From mboxrd@z Thu Jan 1 00:00:00 1970 From: Xi Wang Subject: Re: [PATCH 1/2] drm/i915: fix integer overflow in i915_gem_execbuffer2() Date: Fri, 6 Apr 2012 09:46:46 -0400 Message-ID: References: <1333717099-32679-1-git-send-email-xi.wang@gmail.com> <1333719431_271283@CP5-2952> Mime-Version: 1.0 (Apple Message framework v1084) Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1333719431_271283@CP5-2952> Sender: linux-kernel-owner@vger.kernel.org To: Chris Wilson Cc: Keith Packard , Daniel Vetter , linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org List-Id: dri-devel@lists.freedesktop.org On Apr 6, 2012, at 9:36 AM, Chris Wilson wrote: > On Fri, 6 Apr 2012 08:58:18 -0400, Xi Wang wrote: >> A large args->buffer_count from userspace may overflow the allocation >> size, leading to out-of-bounds access. >> >> Use kmalloc_array() to avoid that. > > I can safely say that exec list larger than 4GiB is going to be an > illegal operation and would rather the ioctl failed outright with > EINVAL. On 32-bit platform? - xi