From patchwork Thu Jun 1 09:40:04 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Aleksandr Mikhalitsyn X-Patchwork-Id: 1788897 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=kZ3wH/1A; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4QX1Mn5B1Gz20QJ for ; Thu, 1 Jun 2023 19:40:36 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1q4en9-0001Dc-BS; Thu, 01 Jun 2023 09:40:23 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1q4en7-0001DV-Bv for kernel-team@lists.ubuntu.com; Thu, 01 Jun 2023 09:40:21 +0000 Received: from mail-ed1-f71.google.com (mail-ed1-f71.google.com [209.85.208.71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 13C8A3F177 for ; Thu, 1 Jun 2023 09:40:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1685612421; bh=c2SpE0WK65jkGVH8EOE1SWBQuSkNde+StoEihj4polc=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=kZ3wH/1AsLxtDFXdOYyiyp5f2YVChUeShGcpfmlGSemcG/+PWoagIdNJdS9tboV2s fE+kq6/mIfJZhVIZ5fEKo/OTnPJO7KjytPWdOTldNptVPl9hKcFDFTfAaBnj5/MYWh KewXOsm2/tiV6YhLPf6VbOo6wbMtrAQnVEyTVZFSzPsKeeVGxKebX0SEkqlnrYo6PT SushP7Hbi2Ipy7AWJBEhcwEniJhVF1mi7Ui+u4owS4l6AKxiQ7TaL/YnMfhUzyIo3C bS7B9uLKYGZvWBt3t61ZNwgTPTarQbehRVVHIK3Co6nbuh+DRGmFLQS0YyOd/CGfj8 AqWosmytx19Iw== Received: by mail-ed1-f71.google.com with SMTP id 4fb4d7f45d1cf-514a6909c35so535757a12.3 for ; Thu, 01 Jun 2023 02:40:21 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685612420; x=1688204420; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=c2SpE0WK65jkGVH8EOE1SWBQuSkNde+StoEihj4polc=; b=YvO+QKFfeAZMj6MTrLE/OZpmfq4JSGeemN/y4fud3RyB3GJXRzI0VykAzy7bzsAFrY xw8E6o8aqXDkWxhQUGsbrrMSecWxaegXa2JtuZFgXMtFjE9wA/1ny+PEe0FrnTT9oG1h NN7zl1tOM2ms3i+yRYGiPuY7PJkJ4I+TBs8OcrrViIG1pcXzUNDQH3K0qEQ8OlzWCz7H j/llEpFjcv74ZemlAHGUuA3s9+k5msHDVLv2p4e9K+Jp1w2VhNUiGi8TpYdgELrz41Gs f0Ti8i62JDuzongbq05RFybbQT/CjBi6MluPBgn4cPFokk0c+j2RpefRWwTkzCdevBdK mqZg== X-Gm-Message-State: AC+VfDwYEI0xpkEKIUEZxhW1wLMMI6Nt28VE4u49P7ViuxQbU16ByOm0 uKFJ6qIXxtrRioDZA0/5DNNB26cuWuvofBAP9bmoC5ZzMTeRPsj5PNN+L94dJKX8qvYEMu8tDkj cZsFBIeaZzXfOce5OuyGgygdKFHfQ2szj0jwEDNAcho5T4Z/Tlg== X-Received: by 2002:aa7:cd77:0:b0:514:7f5e:a042 with SMTP id ca23-20020aa7cd77000000b005147f5ea042mr5691824edb.42.1685612420439; Thu, 01 Jun 2023 02:40:20 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6mB+SV392WxER7u4feTPJGWmsj674imAoE6tRewBM9zKgeB0gtiEhtsfto8RejOBojsxhW5g== X-Received: by 2002:aa7:cd77:0:b0:514:7f5e:a042 with SMTP id ca23-20020aa7cd77000000b005147f5ea042mr5691809edb.42.1685612420130; Thu, 01 Jun 2023 02:40:20 -0700 (PDT) Received: from amikhalitsyn.local (dslb-002-205-068-085.002.205.pools.vodafone-ip.de. [2.205.68.85]) by smtp.gmail.com with ESMTPSA id r16-20020a056402019000b00514b3a2008esm2733758edv.2.2023.06.01.02.40.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Jun 2023 02:40:19 -0700 (PDT) From: Alexander Mikhalitsyn To: kernel-team@lists.ubuntu.com Subject: [SRU][K:master-next][PATCH v3 0/2] fix bio_split_to_limits() NULL pointer dereference Date: Thu, 1 Jun 2023 11:40:04 +0200 Message-Id: <20230601094006.171590-1-aleksandr.mikhalitsyn@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: kamal.mostafa@canonical.com Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/2020901 [Impact] System crash/hung as a consequence of null pointer dereference. [Fix] port appropriate patches from the upstream tree [Test] We have a stable reproducer on the LXD/LXC CI. [Where problems could occur] We've met this problem with Qemu VM (LVM storage). Jens Axboe (2): block: handle bio_split_to_limits() NULL return pktcdvd: check for NULL returna fter calling bio_split_to_limits() block/blk-merge.c | 4 +++- block/blk-mq.c | 5 ++++- drivers/block/drbd/drbd_req.c | 2 ++ drivers/block/pktcdvd.c | 2 ++ drivers/block/ps3vram.c | 2 ++ drivers/md/dm.c | 2 ++ drivers/md/md.c | 2 ++ drivers/nvme/host/multipath.c | 2 ++ drivers/s390/block/dcssblk.c | 2 ++ 9 files changed, 21 insertions(+), 2 deletions(-) Acked-by: Roxana Nicolescu Acked-by: Andrea Righi