[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-194695-13602-Ue2yLGB1fr@https.bugzilla.kernel.org/>
Date: Mon, 27 Feb 2017 20:55:18 +0000
From: bugzilla-daemon@...zilla.kernel.org
To: linux-ext4@...nel.org
Subject: [Bug 194695] size overflow detected in function ext4_mb_new_group_pa
https://bugzilla.kernel.org/show_bug.cgi?id=194695
Andreas Dilger (adilger.kernelbugzilla@...ger.ca) changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |adilger.kernelbugzilla@...g
| |er.ca
--- Comment #1 from Andreas Dilger (adilger.kernelbugzilla@...ger.ca) ---
Definitely looks like a real bug in:
pa->pa_pstart = ext4_grp_offs_to_block(sb, &ac->ac_b_ex);
pa->pa_lstart = pa->pa_pstart;
pa_pstart is 64-bit, pa_lstart is 32-bit.
--
You are receiving this mail because:
You are watching the assignee of the bug.
Powered by blists - more mailing lists