From: bugme-daemon@bugzilla.kernel.org Subject: [Bug 12371] oops in ext4_get_group_desc Date: Tue, 6 Jan 2009 11:05:15 -0800 (PST) Message-ID: <20090106190515.B89AE10800F@picon.linux-foundation.org> References: To: linux-ext4@vger.kernel.org Return-path: Received: from smtp1.linux-foundation.org ([140.211.169.13]:37241 "EHLO smtp1.linux-foundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751477AbZAFTFr (ORCPT ); Tue, 6 Jan 2009 14:05:47 -0500 Received: from picon.linux-foundation.org (picon.linux-foundation.org [140.211.169.79]) by smtp1.linux-foundation.org (8.14.2/8.13.5/Debian-3ubuntu1.1) with ESMTP id n06J5F2L021345 for ; Tue, 6 Jan 2009 11:05:16 -0800 In-Reply-To: Sender: linux-ext4-owner@vger.kernel.org List-ID: http://bugzilla.kernel.org/show_bug.cgi?id=12371 tytso@mit.edu changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |PATCH_ALREADY_AVAILABLE ------- Comment #3 from tytso@mit.edu 2009-01-06 11:05 ------- Thanks for reporting this. A patch is already in the ext4 patch queue which prevents this problem, and it will be pushed to Linus shortly: ext4: Add sanity checks for the superblock before mounting the filesystem With this patch applied, the mount will be refused and the kernel messages will show: EXT4-fs: groups count too large: 0 (block count 56857945295556608, first data block 55808, blocks per group 16384) -- Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.