lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 15 Oct 2019 13:53:08 +0000 From: bugzilla-daemon@...zilla.kernel.org To: linux-ext4@...r.kernel.org Subject: [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884 https://bugzilla.kernel.org/show_bug.cgi?id=205197 Theodore Tso (tytso@....edu) changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tytso@....edu --- Comment #1 from Theodore Tso (tytso@....edu) --- It looks like the journal inode is corrupted but it shouldn't have BUG'ed on you. Can you reproduce this crash? If so, does this fairly simple patch cause it not to BUG? (It will still fail to mount, but it shouldn't crash.) diff --git a/fs/ext4/extents.c b/fs/ext4/extents.c index f203bf989a4c..d83b325fb54b 100644 --- a/fs/ext4/extents.c +++ b/fs/ext4/extents.c @@ -375,7 +375,7 @@ static int ext4_valid_extent(struct inode *inode, struct ext4_extent *ext) * - zero length * - overflow/wrap-around */ - if (lblock + len <= lblock) + if (lblock + (ext4_lblk_t) len <= lblock) return 0; return ext4_data_block_valid(EXT4_SB(inode->i_sb), block, len); } Apologies if this is whitespace damaged, but t's a fairly simple edit to apply, and I'm currently on a chromebook so I can't easily get a patch uploaded into bugzilla. -- You are receiving this mail because: You are watching the assignee of the bug.
Powered by blists - more mailing lists