ci2 starts bisection 2023-11-13 06:55:55.578987742 +0000 UTC m=+159515.355368411 bisecting fixing commit since a24911abfd5503fb88521084aa3bfbd068341f34 building syzkaller on 35d9ecc508aef508b67ee7986a7abb0864e74f8e ensuring issue is reproducible on original commit a24911abfd5503fb88521084aa3bfbd068341f34 testing commit a24911abfd5503fb88521084aa3bfbd068341f34 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: a24db97d1e7b6dbb33d31620f800435f6b5e66e8ef7a9b94ff5c085263221090 run #0: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #1: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #2: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #3: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #4: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #5: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #6: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #7: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #8: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #9: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #10: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #11: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #12: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #13: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #14: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #15: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #16: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #17: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #18: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #19: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size, types: [KASAN] check whether we can drop unnecessary instrumentation disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit a24911abfd5503fb88521084aa3bfbd068341f34 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 2e90a4a3acb98bb041faaaa3aac7a071fa28af4b28fff7e8160c6d88a88312e0 all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] the bug reproduces without the instrumentation disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed kconfig minimization: base=5179 full=6485 leaves diff=248 split chunks (needed=false): <248> split chunk #0 of len 248 into 5 parts testing without sub-chunk 1/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit a24911abfd5503fb88521084aa3bfbd068341f34 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 4a47d65f45ca4713f6b455e77ea98d6547700af82ea2500a03fa3ca78e7e0e3f all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [UBSAN BUG LOCKDEP ATOMIC_SLEEP HANG LEAK], they are not needed testing commit a24911abfd5503fb88521084aa3bfbd068341f34 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: e6192ce06893dfa1701e4f5bab372759dfef70287819a45d35ea7ea1e9b53ab9 run #0: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #1: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #2: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #3: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #4: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #5: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #6: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #7: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #8: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #9: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size, types: [KASAN] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing commit a24911abfd5503fb88521084aa3bfbd068341f34 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 48e2d39e35b9aa0268e21ed9d1369ddb7901b71bfd081372ba0c5f3273acfd6e all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [HANG LEAK UBSAN BUG LOCKDEP ATOMIC_SLEEP], they are not needed testing commit a24911abfd5503fb88521084aa3bfbd068341f34 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 07adf7dcd415e8d26d039ccdd7d80918e813b4670d586182ba24da024274695f all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [ATOMIC_SLEEP HANG LEAK UBSAN BUG LOCKDEP], they are not needed testing commit a24911abfd5503fb88521084aa3bfbd068341f34 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 failed building a24911abfd5503fb88521084aa3bfbd068341f34: net/socket.c:1225: undefined reference to `wext_handle_ioctl' net/socket.c:3420: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:329: undefined reference to `wext_proc_init' net/core/net-procfs.c:345: undefined reference to `wext_proc_exit' minimized to 48 configs; suspects: [HID_ZEROPLUS USB_NET_DM9601 USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_PURELIFI WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_SILABS WLAN_VENDOR_ZYDAS X86_X32_ABI ZEROPLUS_FF] disabling configs for [LOCKDEP ATOMIC_SLEEP HANG LEAK UBSAN BUG], they are not needed testing current HEAD 48c6c901fe0e68e176029738d829e0d01eabb0b2 testing commit 48c6c901fe0e68e176029738d829e0d01eabb0b2 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: c11e7bb15f36c9468e4456470184731becc6411c2cce234dedaed6f2150a2132 all runs: OK false negative chance: 0.000 # git bisect start 48c6c901fe0e68e176029738d829e0d01eabb0b2 a24911abfd5503fb88521084aa3bfbd068341f34 Bisecting: 1916 revisions left to test after this (roughly 11 steps) [4a89bfb1a142733fb18ed7ccf63952f2e97ea654] writeback: fix dereferencing NULL mapping->host on writeback_page_template determine whether the revision contains the guilty commit checking the merge base b1644a0031cfb3ca2cbd84c92f771f8ebb62302d no existing result, test the revision testing commit b1644a0031cfb3ca2cbd84c92f771f8ebb62302d gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 88839484e93523475aae187fd999f1c8fbc89ac4f5a2e46988c22aa4a0d50c3e run #0: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #1: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #2: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #3: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #4: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #5: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #6: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #7: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #8: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #9: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] testing commit 4a89bfb1a142733fb18ed7ccf63952f2e97ea654 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 99b35ec4c768eb28d778520e87e69b987d3b5ac2dfe264f604001a90f293611f all runs: OK false negative chance: 0.000 # git bisect bad 4a89bfb1a142733fb18ed7ccf63952f2e97ea654 Bisecting: 957 revisions left to test after this (roughly 10 steps) [b1db73e27f0be198513399b181785caf98a1c4ac] drm/msm/dp: Clean up handling of DP AUX interrupts determine whether the revision contains the guilty commit revision b1644a0031cfb3ca2cbd84c92f771f8ebb62302d crashed and is reachable testing commit b1db73e27f0be198513399b181785caf98a1c4ac gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 14b06b1425eeeaddadb24925b24635af92235d171dba455496862ea4d5c6e3b5 all runs: OK false negative chance: 0.000 # git bisect bad b1db73e27f0be198513399b181785caf98a1c4ac Bisecting: 478 revisions left to test after this (roughly 9 steps) [f0b58720f2b02a41917a98a2a821cd9211ff4735] cacheinfo: Check sib_leaf in cache_leaves_are_shared() determine whether the revision contains the guilty commit revision b1644a0031cfb3ca2cbd84c92f771f8ebb62302d crashed and is reachable testing commit f0b58720f2b02a41917a98a2a821cd9211ff4735 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 21855d60d2e7395b943a0428af74f94e2fca609247e9676044a6ea76e1a7b5bd all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good f0b58720f2b02a41917a98a2a821cd9211ff4735 Bisecting: 239 revisions left to test after this (roughly 8 steps) [40f8b3f5e679eefa59272c337196da9980f250ce] rxrpc: Fix hard call timeout units determine whether the revision contains the guilty commit revision b1644a0031cfb3ca2cbd84c92f771f8ebb62302d crashed and is reachable testing commit 40f8b3f5e679eefa59272c337196da9980f250ce gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: b335cd375a431c0b3f40c1edc04e8e65409da9ede903c185943bee42c037430c run #0: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #1: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #2: crashed: KASAN: out-of-bounds Read in get_max_inline_xattr_value_size run #3: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #4: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #5: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #6: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #7: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #8: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #9: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good 40f8b3f5e679eefa59272c337196da9980f250ce Bisecting: 119 revisions left to test after this (roughly 7 steps) [b2bd08be1a64ec7e86fbedef700e0b9579793005] fs/ntfs3: Refactoring of various minor issues determine whether the revision contains the guilty commit revision f0b58720f2b02a41917a98a2a821cd9211ff4735 crashed and is reachable testing commit b2bd08be1a64ec7e86fbedef700e0b9579793005 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 6085386f5057e1c6a2ad9e5978684a39dc6d62c9117cf9037190257fa844b5e3 all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good b2bd08be1a64ec7e86fbedef700e0b9579793005 Bisecting: 59 revisions left to test after this (roughly 6 steps) [3ff962242f5b69176d859c03948fe20cf234d2c3] drm/mipi-dsi: Set the fwnode for mipi_dsi_device determine whether the revision contains the guilty commit revision f0b58720f2b02a41917a98a2a821cd9211ff4735 crashed and is reachable testing commit 3ff962242f5b69176d859c03948fe20cf234d2c3 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 7b31a131402017da9e8212569ecd5880bddc92534ec0fe4d47bc887a08e14a8e all runs: OK false negative chance: 0.000 # git bisect bad 3ff962242f5b69176d859c03948fe20cf234d2c3 Bisecting: 29 revisions left to test after this (roughly 5 steps) [91bbf9cb2387a0d76322e9a343bc6bc160f66b3f] ksmbd: Implements sess->ksmbd_chann_list as xarray determine whether the revision contains the guilty commit revision b1644a0031cfb3ca2cbd84c92f771f8ebb62302d crashed and is reachable testing commit 91bbf9cb2387a0d76322e9a343bc6bc160f66b3f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ff61d7e77d4380d26270e11baaf98bfc1ac75977429958311dfafcc54fa108ac all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good 91bbf9cb2387a0d76322e9a343bc6bc160f66b3f Bisecting: 14 revisions left to test after this (roughly 4 steps) [1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f] ext4: add bounds checking in get_max_inline_xattr_value_size() determine whether the revision contains the guilty commit revision b2bd08be1a64ec7e86fbedef700e0b9579793005 crashed and is reachable testing commit 1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 5e0e7d95cdf9540d74785c2bee45c54b6c12b48bddb09e0b8f72e03a62dadb4f all runs: OK false negative chance: 0.000 # git bisect bad 1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f Bisecting: 7 revisions left to test after this (roughly 3 steps) [1b9c92432fdf809c2bffa58fd86ace3c48371f7e] locking/rwsem: Add __always_inline annotation to __down_read_common() and inlined callers determine whether the revision contains the guilty commit revision b2bd08be1a64ec7e86fbedef700e0b9579793005 crashed and is reachable testing commit 1b9c92432fdf809c2bffa58fd86ace3c48371f7e gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ae43e478466455ac2dc665eb62bed43167904b28d7b50bf361fe933f41c5fb31 run #0: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #1: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #2: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #3: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #4: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #5: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #6: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #7: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #8: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #9: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good 1b9c92432fdf809c2bffa58fd86ace3c48371f7e Bisecting: 3 revisions left to test after this (roughly 2 steps) [748e4bb27d2e3cb455ed2b75afd6cceee876b378] ext4: check iomap type only if ext4_iomap_begin() does not fail determine whether the revision contains the guilty commit revision b1644a0031cfb3ca2cbd84c92f771f8ebb62302d crashed and is reachable testing commit 748e4bb27d2e3cb455ed2b75afd6cceee876b378 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 1b247c5b7c6bd34a3074aade22a87c2c673db2a44e005eba010da8ab5c645a73 all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good 748e4bb27d2e3cb455ed2b75afd6cceee876b378 Bisecting: 1 revision left to test after this (roughly 1 step) [f68876aeef96ef8b708ab10b9cb47ce0a5adb424] ext4: improve error handling from ext4_dirhash() determine whether the revision contains the guilty commit revision b1644a0031cfb3ca2cbd84c92f771f8ebb62302d crashed and is reachable testing commit f68876aeef96ef8b708ab10b9cb47ce0a5adb424 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: dc0c2ddaeac9d7cda09f1665f147c6726fb1883adefa7544b35c6120fb6da588 run #0: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #1: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #2: crashed: KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size run #3: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #4: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #5: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #6: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #7: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #8: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size run #9: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good f68876aeef96ef8b708ab10b9cb47ce0a5adb424 Bisecting: 0 revisions left to test after this (roughly 0 steps) [665cc3ba50330049524c1d275bc840a8f28dde73] ext4: fix deadlock when converting an inline directory in nojournal mode determine whether the revision contains the guilty commit revision b1644a0031cfb3ca2cbd84c92f771f8ebb62302d crashed and is reachable testing commit 665cc3ba50330049524c1d275bc840a8f28dde73 gcc compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 166e8aef40b8a6517c124595cbc15cea99b9de1bd4023a75b6941d5c6cab2ab2 all runs: crashed: KASAN: use-after-free Read in get_max_inline_xattr_value_size representative crash: KASAN: use-after-free Read in get_max_inline_xattr_value_size, types: [KASAN] # git bisect good 665cc3ba50330049524c1d275bc840a8f28dde73 1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f is the first bad commit commit 1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f Author: Theodore Ts'o Date: Fri May 12 15:11:02 2023 -0400 ext4: add bounds checking in get_max_inline_xattr_value_size() commit 2220eaf90992c11d888fe771055d4de330385f01 upstream. Normally the extended attributes in the inode body would have been checked when the inode is first opened, but if someone is writing to the block device while the file system is mounted, it's possible for the inode table to get corrupted. Add bounds checking to avoid reading beyond the end of allocated memory if this happens. Reported-by: syzbot+1966db24521e5f6e23f7@syzkaller.appspotmail.com Link: https://syzkaller.appspot.com/bug?extid=1966db24521e5f6e23f7 Cc: stable@kernel.org Signed-off-by: Theodore Ts'o Signed-off-by: Greg Kroah-Hartman fs/ext4/inline.c | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) accumulated error probability: 0.00 culprit signature: 5e0e7d95cdf9540d74785c2bee45c54b6c12b48bddb09e0b8f72e03a62dadb4f parent signature: 166e8aef40b8a6517c124595cbc15cea99b9de1bd4023a75b6941d5c6cab2ab2 revisions tested: 20, total time: 3h54m32.936616047s (build: 1h24m43.485899948s, test: 2h22m27.344166944s) first good commit: 1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f ext4: add bounds checking in get_max_inline_xattr_value_size() recipients (to): ["gregkh@linuxfoundation.org" "tytso@mit.edu"] recipients (cc): []