From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757278Ab2DFNyp (ORCPT ); Fri, 6 Apr 2012 09:54:45 -0400 Received: from smtp.fireflyinternet.com ([109.228.6.236]:64376 "EHLO fireflyinternet.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753843Ab2DFNyo (ORCPT ); Fri, 6 Apr 2012 09:54:44 -0400 X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=78.156.66.37; From: Chris Wilson Subject: Re: [PATCH 1/2] drm/i915: fix integer overflow in i915_gem_execbuffer2() To: Xi Wang Cc: Keith Packard , Daniel Vetter , linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org In-Reply-To: References: <1333717099-32679-1-git-send-email-xi.wang@gmail.com> <1333719431_271283@CP5-2952> Date: Fri, 06 Apr 2012 14:54:05 +0100 X-Originating-IP: 78.156.66.37 Message-ID: <1333720475_271533@CP5-2952> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 6 Apr 2012 09:46:46 -0400, Xi Wang wrote: > On Apr 6, 2012, at 9:36 AM, Chris Wilson wrote: > > > On Fri, 6 Apr 2012 08:58:18 -0400, Xi Wang wrote: > >> A large args->buffer_count from userspace may overflow the allocation > >> size, leading to out-of-bounds access. > >> > >> Use kmalloc_array() to avoid that. > > > > I can safely say that exec list larger than 4GiB is going to be an > > illegal operation and would rather the ioctl failed outright with > > EINVAL. > > On 32-bit platform? On any platform. The largest it can legally be is a few tens of megabytes. -Chris -- Chris Wilson, Intel Open Source Technology Centre