ON(slot == OCFS2_INVALID_SLOT); ... } Link: http://lkml.kernel.org/r/20200616183829.87211-5-junxiao.bi@oracle.com Signed-off-by: Junxiao Bi Reviewed-by: Joseph Qi Cc: Mark Fasheh Cc: Joel Becker Cc: Changwei Ge Cc: Gang He Cc: Jun Piao Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/ocfs2/ocfs2_fs.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/ocfs2/ocfs2_fs.h b/fs/ocfs2/ocfs2_fs.h index 3fc99659ed09d..19137c6d087bc 100644 --- a/fs/ocfs2/ocfs2_fs.h +++ b/fs/ocfs2/ocfs2_fs.h @@ -290,7 +290,7 @@ #define OCFS2_MAX_SLOTS 255 /* Slot map indicator for an empty slot */ -#define OCFS2_INVALID_SLOT -1 +#define OCFS2_INVALID_SLOT ((u16)-1) #define OCFS2_VOL_UUID_LEN 16 #define OCFS2_MAX_VOL_LABEL_LEN 64 -- 2.25.1