Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5908752ybp; Tue, 15 Oct 2019 06:53:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqz0B7pi89zN1GBbqnHg8obKgLrgFByBrbZY+30Ck4J2fp1SHVbpY1mvi6v6bFUx7QpAC0iI X-Received: by 2002:a05:6402:149a:: with SMTP id e26mr33519932edv.123.1571147634766; Tue, 15 Oct 2019 06:53:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571147634; cv=none; d=google.com; s=arc-20160816; b=Q1aNqTlDIQLTPoXapJqCyi921p/CPoP/yBdzNzye1cxizKAOD/FO5rsT49ZN3ze7nS MkLP4iDpvf4xKD2X8qSs3adb/hGVu7gXNSHjJz6IMxPCYUapsXY0LN3qzLnyQgq2wlb4 CH577/IRUl7juc+aS+QEAhc7Trh7ZoNWriGjk/WQ34mE233S6NLV3k/Bv5tKbI0Jdh6h /fk1r7185ti/bQNpA4CQKOacKnCWnmQJmWd97sX89ylIr32Dz3WEzd6afN6F8OIyIvnq nfyaLeh4VWSEs5GDGhIqW6zftRAKG04MEkSmDIjnfIOvJyP+b587mGuchyo4yoe3xgKu jG7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:auto-submitted :content-transfer-encoding:references:in-reply-to:message-id:date :subject:to:from; bh=FM2+5ttfdB5uaW34PDGTNUboHk/D5hsDaiDqcUEsOc4=; b=WfYBL1+8NNB+7FoYlHUz6f6IV7TNmbXe44oV0thCY/6l2CIXHrw59cJ/peFQmvnO1r x6FST0Lbj+oFEpQPqLARdrqfZDq+2qQ8rJVycUHLLC8X25zcOxWXI7YiF/Rev29T3Nw7 YJziLqgEWp9xLlFwWlFjWO2khrpGTccxILo2tLyj7OWxL1yfVJ9lLnhkRWtZhXkpdsSy MVY7SBevRA49dA3eoZ0FnCacn9VsQX/D8nGFNEW35mVQWDHae6NkSGkOt0sNsUlaxWnW MrH+iVVN8t+uJQI2ZdTEsJPnw3uHX/Y7/eSQnQBjaLmJVFaL+neMqn1gMSYZRn4uGzJu /6uw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m10si12965487eds.428.2019.10.15.06.53.23; Tue, 15 Oct 2019 06:53:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732101AbfJONxJ convert rfc822-to-8bit (ORCPT + 99 others); Tue, 15 Oct 2019 09:53:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:36490 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728880AbfJONxJ (ORCPT ); Tue, 15 Oct 2019 09:53:09 -0400 From: bugzilla-daemon@bugzilla.kernel.org Authentication-Results: mail.kernel.org; dkim=permerror (bad message/signature format) To: linux-ext4@vger.kernel.org Subject: [Bug 205197] kernel BUG at fs/ext4/extents_status.c:884 Date: Tue, 15 Oct 2019 13:53:08 +0000 X-Bugzilla-Reason: None X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: AssignedTo fs_ext4@kernel-bugs.osdl.org X-Bugzilla-Product: File System X-Bugzilla-Component: ext4 X-Bugzilla-Version: 2.5 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: tytso@mit.edu X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P1 X-Bugzilla-Assigned-To: fs_ext4@kernel-bugs.osdl.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT X-Bugzilla-URL: https://bugzilla.kernel.org/ Auto-Submitted: auto-generated MIME-Version: 1.0 Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org https://bugzilla.kernel.org/show_bug.cgi?id=205197 Theodore Tso (tytso@mit.edu) changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tytso@mit.edu --- Comment #1 from Theodore Tso (tytso@mit.edu) --- It looks like the journal inode is corrupted but it shouldn't have BUG'ed on you. Can you reproduce this crash? If so, does this fairly simple patch cause it not to BUG? (It will still fail to mount, but it shouldn't crash.) diff --git a/fs/ext4/extents.c b/fs/ext4/extents.c index f203bf989a4c..d83b325fb54b 100644 --- a/fs/ext4/extents.c +++ b/fs/ext4/extents.c @@ -375,7 +375,7 @@ static int ext4_valid_extent(struct inode *inode, struct ext4_extent *ext) * - zero length * - overflow/wrap-around */ - if (lblock + len <= lblock) + if (lblock + (ext4_lblk_t) len <= lblock) return 0; return ext4_data_block_valid(EXT4_SB(inode->i_sb), block, len); } Apologies if this is whitespace damaged, but t's a fairly simple edit to apply, and I'm currently on a chromebook so I can't easily get a patch uploaded into bugzilla. -- You are receiving this mail because: You are watching the assignee of the bug.