Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp913430ybx; Wed, 6 Nov 2019 10:14:54 -0800 (PST) X-Google-Smtp-Source: APXvYqycw5YzzWrZ0Po41WHnwo5QwMg6qnu5ZPfMZ2Jqn007qybDC0H8e+GsnDoZGD6229HcuZac X-Received: by 2002:a17:906:4e53:: with SMTP id g19mr31791383ejw.286.1573064094256; Wed, 06 Nov 2019 10:14:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573064094; cv=none; d=google.com; s=arc-20160816; b=pzbjmFBKRJ3xiMysINYX+R5xMXlP4FwbKEzCC+dqah3nECVXouP4QPVg2cezYe7wGb JykZWGOkjzTtfrEvvcHvtDdAjN0y0G5hwuYnt6BOYGHXQvpDrtjwjuC9jnmwNlwxNriS jp3m9n6bYM0VLxOghEVUrBfwcrNOua8zcYNUp6AczM344V8BDVX6nLaVn46GmM6ymDed jyF0hrpnv6Lm5KclxlBr6uEs3M1fJQJZnNJykiQSDNrJn9gfoPt5tUxzn3N/Z0Bbakcq 1WYcBfx6zH1z4PZRYFh7yCvsaVL91zdJVq6rFQGSv2CP2kWdqpuADTZv2ARXXebFdgQG RZug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=YVS/3wI6ORy+fZ2g4/poNK4L4VSm89GVOjklkZo2Pfg=; b=dTecJLGUbDewldueTNbwm1eVsbtztd0wkMYgymR5GJIcJ+WBhCEPzd1h/VFgf2wNAV CkC1q3Yt9Y+ePl7WVEqsS2Q/Ax95Kv81D9AoeMm6aywK2xSZn5r+FvH9dVpb7ZZQhXCs coJbSYDRxzHASFdG8Tv+bALMGuuYA/03uSkgw/86tB9kSgfXPHGURUr3Uw/uQfmL6jQL /xL5cWxqbHtuwGHljDzvRAa3zRxOFIiXhwCbEs/z6gqQGjSfAxj31B+RSusJvCnFs+HL xbGo8/lBvSl4zHbjXvc8Hbnwgxr2nSNl9qQqbExe5tebQsudGtfoyqyCPlSM+7Zqym8P /Qrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LdWzgySP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s58si12814629edm.45.2019.11.06.10.14.30; Wed, 06 Nov 2019 10:14:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LdWzgySP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732248AbfKFSNu (ORCPT + 99 others); Wed, 6 Nov 2019 13:13:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:58990 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727286AbfKFSNu (ORCPT ); Wed, 6 Nov 2019 13:13:50 -0500 Received: from localhost.localdomain (c-73-231-172-41.hsd1.ca.comcast.net [73.231.172.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8358D2166E; Wed, 6 Nov 2019 18:13:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573064029; bh=Ta1ybKjmi0q0KWQZNpGJKfbd9zOitUNAQZVj6Hxc294=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=LdWzgySPOwqFPRp6S8W/AdVCXFeh0qivlwI4NKVsoiWM2TbBGXUlRJIR1GIYzWxcV 8kGunXPENoww38XldDZxprZcnF4nPE2X9i01z4pWt3OC6eVVUwSZMkMMTI/J/WcgpN HMIBcYWinzHjE3tBtxfuy4b1RLfkAtoTZ3GaUzvw= Date: Wed, 6 Nov 2019 10:13:49 -0800 From: Andrew Morton To: Kees Cook Cc: Daniel Vetter , DRI Development , LKML , syzbot+fb77e97ebf0612ee6914@syzkaller.appspotmail.com, Alexander Viro , Stephen Rothwell , Daniel Vetter Subject: Re: [PATCH] drm: Limit to INT_MAX in create_blob ioctl Message-Id: <20191106101349.7dfaa4282db4c7a0239b96f2@linux-foundation.org> In-Reply-To: <201911060920.71D7E76E@keescook> References: <20191106164755.31478-1-daniel.vetter@ffwll.ch> <201911060920.71D7E76E@keescook> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 6 Nov 2019 09:24:18 -0800 Kees Cook wrote: > > Since this is -mm can I have a stable sha1 or something for > > referencing? Or do you want to include this in the -mm patch bomb for > > the merge window? > > Traditionally these things live in akpm's tree when they are fixes for > patches in there. I have no idea how the Fixes tags work in that case, > though... I queued it immediately ahead of uaccess-disallow-int_max-copy-sizes.patch so all should be good, thanks.