lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <bug-119481-13602@https.bugzilla.kernel.org/>
Date:	Thu, 02 Jun 2016 04:40:35 +0000
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 119481] New: UBSAN: Undefined behaviour in
 /home/vitti/1tb/vitti/rpmbuild/SOURCES/linux-4.5/fs/ext4/mballoc.c:2612

https://bugzilla.kernel.org/show_bug.cgi?id=119481

            Bug ID: 119481
           Summary: UBSAN: Undefined behaviour in
                    /home/vitti/1tb/vitti/rpmbuild/SOURCES/linux-4.5/fs/ex
                    t4/mballoc.c:2612
           Product: File System
           Version: 2.5
    Kernel Version: 4.5.5
          Hardware: x86-64
                OS: Linux
              Tree: Fedora
            Status: NEW
          Severity: low
          Priority: P1
         Component: ext4
          Assignee: fs_ext4@...nel-bugs.osdl.org
          Reporter: zeccav@...il.com
        Regression: No

At boot time I get the following:

Jun 02 06:01:26 nero21 kernel:
================================================================================
Jun 02 06:01:26 nero21 kernel: UBSAN: Undefined behaviour in
/home/vitti/1tb/vitti/rpmbuild/SOURCES/linux-4.5/fs/ext4/mballoc.c:2612:15
Jun 02 06:01:26 nero21 kernel: shift exponent 4294967295 is too large for
32-bit type 'int'
Jun 02 06:01:26 nero21 kernel: CPU: 0 PID: 754 Comm: mount Not tainted 4.5.5 #1
Jun 02 06:01:26 nero21 kernel: Hardware name: To Be Filled By O.E.M. To Be
Filled By O.E.M./H81M-DGS R2.0, BIOS P1.30 07/02/2014
Jun 02 06:01:26 nero21 kernel:  0000000000000000 000000000b2c65d9
ffff8803ffae7b18 ffffffff820d38ba
Jun 02 06:01:26 nero21 kernel:  00000000fffffff3 000000000b2c65d9
ffff8803ffae7b40 ffffffff87f8c73e
Jun 02 06:01:26 nero21 kernel:  ffff8803ffae7b30 ffffffff8215e6a4
00000000ffffffff ffff8803ffae7bc0
Jun 02 06:01:26 nero21 kernel: Call Trace:
Jun 02 06:01:26 nero21 kernel:  [<ffffffff820d38ba>] dump_stack+0x74/0xaf
Jun 02 06:01:26 nero21 kernel:  [<ffffffff8215e6a4>] ubsan_epilogue+0xd/0x3b
Jun 02 06:01:26 nero21 kernel:  [<ffffffff8215eff5>]
__ubsan_handle_shift_out_of_bounds+0xf9/0x14b
Jun 02 06:01:26 nero21 kernel:  [<ffffffff8142261f>] ?
kmem_cache_create+0x11a/0x2b9
Jun 02 06:01:26 nero21 kernel:  [<ffffffff816d13ea>] ext4_mb_init+0x83c/0xaa4
Jun 02 06:01:26 nero21 kernel:  [<ffffffff816d6109>] ?
ext4_setup_system_zone+0x1a1/0x339
Jun 02 06:01:26 nero21 kernel:  [<ffffffff816a52a5>]
ext4_fill_super+0x401e/0x4e2b
Jun 02 06:01:26 nero21 kernel:  [<ffffffff820eb296>] ? snprintf+0x49/0x68
Jun 02 06:01:26 nero21 kernel:  [<ffffffff816a1287>] ?
ext4_calculate_overhead+0x90e/0x90e
Jun 02 06:01:26 nero21 kernel:  [<ffffffff814d7f9f>] mount_bdev+0x18e/0x1e3
Jun 02 06:01:26 nero21 kernel:  [<ffffffff816a1287>] ?
ext4_calculate_overhead+0x90e/0x90e
Jun 02 06:01:26 nero21 kernel:  [<ffffffff8167e035>] ext4_mount+0x15/0x17
Jun 02 06:01:26 nero21 kernel:  [<ffffffff814d825e>] mount_fs+0x4b/0x1d1
Jun 02 06:01:26 nero21 kernel:  [<ffffffff81508b1b>] vfs_kern_mount+0x6c/0x18d
Jun 02 06:01:26 nero21 kernel:  [<ffffffff8150a804>] do_mount+0x298/0x168c
Jun 02 06:01:26 nero21 kernel:  [<ffffffff814d9d90>] ? vfs_fstatat+0x66/0xc0
Jun 02 06:01:26 nero21 kernel:  [<ffffffff814126e2>] ? strndup_user+0x4e/0x88
Jun 02 06:01:26 nero21 kernel:  [<ffffffff8141265b>] ? memdup_user+0x3b/0x74
Jun 02 06:01:26 nero21 kernel:  [<ffffffff8150c13b>] SyS_mount+0x83/0xd0
Jun 02 06:01:26 nero21 kernel:  [<ffffffff865aa3ee>]
entry_SYSCALL_64_fastpath+0x12/0x71
Jun 02 06:01:26 nero21 kernel:
================================================================================

mballoc.c:2612 is "offset += 1 << (sb->s_blocksize_bits - i);"

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ