After a closer look, this seems to be generated from legacy code in the
kernel. Please ignore previous comment. An upstream fix is on its way to
the mainline kernel. After it lands then we can pick it and apply it to
fix the problem in the Ubuntu kernel.

** Changed in: linux (Ubuntu)
     Assignee: (unassigned) => Agathe Porte (gagath)

** Changed in: linux (Ubuntu)
   Importance: Undecided => Low

** Changed in: linux (Ubuntu)
       Status: New => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2087853

Title:
  Kernel messages about UFS

Status in linux package in Ubuntu:
  Triaged

Bug description:
  Hello!

  I have mounted UFS partition (ufstype=ufs2).
  Ubuntu allows only read only mounts for UFS by default, so it is mounted with 
ro option.

  I see those messages in the log:

  kernel: ------------[ cut here ]------------
  kernel: UBSAN: shift-out-of-bounds in 
/build/linux-21sZ5Q/linux-6.8.0/fs/ufs/super.c:1247:19
  kernel: shift exponent 36 is too large for 32-bit type 'int'
  kernel: CPU: 3 PID: 2212 Comm: mount Not tainted 6.8.0-48-generic #48-Ubuntu
  kernel: Hardware name: SOYO SY-YL B550M/SY-YL B550M, BIOS 5.17 05/19/2023
  kernel: Call Trace:
  kernel:  <TASK>
  kernel:  dump_stack_lvl+0x76/0xa0
  kernel:  dump_stack+0x10/0x20
  kernel:  __ubsan_handle_shift_out_of_bounds+0x199/0x370
  kernel:  ufs_fill_super.cold+0x16/0x1b7 [ufs]
  kernel:  ? sb_set_blocksize+0x1d/0x70
  kernel:  ? __pfx_ufs_fill_super+0x10/0x10 [ufs]
  kernel:  mount_bdev+0xf6/0x140
  kernel:  ufs_mount+0x15/0x30 [ufs]
  kernel:  legacy_get_tree+0x2b/0x60
  kernel:  vfs_get_tree+0x2a/0x100
  kernel:  do_new_mount+0x1a0/0x340
  kernel:  path_mount+0x1e0/0x830
  kernel:  ? putname+0x5b/0x80
  kernel:  __x64_sys_mount+0x127/0x160
  kernel:  x64_sys_call+0x1df5/0x25c0
  kernel:  do_syscall_64+0x7f/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? mntput+0x24/0x50
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? path_put+0x1e/0x30
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? do_faccessat+0x1c2/0x2f0
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? syscall_exit_to_user_mode+0x86/0x260
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? do_syscall_64+0x8c/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? syscall_exit_to_user_mode+0x86/0x260
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? do_syscall_64+0x8c/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? __do_sys_newfstatat+0x53/0x90
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? syscall_exit_to_user_mode+0x86/0x260
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? do_syscall_64+0x8c/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? irqentry_exit+0x43/0x50
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? exc_page_fault+0x94/0x1b0
  kernel:  entry_SYSCALL_64_after_hwframe+0x78/0x80
  kernel: RIP: 0033:0x7417b2d2af0e
  kernel: Code: 48 8b 0d 0d 7f 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 
84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff 
ff 73 01 c3 48 8b 0d da 7e 0d 00 f7 d8 64 89 01 48
  kernel: RSP: 002b:00007fff1145f4d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
  kernel: RAX: ffffffffffffffda RBX: 000059b6f92e7b00 RCX: 00007417b2d2af0e
  kernel: RDX: 000059b6f92e7f10 RSI: 000059b6f92e81b0 RDI: 000059b6f92e83f0
  kernel: RBP: 00007fff1145f540 R08: 000059b6f92e8150 R09: 00007fff1145f5b0
  kernel: R10: 0000000000000401 R11: 0000000000000246 R12: 000059b6f92e83f0
  kernel: R13: 000059b6f92e81b0 R14: 000059b6f92e7f10 R15: 000059b6f92e7c60
  kernel:  </TASK>
  kernel: ---[ end trace ]---

  kernel: ------------[ cut here ]------------
  kernel: UBSAN: shift-out-of-bounds in 
/build/linux-21sZ5Q/linux-6.8.0/fs/ufs/super.c:1247:19
  kernel: shift exponent 36 is too large for 32-bit type 'int'
  kernel: CPU: 6 PID: 2113 Comm: mount Not tainted 6.8.0-48-generic #48-Ubuntu
  kernel: Hardware name: SOYO SY-YL B550M/SY-YL B550M, BIOS 5.17 05/19/2023
  kernel: Call Trace:
  kernel:  <TASK>
  kernel:  dump_stack_lvl+0x76/0xa0
  kernel:  dump_stack+0x10/0x20
  kernel:  __ubsan_handle_shift_out_of_bounds+0x199/0x370
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ufs_fill_super.cold+0x16/0x1b7 [ufs]
  kernel:  ? sb_set_blocksize+0x1d/0x70
  kernel:  ? __pfx_ufs_fill_super+0x10/0x10 [ufs]
  kernel:  mount_bdev+0xf6/0x140
  kernel:  ufs_mount+0x15/0x30 [ufs]
  kernel:  legacy_get_tree+0x2b/0x60
  kernel:  vfs_get_tree+0x2a/0x100
  kernel:  do_new_mount+0x1a0/0x340
  kernel:  path_mount+0x1e0/0x830
  kernel:  ? putname+0x5b/0x80
  kernel:  __x64_sys_mount+0x127/0x160
  kernel:  x64_sys_call+0x1df5/0x25c0
  kernel:  do_syscall_64+0x7f/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? syscall_exit_to_user_mode+0x86/0x260
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? do_syscall_64+0x8c/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? do_syscall_64+0x8c/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? do_syscall_64+0x8c/0x180
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? irqentry_exit+0x43/0x50
  kernel:  ? srso_return_thunk+0x5/0x5f
  kernel:  ? exc_page_fault+0x94/0x1b0
  kernel:  entry_SYSCALL_64_after_hwframe+0x78/0x80
  kernel: RIP: 0033:0x7b616d52af0e
  kernel: Code: 48 8b 0d 0d 7f 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 
84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff 
ff 73 01 c3 48 8b 0d da 7e 0d 00 f7 d8 64 89 01 48
  kernel: RSP: 002b:00007ffc10c387b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
  kernel: RAX: ffffffffffffffda RBX: 00005d6eb3bc9b00 RCX: 00007b616d52af0e
  kernel: RDX: 00005d6eb3bc9f10 RSI: 00005d6eb3bca1b0 RDI: 00005d6eb3bca3f0
  kernel: RBP: 00007ffc10c38820 R08: 00005d6eb3bca150 R09: 00007ffc10c38890
  kernel: R10: 0000000000000401 R11: 0000000000000246 R12: 00005d6eb3bca3f0
  kernel: R13: 00005d6eb3bca1b0 R14: 00005d6eb3bc9f10 R15: 00005d6eb3bc9c60
  kernel:  </TASK>
  kernel: ---[ end trace ]---

  cat /proc/version_signature
  Ubuntu 6.8.0-48.48-generic 6.8.12

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2087853/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to