On 1/20/24 7:44 AM, Subramanya Swamy wrote: > /proc/sys/kernel/io_uring_group takes gid as input > added boundary value check to accept gid in range of > 0<=gid<=4294967294 & Documentation is updated for same This should have: Fixes: 76d3ccecfa18 ("io_uring: add a sysctl to disable io_uring system-wide") > diff --git a/Documentation/admin-guide/sysctl/kernel.rst b/Documentation/admin-guide/sysctl/kernel.rst > index 6584a1f9bfe3..a8b61ab3e118 100644 > --- a/Documentation/admin-guide/sysctl/kernel.rst > +++ b/Documentation/admin-guide/sysctl/kernel.rst > @@ -470,10 +470,8 @@ io_uring_group > ============== > > When io_uring_disabled is set to 1, a process must either be > -privileged (CAP_SYS_ADMIN) or be in the io_uring_group group in order > -to create an io_uring instance. If io_uring_group is set to -1 (the > -default), only processes with the CAP_SYS_ADMIN capability may create > -io_uring instances. > +privledged (CAP_SYS_ADMIN) or be in the io_uring_group group in order privileged. -- Jens Axboe