Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3540818pxj; Mon, 24 May 2021 09:00:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJygacdAicbBpeGkw0v3DyVDsqKwJLIXgViXBYAT8X3V/xK56+drd2fYXTIOhjNhQQKZPFth X-Received: by 2002:a92:c54a:: with SMTP id a10mr16605777ilj.140.1621872018296; Mon, 24 May 2021 09:00:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621872018; cv=none; d=google.com; s=arc-20160816; b=sy4KXzxGwbmhBP9JY2N7/th4K4tEyP1MB0V3qFURLyJy/oiws+yJyQ+ODxNd9sJp2j MS9f9+wVrmln2RAyXnzM7l2c527raGx3vJJH+IC51xYGZAps1zEZkH0ijwsTx8c10+0Z YAwYh1WH2bjF8XVy87GSR00jmSkV96ur3p5tNmSB1hUJFVYSfkLZnmtVmsFeF2cN9sm3 1xb+M5UZwAQjPWguuWLtgKuZLYDuA5zKIbVKKkGFDWttcSjVHZzkqEbvy/afUz+R84UJ AmxJ4qXetCdTxKZ5hRNTz1jaWFtIWGBH5TaME/StUeYpscJrNkELsboBTnPKctORmQba PWRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nDX/3s3wUQIakxsnPS55meynEGphSiqud4SzAEzCdiY=; b=eJT//S3ySrm8clMsgFRxanoKFbAoarKxee+sAN0YtqKiPjc0KA3QFU2GHarwWpEZSA eW6Jb16Z4Y0nqjUSzv8u7cLCgJpQT++5cIs8VMR7aQ3i4rzQyc7skg0323jAHM2wYBLZ 9NrAinxVKLykkLW5ttiEjpzv2KmRs2xOIvGxkJDdm62BT8uRRnuf+cE/zvTPt6ApRK6j Ta8LBpM3d1YYRWGSOkFAKJEn4gJu2z/ywDuHnnzzbShQmW9FpEq3RM7W//qh2ZOUZpni l0gWNXPKO8mbkD3VNm5VZvCkBFdkRJL0CJpvDVYcOfWpkWUBUuDXU6BJJ3GCN20MeUzL kCSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jes8SB5X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g8si14357130ilk.127.2021.05.24.09.00.04; Mon, 24 May 2021 09:00:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jes8SB5X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235599AbhEXQBA (ORCPT + 99 others); Mon, 24 May 2021 12:01:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:40466 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235429AbhEXPzI (ORCPT ); Mon, 24 May 2021 11:55:08 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 482E161935; Mon, 24 May 2021 15:41:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621870883; bh=PPtZR4tnjwBpnknixPFaLM60aw33DxMUguh7OIwFkYs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jes8SB5XoiMu/1oVog7J7sLCIZHzC7drusg2OrP2ksHP1EcHTmxVnmoKbMn2uDM5X meq51qMOWQBI8CMRz2TMba9pfmSVK+Ewjzpu7k2tHiBRnQHBu54yj2+0lgnwVK9bID QRc/DWeXXNqGwhKmGplunVHrYTgq99duWoXntZNI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Aditya Pakki , Tyler Hicks Subject: [PATCH 5.10 078/104] Revert "ecryptfs: replace BUG_ON with error handling code" Date: Mon, 24 May 2021 17:26:13 +0200 Message-Id: <20210524152335.439551739@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210524152332.844251980@linuxfoundation.org> References: <20210524152332.844251980@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman commit e1436df2f2550bc89d832ffd456373fdf5d5b5d7 upstream. This reverts commit 2c2a7552dd6465e8fde6bc9cccf8d66ed1c1eb72. Because of recent interactions with developers from @umn.edu, all commits from them have been recently re-reviewed to ensure if they were correct or not. Upon review, this commit was found to be incorrect for the reasons below, so it must be reverted. It will be fixed up "correctly" in a later kernel change. The original commit log for this change was incorrect, no "error handling code" was added, things will blow up just as badly as before if any of these cases ever were true. As this BUG_ON() never fired, and most of these checks are "obviously" never going to be true, let's just revert to the original code for now until this gets unwound to be done correctly in the future. Cc: Aditya Pakki Fixes: 2c2a7552dd64 ("ecryptfs: replace BUG_ON with error handling code") Cc: stable Acked-by: Tyler Hicks Link: https://lore.kernel.org/r/20210503115736.2104747-49-gregkh@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- fs/ecryptfs/crypto.c | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) --- a/fs/ecryptfs/crypto.c +++ b/fs/ecryptfs/crypto.c @@ -296,10 +296,8 @@ static int crypt_scatterlist(struct ecry struct extent_crypt_result ecr; int rc = 0; - if (!crypt_stat || !crypt_stat->tfm - || !(crypt_stat->flags & ECRYPTFS_STRUCT_INITIALIZED)) - return -EINVAL; - + BUG_ON(!crypt_stat || !crypt_stat->tfm + || !(crypt_stat->flags & ECRYPTFS_STRUCT_INITIALIZED)); if (unlikely(ecryptfs_verbosity > 0)) { ecryptfs_printk(KERN_DEBUG, "Key size [%zd]; key:\n", crypt_stat->key_size);