Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp510461pxy; Wed, 21 Apr 2021 08:12:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwWuqqa2Woo0xr+aCh+9Ge8a3zOCDBbLIkT0QojLK/RJ2y9hox5yYKebl2Liu4OgvxSrjU2 X-Received: by 2002:a17:90b:147:: with SMTP id em7mr11568638pjb.138.1619017959820; Wed, 21 Apr 2021 08:12:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619017959; cv=none; d=google.com; s=arc-20160816; b=QLgKaakvHMx/CVSnkQA0UD0gvTjNUJVilB2UidqvFeJzZ5vSkdF5GJJZ4w5XJT1jha uNqMOyBS/DPoU5VrcHvlHrPFEmO8tmfkkmIurKmHKWRZn0sFX3CxOeNSBU170F+qzckC kmzKpAO2DZje5Xfto0E3ylquH4caW+UXzZzsc+jq7ERCUtSO+jg0OGbgqzesvOR5HBMf VIpxD03lIplKz1EPbJwOdmNtVk7HsklyF2QuQ2KG36ICOMJbQa3gCycy5BRIEYRRpCPw 0sZMt7f8Zco3j6xO/R0D7bcv4Wnh8kDYpW9gmsTkz010SEgDp/0spIgG8CsMKxYiXqCi meRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Yy9oQn6aJJuHUXQdcEnjeJmX0sXYIKTBctv3bMcKaYc=; b=H3PqzZ3BHCXdQOII2UP35i0RrnnyWjSZR6PdHvMdVqgXoNG20qhiA+VV3CCVPen10a Ymnw2fR/KCAWml7nKDp8y71VlPpQlbXRabnUI+e/yqOaF0JG1PxTmHMXT7ROmrVpIKCp WzvQBDrc17F7YpOkJQbG+eTjWRCoIlCh2x6Bpz+T4g8HpIg4Wo4L6TdhKBvCcZe9nF/6 oMHbQ2VkoLPjPD6EQK3kvVIlohlCXtgFDv/UM6Web3eiqWLqF5RvbRVQiKFTRXcIX2Y2 YYRPazw161FszFkXl6PGw2LyoYZSY+DMD9+4KgxZkHRr4yCaZWAPEZ+OpnsWWVFY3B1g XcRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=leTPDCSj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 36si2810762pgp.31.2021.04.21.08.12.28; Wed, 21 Apr 2021 08:12:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=leTPDCSj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239059AbhDUNE7 (ORCPT + 99 others); Wed, 21 Apr 2021 09:04:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:44060 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240703AbhDUNEN (ORCPT ); Wed, 21 Apr 2021 09:04:13 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8AE1B6145D; Wed, 21 Apr 2021 13:03:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010219; bh=gAUTu3vvn1Gnhp6B0GrlXDNkj37igYEfcfTjo+xPm/M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=leTPDCSj+3DqPclKgIrn1F3OiTtsl2U5fESLWCnZdKd3OqAbw8peYVqmu0jsK0VVb jmOOb7m8UgFJpSZrX9cIyAFSOlslA6bNSaOAEL3dBr4uGhIp826GApPH0bYMJuRrPj Cbchv6M1zrMpxvVWJ9Hpn+lDFd9cNbv6W4cMmWKM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Mark Fasheh , Joel Becker , Junxiao Bi , Joseph Qi , Changwei Ge , Gang He , Jun Piao , Andrew Morton , Linus Torvalds Subject: [PATCH 055/190] Revert "fs: ocfs: remove unnecessary assertion in dlm_migrate_lockres" Date: Wed, 21 Apr 2021 14:58:50 +0200 Message-Id: <20210421130105.1226686-56-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 67e2d2eb542338145a2e0b2336c1cdabd2424fd3. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: http Cc: Aditya Pakki Cc: Mark Fasheh Cc: Joel Becker Cc: Junxiao Bi Cc: Joseph Qi Cc: Changwei Ge Cc: Gang He Cc: Jun Piao Cc: Andrew Morton Cc: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/ocfs2/dlm/dlmmaster.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/fs/ocfs2/dlm/dlmmaster.c b/fs/ocfs2/dlm/dlmmaster.c index f105746063ed..f89dcf9b6217 100644 --- a/fs/ocfs2/dlm/dlmmaster.c +++ b/fs/ocfs2/dlm/dlmmaster.c @@ -2554,6 +2554,8 @@ static int dlm_migrate_lockres(struct dlm_ctxt *dlm, if (!dlm_grab(dlm)) return -EINVAL; + BUG_ON(target == O2NM_MAX_NODES); + name = res->lockname.name; namelen = res->lockname.len; -- 2.31.1