]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
5.10-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 30 Nov 2023 15:05:20 +0000 (15:05 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 30 Nov 2023 15:05:20 +0000 (15:05 +0000)
added patches:
io_uring-fix-off-by-one-bvec-index.patch

queue-5.10/io_uring-fix-off-by-one-bvec-index.patch [new file with mode: 0644]
queue-5.10/series

diff --git a/queue-5.10/io_uring-fix-off-by-one-bvec-index.patch b/queue-5.10/io_uring-fix-off-by-one-bvec-index.patch
new file mode 100644 (file)
index 0000000..aa0046e
--- /dev/null
@@ -0,0 +1,35 @@
+From 4581de67b1393426ac29d8c6d19119e15f08a313 Mon Sep 17 00:00:00 2001
+From: Keith Busch <kbusch@kernel.org>
+Date: Mon, 20 Nov 2023 14:18:31 -0800
+Subject: io_uring: fix off-by one bvec index
+
+From: Keith Busch <kbusch@kernel.org>
+
+commit d6fef34ee4d102be448146f24caf96d7b4a05401 upstream.
+
+If the offset equals the bv_len of the first registered bvec, then the
+request does not include any of that first bvec. Skip it so that drivers
+don't have to deal with a zero length bvec, which was observed to break
+NVMe's PRP list creation.
+
+Cc: stable@vger.kernel.org
+Fixes: bd11b3a391e3 ("io_uring: don't use iov_iter_advance() for fixed buffers")
+Signed-off-by: Keith Busch <kbusch@kernel.org>
+Link: https://lore.kernel.org/r/20231120221831.2646460-1-kbusch@meta.com
+Signed-off-by: Jens Axboe <axboe@kernel.dk>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ io_uring/io_uring.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/io_uring/io_uring.c
++++ b/io_uring/io_uring.c
+@@ -3149,7 +3149,7 @@ static int __io_import_fixed(struct io_k
+                */
+               const struct bio_vec *bvec = imu->bvec;
+-              if (offset <= bvec->bv_len) {
++              if (offset < bvec->bv_len) {
+                       iov_iter_advance(iter, offset);
+               } else {
+                       unsigned long seg_skip;
index 68a1c1affdf23843c962e5c0d003f36d6c002121..59a55c8cc0a9a36932cf44baa33f3029cae7637c 100644 (file)
@@ -76,3 +76,4 @@ usb-dwc2-write-hcint-with-intmask-applied.patch
 usb-dwc3-fix-default-mode-initialization.patch
 usb-dwc3-set-the-dma-max_seg_size.patch
 usb-dwc3-qcom-fix-wakeup-after-probe-deferral.patch
+io_uring-fix-off-by-one-bvec-index.patch