From patchwork Tue May 30 17:25:16 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Aleksandr Mikhalitsyn X-Patchwork-Id: 1787780 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=gyLsSHV/; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4QVznf0t94z20Q5 for ; Wed, 31 May 2023 03:25:57 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1q436Q-0000QO-3Q; Tue, 30 May 2023 17:25:46 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1q436P-0000QF-0d for kernel-team@lists.ubuntu.com; Tue, 30 May 2023 17:25:45 +0000 Received: from mail-ed1-f69.google.com (mail-ed1-f69.google.com [209.85.208.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id B9C2341348 for ; Tue, 30 May 2023 17:25:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1685467544; bh=u6nuhhBM3jUi4nS8F2rWgMAetnB0suZFTiCGhXqa4ZU=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=gyLsSHV/cRI/qhseqFDR/WfdsajciELGzB/jjFzLp2OjeseDS6JLytc5IGkwpsuuX PtcsQzxJ0An7J6JNAYmXTYZ7hq1i01ebEYDguSxpGBRYO6rq1eI4O3ffvXByhAIuUq eJXnj0ExNU8N3wkZQXsVs3IhuEBjNJx6GPHEf7fVMY0RFjKaR1kGdaAD5rIUoi7Ofz LpX3bR7Lcb1cmZ/Ra3WxKLiG9Ad+WKmcQgY72g+Au2pPGNfK98oWW9Fa1pTHltCERQ wiLwiw6XQNZtBdUWdAcP+8WdrcmbN/SVPKpHWTWpl4+4aYteQQQf7134nnGyPuSEVl GkWRn3zZG3Icw== Received: by mail-ed1-f69.google.com with SMTP id 4fb4d7f45d1cf-513f4c301e8so4798243a12.2 for ; Tue, 30 May 2023 10:25:44 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685467543; x=1688059543; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=u6nuhhBM3jUi4nS8F2rWgMAetnB0suZFTiCGhXqa4ZU=; b=gnoNOnU62RUTcHNQv9Iu7RXsT5ORE+T+8RDwfYgK/qr1d8kBGOt68jWMXA0FBVcKGt luwbvhOgvbURMvLCwNnRzKhpjiktjwhrFZtAcXwy/mCdN8FLgOuIWLcryqtIpPiDxRX6 tjiNF9FVa2vhX+KhElZD6HpGdr3umEPBp3Zv8T6QZw5JWd9sMetQwiF5/pOcoNgr0Rxe /78zHDL5uMX6sfjlM4mDkxkFGp/WbpeFqwHRF2Yd4FZropNDnhdIt12NSzGWoLtrhqOQ splqYFXnY5IUC3+dNI7+xlNoNGXTfsEWHmDaQqonlzCzJuEcpkPA9xTynFx8mrnaXgKp RxHw== X-Gm-Message-State: AC+VfDw3CGB/7qIqBGMTAWAWx193PXFPwtHefBgQ+QJLZvX1oQvnHdVG AHYpDaOA8bBd6lXUNF8WsMv/7C9u+FLVu29gtXWrOmBKF45FSTltn5FUggkKgqSGjcNlBtUEAi0 Kn5YfeQtQ6RuiONJiJHIYofTG0IXCnY5s7F+LTYIDIfIXDptULg== X-Received: by 2002:a17:907:168c:b0:973:dd61:d427 with SMTP id hc12-20020a170907168c00b00973dd61d427mr2991679ejc.66.1685467543228; Tue, 30 May 2023 10:25:43 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7vspJT+079gnI3bIvyVFslrmYepcyu5Fyd6K1UW1LXesnEFTL1mqmhyvMzHeVowpRHc5YPSA== X-Received: by 2002:a17:907:168c:b0:973:dd61:d427 with SMTP id hc12-20020a170907168c00b00973dd61d427mr2991667ejc.66.1685467542972; Tue, 30 May 2023 10:25:42 -0700 (PDT) Received: from amikhalitsyn.local (dslb-088-074-206-207.088.074.pools.vodafone-ip.de. [88.74.206.207]) by smtp.gmail.com with ESMTPSA id h21-20020a1709062dd500b0097404f4a124sm2793727eji.2.2023.05.30.10.25.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 May 2023 10:25:42 -0700 (PDT) From: Alexander Mikhalitsyn To: kernel-team@lists.ubuntu.com Subject: [SRU][K:master-next][PATCH 0/1] block: handle bio_split_to_limits() NULL return Date: Tue, 30 May 2023 19:25:16 +0200 Message-Id: <20230530172517.659713-1-aleksandr.mikhalitsyn@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: kamal.mostafa@canonical.com Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/2020901 [Impact] System crash/hung as a consequence of null pointer dereference. [Fix] port an appropriate patch from -stable upstream tree [Test] We have a stable reproducer on the LXD/LXC CI. [Where problems could occur] We've met this problem with Qemu VM (LVM storage). Jens Axboe (1): block: handle bio_split_to_limits() NULL return block/blk-merge.c | 4 +++- block/blk-mq.c | 3 +++ drivers/block/drbd/drbd_req.c | 2 ++ drivers/block/pktcdvd.c | 2 ++ drivers/block/ps3vram.c | 2 ++ drivers/md/dm.c | 2 ++ drivers/md/md.c | 2 ++ drivers/nvme/host/multipath.c | 2 ++ drivers/s390/block/dcssblk.c | 2 ++ 9 files changed, 20 insertions(+), 1 deletion(-) Acked-by: Tim Gardner